Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 13 of 13

Full-Text Articles in Physical Sciences and Mathematics

School District Boundaries Map, Nick Huffman Dec 2020

School District Boundaries Map, Nick Huffman

Honors Theses

The purpose of this project is to provide a school district boundary mapping feature to a product sold by Level Data called SDVS, which is a plugin used by districts inside of PowerSchool. Using primarily the features offered by Mapbox, We have implemented a React component that is capable of plotting useful data points related to a student and their school district on a map. The tool is designed to be used primarily by school administrators to determine whether or not a student lives within their district boundaries. The application uses a dataset that is provided by the NCES to …


Stem Teacher Database, Veronica Buss Dec 2020

Stem Teacher Database, Veronica Buss

Honors Theses

The College of Engineering and Applied Sciences (CEAS) Recruitment web application provides access to recruitment information for the Manager of Recruitment and Outreach and those who also use the spreadsheet file with their current data. This database is a functional database for the WMU college of engineering and applied sciences’ recruiters to organize their data on STEM teachers from the feeder high schools of WMU. The app provides an interface for its users to filter and search the data they have compiled to create recruitment mailing reports. The main purpose of this app was to facilitate the retrieval and upkeep …


Towards Development Of A Remote Charting System For Connected Healthcare, Alex Bodurka Dec 2020

Towards Development Of A Remote Charting System For Connected Healthcare, Alex Bodurka

Masters Theses

Health Care Providers play a crucial role in a patients well-being. While their primary role is to treat the patient, it is also vital to ensure that they can spend adequate time with the patient to create a unique treatment plan and build a personal relationship with their patients to help them feel comfortable during their treatment. Health Care Providers are frequently required to manually record patient data to track their healthcare progress during their hospital stay. However, with hospitals continuously trying to optimize their workflows, this crucial one-on-one time with the patient is often not practical.

As a solution, …


Hierarchical Aggregation Of Multidimensional Data For Efficient Data Mining, Safaa Khalil Alwajidi Dec 2020

Hierarchical Aggregation Of Multidimensional Data For Efficient Data Mining, Safaa Khalil Alwajidi

Dissertations

Big data analysis is essential for many smart applications in areas such as connected healthcare, intelligent transportation, human activity recognition, environment, and climate change monitoring. Traditional data mining algorithms do not scale well to big data due to the enormous number of data points and the velocity of their generation. Mining and learning from big data need time and memory efficiency techniques, albeit the cost of possible loss in accuracy. This research focuses on the mining of big data using aggregated data as input. We developed a data structure that is to be used to aggregate data at multiple resolutions. …


A Framework To Support Automatic Certification For Self-Adaptive Systems, Ioannis Nearchou Aug 2020

A Framework To Support Automatic Certification For Self-Adaptive Systems, Ioannis Nearchou

Masters Theses

Presently, cyber-physical systems are increasingly being integrated into societies, from the economic sector to the nuclear energy sector. Cyber-physical systems are systems that combine physical, digital, human, and other components, which operate through physical means and software. When system errors occur, the consequences of malfunction could negatively impact human life. Academic studies have relied on the MAPE-K feedback loop model to develop various system components to satisfy the self-adaptive features, such that violation of the safety requirements can be minimized. Assurance of system requirement satisfaction is argued through an industrial standard form, called an assurance case, which is usually applied …


Application Of Artificial Intelligence And Geographic Information System For Developing Automated Walkability Score, Md Mehedi Hasan Aug 2020

Application Of Artificial Intelligence And Geographic Information System For Developing Automated Walkability Score, Md Mehedi Hasan

Dissertations

Walking is considered as one of the major modes of active transportation, which contributes to the livability of cities. It is highly important to ensure walk friendly sidewalks to promote human physical activities along roads. Over the last two decades, different walk scores were estimated in respect to walkability measures by applying different methods and approaches. However, in the era of big data and machine learning revolution, there is still a gap to measure the composite walkability score in an automated way by applying and quantifying the activityfriendliness of walkable streets. In this study, a street-level automated walkability score was …


A Comprehensive Security Approach On Data Race Detection And Deepfake Defense, Yu Guo Aug 2020

A Comprehensive Security Approach On Data Race Detection And Deepfake Defense, Yu Guo

Dissertations

In the past decades, even the computer techniques have a significant improvement. The topic about security will be never out of date.

