Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Answer set programming (2)
- Cybersecurity (2)
- Art (1)
- Artificial Intelligence (1)
- Automated reasoning (1)
-
- Computer literacy (1)
- Culture (1)
- Emergency management and cybersecurity (1)
- Encoding optimizations (1)
- Fine Arts (1)
- Form auto generation (1)
- Form generation (1)
- GUI history (1)
- Individual implementation of cybersecurity (1)
- Information Security (1)
- Machine learning (1)
- Proof assistant (1)
- Risk (1)
- Software verification (1)
- SurveyJS (1)
- Werner Enterprises (1)
- Publication
- Publication Type
Articles 1 - 16 of 16
Full-Text Articles in Physical Sciences and Mathematics
Form Auto Generation: An Analysis Of Gui Generation, Jedadiah Mcfarland
Form Auto Generation: An Analysis Of Gui Generation, Jedadiah Mcfarland
Theses/Capstones/Creative Projects
Graphical User Interfaces (GUIs) have transformed how we interact with computers, offering visually appealing and intuitive systems. This paper explores the origins and evolution of GUIs, explicitly focusing on form auto-generation in modern GUI-driven environments. Form auto-generation has emerged as a prominent practice, enabling automatic form creation based on predefined models. To better understand form auto-generation, I investigate SurveyJS, an open-source form auto-generation library known for its active development and support. This investigation aims to understand how SurveyJS recognizes and renders objects from a JSON model. The methodology involves a trial and error examination of the library, exploring its live …
External Behavior Of A Logic Program And Verification Of Refactoring, Jorge Fandinno, Zachary Hansen, Yuliya Lierler, Vladimir Lifschitz, Nathan Temple
External Behavior Of A Logic Program And Verification Of Refactoring, Jorge Fandinno, Zachary Hansen, Yuliya Lierler, Vladimir Lifschitz, Nathan Temple
Computer Science Faculty Publications
Refactoring is modifying a program without changing its external behavior. In this paper, we make the concept of external behavior precise for a simple answer set programming language. Then we describe a proof assistant for the task of verifying that refactoring a program in that language is performed correctly.
System Predictor: Grounding Size Estimator For Logic Programs Under Answer Set Semantics, Daniel Bresnahan, Nicholas Hippen, Yuliya Lierler
System Predictor: Grounding Size Estimator For Logic Programs Under Answer Set Semantics, Daniel Bresnahan, Nicholas Hippen, Yuliya Lierler
Computer Science Faculty Publications
Answer set programming is a declarative logic programming paradigm geared towards solving difficult combinatorial search problems. While different logic programs can encode the same problem, their performance may vary significantly. It is not always easy to identify which version of the program performs the best. We present the system PREDICTOR (and its algorithmic backend) for estimating the grounding size of programs, a metric that can influence a performance of a system processing a program. We evaluate the impact of PREDICTOR when used as a guide for rewritings produced by the answer set programming rewriting tools PROJECTOR and LPOPT. The results …
Efficient Convoy Routing And Bridge Load Optimization User Interface, Brandon Lacy, Will Heller, Yonas Kassa, Brian Ricks, Robin Gandhi
Efficient Convoy Routing And Bridge Load Optimization User Interface, Brandon Lacy, Will Heller, Yonas Kassa, Brian Ricks, Robin Gandhi
Information Systems and Quantitative Analysis Faculty Proceedings & Presentations
No abstract provided.
Building Explainable Machine Learning Lifecycle: Model Training, Selection, And Deployment With Explainability, Vidit Singh, Yonas Kassa, Brian Ricks, Robin Gandhi
Building Explainable Machine Learning Lifecycle: Model Training, Selection, And Deployment With Explainability, Vidit Singh, Yonas Kassa, Brian Ricks, Robin Gandhi
Information Systems and Quantitative Analysis Faculty Proceedings & Presentations
No abstract provided.
