Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 16 of 16

Full-Text Articles in Physical Sciences and Mathematics

Form Auto Generation: An Analysis Of Gui Generation, Jedadiah Mcfarland Aug 2023

Form Auto Generation: An Analysis Of Gui Generation, Jedadiah Mcfarland

Theses/Capstones/Creative Projects

Graphical User Interfaces (GUIs) have transformed how we interact with computers, offering visually appealing and intuitive systems. This paper explores the origins and evolution of GUIs, explicitly focusing on form auto-generation in modern GUI-driven environments. Form auto-generation has emerged as a prominent practice, enabling automatic form creation based on predefined models. To better understand form auto-generation, I investigate SurveyJS, an open-source form auto-generation library known for its active development and support. This investigation aims to understand how SurveyJS recognizes and renders objects from a JSON model. The methodology involves a trial and error examination of the library, exploring its live …


External Behavior Of A Logic Program And Verification Of Refactoring, Jorge Fandinno, Zachary Hansen, Yuliya Lierler, Vladimir Lifschitz, Nathan Temple Jul 2023

External Behavior Of A Logic Program And Verification Of Refactoring, Jorge Fandinno, Zachary Hansen, Yuliya Lierler, Vladimir Lifschitz, Nathan Temple

Computer Science Faculty Publications

Refactoring is modifying a program without changing its external behavior. In this paper, we make the concept of external behavior precise for a simple answer set programming language. Then we describe a proof assistant for the task of verifying that refactoring a program in that language is performed correctly.


System Predictor: Grounding Size Estimator For Logic Programs Under Answer Set Semantics, Daniel Bresnahan, Nicholas Hippen, Yuliya Lierler Jun 2023

System Predictor: Grounding Size Estimator For Logic Programs Under Answer Set Semantics, Daniel Bresnahan, Nicholas Hippen, Yuliya Lierler

Computer Science Faculty Publications

Answer set programming is a declarative logic programming paradigm geared towards solving difficult combinatorial search problems. While different logic programs can encode the same problem, their performance may vary significantly. It is not always easy to identify which version of the program performs the best. We present the system PREDICTOR (and its algorithmic backend) for estimating the grounding size of programs, a metric that can influence a performance of a system processing a program. We evaluate the impact of PREDICTOR when used as a guide for rewritings produced by the answer set programming rewriting tools PROJECTOR and LPOPT. The results …


Efficient Convoy Routing And Bridge Load Optimization User Interface, Brandon Lacy, Will Heller, Yonas Kassa, Brian Ricks, Robin Gandhi May 2023

Efficient Convoy Routing And Bridge Load Optimization User Interface, Brandon Lacy, Will Heller, Yonas Kassa, Brian Ricks, Robin Gandhi

Information Systems and Quantitative Analysis Faculty Proceedings & Presentations

No abstract provided.


Building Explainable Machine Learning Lifecycle: Model Training, Selection, And Deployment With Explainability, Vidit Singh, Yonas Kassa, Brian Ricks, Robin Gandhi May 2023

Building Explainable Machine Learning Lifecycle: Model Training, Selection, And Deployment With Explainability, Vidit Singh, Yonas Kassa, Brian Ricks, Robin Gandhi

Information Systems and Quantitative Analysis Faculty Proceedings & Presentations

No abstract provided.


Developing Architecture For A Routing System Using Bridge Data And Adversary Avoidance, Will Heller, Brian Ricks, Yonas Kassa, Brandon Lacy, Rahul Kamar Nethakani May 2023

Developing Architecture For A Routing System Using Bridge Data And Adversary Avoidance, Will Heller, Brian Ricks, Yonas Kassa, Brandon Lacy, Rahul Kamar Nethakani

Information Systems and Quantitative Analysis Faculty Proceedings & Presentations

No abstract provided.


Progress In A New Visualization Strategy For Ml Models, Alex Wissing, Brian Ricks, Robin Gandhi, Yonas Kassa, Akshay Kale May 2023

Progress In A New Visualization Strategy For Ml Models, Alex Wissing, Brian Ricks, Robin Gandhi, Yonas Kassa, Akshay Kale

Information Systems and Quantitative Analysis Faculty Proceedings & Presentations

No abstract provided.


How To Select Simple-Yet-Accurate Model Of Bridge Maintenance?, Akshay Kale, Yonas Kassa, Brian Ricks, Robin Gandhi May 2023

How To Select Simple-Yet-Accurate Model Of Bridge Maintenance?, Akshay Kale, Yonas Kassa, Brian Ricks, Robin Gandhi

Information Systems and Quantitative Analysis Faculty Proceedings & Presentations

No abstract provided.


Artificial: A Study On The Use Of Artificial Intelligence In Art, Hayden Ernst May 2023

Artificial: A Study On The Use Of Artificial Intelligence In Art, Hayden Ernst

Theses/Capstones/Creative Projects

In the past three to five years there have been significant improvements made in AI due to improvements in computing capacity, the collection and use of big data, and an increase in public interest and funding for research. Programs such as ChatGPT, DALL•E, and Midjourney have also gained tremendous popularity in a relatively short amount of time. This led me to this project in which I aimed to gain a deeper understanding of these art generator AI and where they fit into art as a whole. My goal was to give recommendations to museums and exhibits in Omaha on what …


An Application Risk Assessment Of Werner Enterprises, Nathan Andres May 2023

An Application Risk Assessment Of Werner Enterprises, Nathan Andres

Theses/Capstones/Creative Projects

Risk assessments provide a systematic approach to identifying potential risks that could negatively impact an organization’s operations, financial performance, and reputation. Using a risk assessment, companies can evaluate potential risks and vulnerabilities, prioritize them based on their potential impact, and develop strategies to manage and address these risks effectively.

