Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Artificial intelligence (1)
- Artificial intelligence--Social aspects (1)
- Cells--Aging (1)
- Computational biology (1)
- Computer science -- Study and teaching (1)
-
- Computer security (1)
- Computer-assisted instruction (1)
- Computers--Access control--Passwords (1)
- Electronic data processing (1)
- Human-computer interaction (1)
- Information technology--Security measures--Government policy (1)
- Internet governance--Government policy (1)
- Internet of things--Law and legislation (1)
- Machine learning (1)
- Markov processes (1)
- Natural language processing (Computer science) (1)
- Parallel programs (Computer programs) (1)
- Privacy, Right of--United States (1)
- Saccharomyces cerevisiae (1)
- Twitter (1)
- Universities and colleges -- Curricula (1)
- Universities and colleges--Security measures (1)
- Web sites -- Design (1)
- Yeast (1)
Articles 1 - 10 of 10
Full-Text Articles in Physical Sciences and Mathematics
Guardians Of The Data: Government Use Of Ai And Iot In The Digital Age, Jannat Saeed
Guardians Of The Data: Government Use Of Ai And Iot In The Digital Age, Jannat Saeed
Honors Theses
The exponential growth of technology, epitomized by Moore's Law – “the observation that the number of transistors on an integrated circuit will double every two years”– has propelled the swift evolution of Artificial Intelligence (AI) and Internet of Things (IoT) technologies. This phenomenon has revolutionized various facets of daily life, from smart home devices to autonomous vehicles, reshaping how individuals interact with the world around them. However, as governments worldwide increasingly harness these innovations to monitor and collect personal data, profound privacy concerns have arisen among the general populace. Despite the ubiquity of AI and IoT in modern society, formal …
Security Fatigue And Its Effects On Perceived Password Strength Among University Students, Chase Carroll
Security Fatigue And Its Effects On Perceived Password Strength Among University Students, Chase Carroll
Honors Theses
This study was performed with the goal of observing the effect, if any, that security fatigue has on students’ perceived strength of passwords. In doing so, it was hoped to find some correlation between the two that would help in establishing a measurable effect of the phenomenon in students. This could potentially aid organizational decision-makers, such as security policy writers and system admins, to make more informed decisions about implementing security measures. To achieve the goal of observing this fatigue and attempting to measure it, a survey was distributed to numerous students on the University of Tennessee at Chattanooga campus. …
Simplifying The Creation Of Virtual Topologies Using Mpi Sessions, Tom Herschberg
Simplifying The Creation Of Virtual Topologies Using Mpi Sessions, Tom Herschberg
Honors Theses
As supercomputers have approached exascale performance, several scalability issues have emerged within MPI. These issues arise because MPI includes all processes in the World model, which consumes unacceptable amounts of time and resources at large scale. The Sessions model was developed to combat these issues by removing the requirement of MPI_COMM_WORLD, which provides a more scalable method of creating communication groups in large jobs. Additionally, the Sessions model enables the creation of virtual topologies directly from sets of processes allocated to the execution of a parallel application rather than building virtual topologies from an existing communication group such as MPI_COMM_WORLD. …
Applying Deep Learning For Cell Detection In Time-Lapse Microscopic Images, Jay Patel
Applying Deep Learning For Cell Detection In Time-Lapse Microscopic Images, Jay Patel
Honors Theses
The budding yeast Saccharomyces cerevisiae is an effective model for studying cellular aging. We can measure the lifespan of yeast cells in two ways: replicative and chronological lifespans. Chronological focuses on the time that a cell can survive. The replicative lifespan (RLS) is the number of cell divisions that a single mother cell can go through before ceases to be dividing. RLS is a measurement of individual cells and is more informative on the aging process than in chronological lifespan. Many genes that influence yeast RLS have been shown to be highly conserved and have a similar effect on aging …
Meta-Analysis Of Biological Research Literature, Evan Suggs
Meta-Analysis Of Biological Research Literature, Evan Suggs
Honors Theses
Comparative studies have been powerful tools in generating a broad understanding about the evolution of animal social systems but they currently rely on the slow, manual process of reading thousands of abstracts and papers from research databases. A web application was created for researchers conducting a comparative survey, in order to speed up their research. This web application automates the retrieval of research papers and their selection process. Using previously obtained data sets on the orders Artiodacytla and Lagomorph, a machine learning application was created to classify the papers. These techniques and tools should greatly increase the speed at which …
Designing A General Education Course On The Societal Impacts Of Artificial Intelligence, Vincent Rollins
Designing A General Education Course On The Societal Impacts Of Artificial Intelligence, Vincent Rollins
Honors Theses
Most colleges, including UTC, already offer an artificial intelligence course (CPSC 4440) as part of their computer science curricula. Such courses are meant to explain the technology behind these elaborate systems, but these courses often neglect extensive coverage of the real-world impacts of the technology itself. UTC also offers a course entitled “Ethical and Social Issues in Computing” that does convey the importance behind the advances of computer technology and its impacts, but this course is practically available only to computer science majors. There is no generalized and widely available course that covers the technological, economic, cultural, philosophical/theological, and ethical …
The Intersection Of Literacy And Digital Literacy: Incorporating Writing Standards With Computer Technology Standards, Grace Mcpherson
The Intersection Of Literacy And Digital Literacy: Incorporating Writing Standards With Computer Technology Standards, Grace Mcpherson
Honors Theses
This project aims to increase access to computer science/computer technology education by providing teachers resources to enable them to teach computer science/computer technology. A survey was taken to discover the interests and needs of teachers in Hamilton County, Tennessee. The project resulted in the creation of several lesson plans that integrate English and computer science through hands-on web development exercises, computational thinking opportunities, and critical thinking.
Quantifying The Effect Of Dietary Restriction On Lifespans In Saccharomyces Cerevisiae, Kathryn Rouse
Quantifying The Effect Of Dietary Restriction On Lifespans In Saccharomyces Cerevisiae, Kathryn Rouse
Honors Theses
Dietary restriction (DR) increases lifespan in many organisms. The effect of DR is best studied in the budding yeast Saccharomyces cerevisiae; however, previous studies of the DR effect on yeast lifespan tend to be qualitative. Here, we quantitatively study the effect of DR on lifespan for a selection of gene deletions in a 168-strain set of Saccharomyces cerevisiae. Lifespans of these yeast mutants were measured in YPD with 2% glucose and 0.05% glucose conditions. To quantify the aging process and its influence by DR, we fit yeast lifespan data with a three-parameter network aging model that is informative of the …
Predicting The Author Of Twitter Posts With Markov Chain Analysis, Daniel Freeman
Predicting The Author Of Twitter Posts With Markov Chain Analysis, Daniel Freeman
Honors Theses
Given a set of text with known authors, is it possible to take new text, not knowing who wrote it, and correctly identify the author? One way to do this is to analyze the text using Markov chains. This research project will first attempt to answer this question using books available in the public domain. Using what is learned from trying to identify authors of books, the primary goal of this project is to identify the best way to guess the author of a post on the social media network Twitter using Markov chains.
Which Language(S) Are Best (For Web Development), Jackson A. Stone
Which Language(S) Are Best (For Web Development), Jackson A. Stone
Honors Theses
This thesis is intended to shine light on the complex nature of the online software ecosystem, in the hopes that it may help students who wish to pursue web development determine how to best spend their time researching and learning varying technologies.