To meet with the requirement of computation, the number of CPU cores has changed from single core to multi-cores. At the same time, the multi-thread programs are also proposed to maximize the advantages of multi-core computing power. While even the performance has been improved, but it also brings some new issues which were never happened on sequential programs called current bugs. Data race is a major type of current bugs, it is happened when multiple threads access the …


Resource Optimization In Support Of Iot Applications, Ihab Ahmed Mohammed Aug 2020

Resource Optimization In Support Of Iot Applications, Ihab Ahmed Mohammed

Dissertations

With the rise of the Internet of Things (IoT) and smart communities, managing computation and communication resources required by billions of smart devices becomes a concern. To tackle this problem, we develop algorithms for resource management to ensure better Quality of Service (QoS), safety, and performance. We focus our efforts on three problems.

In the first problem, we studied the strict QoS requirements of applications and differentiated service requirements in different situations of vehicular networks. We propose a generic prioritization and resource management algorithm that can be used to prioritize the processing of received packets in vehicular networks. We formulate …


Maia And Admonita: Mandatory Integrity Control Language And Dynamic Trust Framework For Arbitrary Structured Data, Wassnaa Al-Mawee Aug 2020

Maia And Admonita: Mandatory Integrity Control Language And Dynamic Trust Framework For Arbitrary Structured Data, Wassnaa Al-Mawee

Dissertations

The expansion of attacks against information systems of companies that operate nuclear power stations and other energy facilities in the United States and other countries, are noticeable with potential catastrophic real-world implications. Data integrity is a fundamental component of information security. It refers to the accuracy and the trustworthiness of data or resources. Data integrity within information systems becomes an important factor of security protection as the data becomes more integrated and crucial to decision-making. The security threats brought by human errors whether, malicious or unintentional, such as viruses, hacking, and many other cybersecurity threats, are dangerous and require mandatory …


A Unified Decentralized Trust Framework For Detection Of Iot Device Attacks In Smart Homes, Hussein Salim Qasim Alsheakh Jun 2020

A Unified Decentralized Trust Framework For Detection Of Iot Device Attacks In Smart Homes, Hussein Salim Qasim Alsheakh

Dissertations

Trust in Smart Home technology security is a primary concern for consumers, which can prevent them from adopting smart home services. Such concerns are due to following reasons; (i) nature of IoT devices– which due to their limited computational and resource capabilities, cannot support traditional on-device security controls (ii) any breach to cyber-attacks have an immediate impact on the smart homeowner, compared to traditional cyber-attacks (iii) a large variety of different applications and services under the umbrella of make an overarching security framework for smart homes fundamentally challenging for both providers to offer and owners to manage.

This dissertation offers …


Program Testing And Synthesis By Program Semantics, Lin Cheng Jun 2020

Program Testing And Synthesis By Program Semantics, Lin Cheng

Dissertations

GUIs are event-driven applications where the flow of the program is determined by user actions such as mouse clicks and key presses. GUI testing is a challenging task not only because of the combinatorial explosion in the number of event sequences, but also because of the difficulty to cover the large number of data values. To tackle this problem, we propose two algorithms: GUICat and GUICat2.

GUICat is a white-box GUI testing tool that augments traditional sequence generation techniques with concolic execution. It also has a cloud-based parallel algorithm for mitigating both event sequence explosion and data value explosion, by …


Computer Simulations Of Muscle Driven Undulatory Locomotion, Ye Luo Apr 2020

Computer Simulations Of Muscle Driven Undulatory Locomotion, Ye Luo

Dissertations

A novel muscle driven method is developed to mimic contracting and expanding of muscles, in a fish-like swimming body, which cause its body flapping in the transversal direction and create thrust force to push its body to cruise in the longitudinal direction. The muscle deformation is realized by using the RATTLE constraint algorithm. The turbulent fluids are treated by a multi-relaxation time lattice Boltzmann method with a large eddy simulation. The fish body is dealt with a lattice spring model and interactions between fluids and solid structures are handled by a direct-forcing immersed boundary method. Validations are conducted by comparing …


Cross Language Information Transfer Between Modern Standard Arabic And Its Dialects – A Framework For Automatic Speech Recognition System Language Model, Tiba Zaki Abdulhameed Apr 2020

Cross Language Information Transfer Between Modern Standard Arabic And Its Dialects – A Framework For Automatic Speech Recognition System Language Model, Tiba Zaki Abdulhameed

Dissertations

Significant advances have been made with Modern Standard Arabic (MSA) Automatic Speech Recognition (ASR) applications. Yet, dialectal conversation ASR is still trailing behind due to limited language resources. As is the case in most cultures, the formal Modern Standard Arabic language is not used in daily life. Instead, varieties of regional dialects are spoken, which creates a dire need to address dialect ASR systems. Processing MSA language naturally poses considerable challenges that are passed on to the processing of its derived dialects. In dialects, many words have gradually morphed from MSA pronunciations and at many times have different usages. Also, …