Werner Enterprises Inc. is a nationally known trucking company headquartered in Omaha, Nebraska. Our cybersecurity capstone project motivation was to partner with Werner to produce an assessment of known application risks in a functional way that can be repeated for all of Werner’s applications. To achieve this, we created a risk …


Predicting The Pebcak: A Quantitative Analysis Of How Cybersecurity Education, Literacy, And Awareness Affect Individual Preparedness., Annie Goodman May 2023

Predicting The Pebcak: A Quantitative Analysis Of How Cybersecurity Education, Literacy, And Awareness Affect Individual Preparedness., Annie Goodman

Theses/Capstones/Creative Projects

This essay explores the relationship between individuals' cybersecurity education, literacy, awareness, and preparedness. While cybersecurity is often associated with complex hacking scenarios, the majority of data breaches and cyber-attacks result from individuals inadvertently falling prey to phishing emails and malware. The lack of standardized education and training in cybersecurity, coupled with the rapid expansion of technology diversity, raises concerns about individuals' cybersecurity preparedness. As individuals are the first line of defense and the weakest link in cybersecurity, understanding the influence of education, literacy, and awareness on their adherence to best practices is crucial. This work aims to survey a diverse …


The State And Use Of Virtual Tutors, Thomas Anthone May 2023

The State And Use Of Virtual Tutors, Thomas Anthone

Theses/Capstones/Creative Projects

Virtual tutoring is the process by which students and teachers participate in the learning experience in an online, virtual, or networked environment. This process can not only separate the participants from each other in a physical space, but it can also separate them by time. Virtual tutoring can take the form of the group of students coming together synchronously in an online setting and receiving lessons from a single tutor, or by asynchronous learning in which the teacher pre-plans lessons in advance that the students consume on their own time. The advent of online learning technologies and virtual learning environments …


Attenuated Skeletal Muscle Metabolism Explains Blunted Reactive Hyperemia After Prolonged Sitting, Cody Anderson, Elizabeth Pekas, Michael Allen, Song-Young Park Mar 2023

Attenuated Skeletal Muscle Metabolism Explains Blunted Reactive Hyperemia After Prolonged Sitting, Cody Anderson, Elizabeth Pekas, Michael Allen, Song-Young Park

UNO Student Research and Creative Activity Fair

Introduction: Although reduced post-occlusive reactive hyperemia (PORH) after prolonged sitting (PS) has been reported as impaired microvascular function, no specific mechanism(s) have been elucidated. One potential mechanism, independent of microvascular function, is that an altered muscle metabolic rate (MMR) may change the magnitude of PORH by modifying the oxygen deficit achieved during cuff-induced arterial occlusions. We speculated that if MMR changes during PS, this may invalidate current inferences about microvascular function during PS. Objective: Therefore, the objective of this study was to examine if peripheral leg MMR changes during PS and to ascertain whether the change in the oxygen deficit …


Healthcare Facilities: Maintaining Accessibility While Implementing Security, Ryan Vilter Mar 2023

Healthcare Facilities: Maintaining Accessibility While Implementing Security, Ryan Vilter

UNO Student Research and Creative Activity Fair

In the wake of the Tulsa, Oklahoma hospital shooting in the summer of 2022, it was made clear that more security needed to be implemented in healthcare facilities. As a result, I inquired: What is the happy balance for healthcare facilities to maintain their accessibility to the public while also implementing security measures to prevent terrorist attacks? With that base, I give recommendations in the areas of cybersecurity, physical infrastructure, and physical and mental health, based off the existing literature and data gathered from terrorist attacks against hospitals over several decades.


The Effects Of Demographics And Risk Factors On The Morphological Characteristics Of Human Femoropopliteal Arteries, Sayed Ahmadreza Razian, Majid Jadidi, Alexey Kamenskiy Mar 2023

The Effects Of Demographics And Risk Factors On The Morphological Characteristics Of Human Femoropopliteal Arteries, Sayed Ahmadreza Razian, Majid Jadidi, Alexey Kamenskiy

UNO Student Research and Creative Activity Fair

Background: Disease of the lower extremity arteries (Peripheral Arterial Disease, PAD) is associated with high morbidity and mortality. During disease development, the arteries adapt by changing their diameter, wall thickness, and residual deformations, but the effects of demographics and risk factors on this process are not clear.

Methods: Superficial femoral arteries from 736 subjects (505 male, 231 female, 12 to 99 years old, average age 51±17.8 years) and the associated demographic and risk factor variables were used to construct machine learning (ML) regression models that predicted morphological characteristics (diameter, wall thickness, and longitudinal opening angle resulting from the …


Time Evolution Is A Source Of Bias In The Wolf Algorithm For Largest Lyapunov Exponents, Kolby Brink, Tyler Wiles, Nicholas Stergiou, Aaron Likens Mar 2023

Time Evolution Is A Source Of Bias In The Wolf Algorithm For Largest Lyapunov Exponents, Kolby Brink, Tyler Wiles, Nicholas Stergiou, Aaron Likens

UNO Student Research and Creative Activity Fair

Human movement is inherently variable by nature. One of the most common analytical tools for assessing movement variability is the largest Lyapunov exponent (LyE) which quantifies the rate of trajectory divergence or convergence in an n-dimensional state space. One popular method for assessing LyE is the Wolf algorithm. Many studies have investigated how Wolf’s calculation of the LyE changes due to sampling frequency, filtering, data normalization, and stride normalization. However, a surprisingly understudied parameter needed for LyE computation is evolution time. The purpose of this study is to investigate how the LyE changes as a function of evolution time …