Developing Architecture For A Routing System Using Bridge Data And Adversary Avoidance, Will Heller, Brian Ricks, Yonas Kassa, Brandon Lacy, Rahul Kamar Nethakani
Developing Architecture For A Routing System Using Bridge Data And Adversary Avoidance, Will Heller, Brian Ricks, Yonas Kassa, Brandon Lacy, Rahul Kamar Nethakani
Information Systems and Quantitative Analysis Faculty Proceedings & Presentations
No abstract provided.
Progress In A New Visualization Strategy For Ml Models, Alex Wissing, Brian Ricks, Robin Gandhi, Yonas Kassa, Akshay Kale
Progress In A New Visualization Strategy For Ml Models, Alex Wissing, Brian Ricks, Robin Gandhi, Yonas Kassa, Akshay Kale
Information Systems and Quantitative Analysis Faculty Proceedings & Presentations
No abstract provided.
How To Select Simple-Yet-Accurate Model Of Bridge Maintenance?, Akshay Kale, Yonas Kassa, Brian Ricks, Robin Gandhi
How To Select Simple-Yet-Accurate Model Of Bridge Maintenance?, Akshay Kale, Yonas Kassa, Brian Ricks, Robin Gandhi
Information Systems and Quantitative Analysis Faculty Proceedings & Presentations
No abstract provided.
Artificial: A Study On The Use Of Artificial Intelligence In Art, Hayden Ernst
Artificial: A Study On The Use Of Artificial Intelligence In Art, Hayden Ernst
Theses/Capstones/Creative Projects
In the past three to five years there have been significant improvements made in AI due to improvements in computing capacity, the collection and use of big data, and an increase in public interest and funding for research. Programs such as ChatGPT, DALL•E, and Midjourney have also gained tremendous popularity in a relatively short amount of time. This led me to this project in which I aimed to gain a deeper understanding of these art generator AI and where they fit into art as a whole. My goal was to give recommendations to museums and exhibits in Omaha on what …
An Application Risk Assessment Of Werner Enterprises, Nathan Andres
An Application Risk Assessment Of Werner Enterprises, Nathan Andres
Theses/Capstones/Creative Projects
Risk assessments provide a systematic approach to identifying potential risks that could negatively impact an organization’s operations, financial performance, and reputation. Using a risk assessment, companies can evaluate potential risks and vulnerabilities, prioritize them based on their potential impact, and develop strategies to manage and address these risks effectively.
Werner Enterprises Inc. is a nationally known trucking company headquartered in Omaha, Nebraska. Our cybersecurity capstone project motivation was to partner with Werner to produce an assessment of known application risks in a functional way that can be repeated for all of Werner’s applications. To achieve this, we created a risk …
Predicting The Pebcak: A Quantitative Analysis Of How Cybersecurity Education, Literacy, And Awareness Affect Individual Preparedness., Annie Goodman
Predicting The Pebcak: A Quantitative Analysis Of How Cybersecurity Education, Literacy, And Awareness Affect Individual Preparedness., Annie Goodman
Theses/Capstones/Creative Projects
This essay explores the relationship between individuals' cybersecurity education, literacy, awareness, and preparedness. While cybersecurity is often associated with complex hacking scenarios, the majority of data breaches and cyber-attacks result from individuals inadvertently falling prey to phishing emails and malware. The lack of standardized education and training in cybersecurity, coupled with the rapid expansion of technology diversity, raises concerns about individuals' cybersecurity preparedness. As individuals are the first line of defense and the weakest link in cybersecurity, understanding the influence of education, literacy, and awareness on their adherence to best practices is crucial. This work aims to survey a diverse …
The State And Use Of Virtual Tutors, Thomas Anthone
The State And Use Of Virtual Tutors, Thomas Anthone
Theses/Capstones/Creative Projects
Virtual tutoring is the process by which students and teachers participate in the learning experience in an online, virtual, or networked environment. This process can not only separate the participants from each other in a physical space, but it can also separate them by time. Virtual tutoring can take the form of the group of students coming together synchronously in an online setting and receiving lessons from a single tutor, or by asynchronous learning in which the teacher pre-plans lessons in advance that the students consume on their own time. The advent of online learning technologies and virtual learning environments …
Attenuated Skeletal Muscle Metabolism Explains Blunted Reactive Hyperemia After Prolonged Sitting, Cody Anderson, Elizabeth Pekas, Michael Allen, Song-Young Park
Attenuated Skeletal Muscle Metabolism Explains Blunted Reactive Hyperemia After Prolonged Sitting, Cody Anderson, Elizabeth Pekas, Michael Allen, Song-Young Park
UNO Student Research and Creative Activity Fair
Introduction: Although reduced post-occlusive reactive hyperemia (PORH) after prolonged sitting (PS) has been reported as impaired microvascular function, no specific mechanism(s) have been elucidated. One potential mechanism, independent of microvascular function, is that an altered muscle metabolic rate (MMR) may change the magnitude of PORH by modifying the oxygen deficit achieved during cuff-induced arterial occlusions. We speculated that if MMR changes during PS, this may invalidate current inferences about microvascular function during PS. Objective: Therefore, the objective of this study was to examine if peripheral leg MMR changes during PS and to ascertain whether the change in the oxygen deficit …
Healthcare Facilities: Maintaining Accessibility While Implementing Security, Ryan Vilter
Healthcare Facilities: Maintaining Accessibility While Implementing Security, Ryan Vilter
UNO Student Research and Creative Activity Fair
In the wake of the Tulsa, Oklahoma hospital shooting in the summer of 2022, it was made clear that more security needed to be implemented in healthcare facilities. As a result, I inquired: What is the happy balance for healthcare facilities to maintain their accessibility to the public while also implementing security measures to prevent terrorist attacks? With that base, I give recommendations in the areas of cybersecurity, physical infrastructure, and physical and mental health, based off the existing literature and data gathered from terrorist attacks against hospitals over several decades.
The Effects Of Demographics And Risk Factors On The Morphological Characteristics Of Human Femoropopliteal Arteries, Sayed Ahmadreza Razian, Majid Jadidi, Alexey Kamenskiy
The Effects Of Demographics And Risk Factors On The Morphological Characteristics Of Human Femoropopliteal Arteries, Sayed Ahmadreza Razian, Majid Jadidi, Alexey Kamenskiy
UNO Student Research and Creative Activity Fair
Background: Disease of the lower extremity arteries (Peripheral Arterial Disease, PAD) is associated with high morbidity and mortality. During disease development, the arteries adapt by changing their diameter, wall thickness, and residual deformations, but the effects of demographics and risk factors on this process are not clear.
Methods: Superficial femoral arteries from 736 subjects (505 male, 231 female, 12 to 99 years old, average age 51±17.8 years) and the associated demographic and risk factor variables were used to construct machine learning (ML) regression models that predicted morphological characteristics (diameter, wall thickness, and longitudinal opening angle resulting from the …
Time Evolution Is A Source Of Bias In The Wolf Algorithm For Largest Lyapunov Exponents, Kolby Brink, Tyler Wiles, Nicholas Stergiou, Aaron Likens
Time Evolution Is A Source Of Bias In The Wolf Algorithm For Largest Lyapunov Exponents, Kolby Brink, Tyler Wiles, Nicholas Stergiou, Aaron Likens
UNO Student Research and Creative Activity Fair
Human movement is inherently variable by nature. One of the most common analytical tools for assessing movement variability is the largest Lyapunov exponent (LyE) which quantifies the rate of trajectory divergence or convergence in an n-dimensional state space. One popular method for assessing LyE is the Wolf algorithm. Many studies have investigated how Wolf’s calculation of the LyE changes due to sampling frequency, filtering, data normalization, and stride normalization. However, a surprisingly understudied parameter needed for LyE computation is evolution time. The purpose of this study is to investigate how the LyE changes as a function of evolution time …