Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 66

Full-Text Articles in Physical Sciences and Mathematics

A Markov Model For Baseball With Applications, Daniel Joseph Ursin Dec 2014

A Markov Model For Baseball With Applications, Daniel Joseph Ursin

Theses and Dissertations

In this work we confirm a Markov chain model of baseball for 2013 Major League Baseball batting data. We describe the transition matrices for individual player data and their use in generating single and nine-inning run distributions for a given lineup. The run distribution is used to calculate the expected number of runs produced by a lineup over nine innings. We discuss batting order optimization heuristics to avoid computation of distributions for the 9! = 362, 880 distinct lineups for 9 players. Finally, we describe an implementation of the algorithms and review their performance against actual game data.


Use Of Secure Messaging By United States Veterans And Significant Others, Claudia S. Derman Dec 2014

Use Of Secure Messaging By United States Veterans And Significant Others, Claudia S. Derman

Theses and Dissertations

ABSTRACT

USE OF SECURE MESSAGING BY UNITED STATES VETERANS AND SIGNIFICANT OTHERS

By

Claudia S. Derman

The University of Wisconsin-Milwaukee, 2014

Under the Supervision of Professor Karen H. Morin, PhD, RN, ANEF, FAAN

The purpose of this study was to describe the topics discussed using secure messaging (SM), the pattern of use of SM, and whether the themes discussed and/or the pattern of use varied based on gender and age of the SM user. Secure messaging is an example of a technology that focuses on patient-centered communication. Secure messaging allows patients to communicate with their clinicians using the Internet and …


Api Usage Verification Through Dataflow Analysis, Kenneth Baptiste Tapsoba Dec 2014

Api Usage Verification Through Dataflow Analysis, Kenneth Baptiste Tapsoba

Theses and Dissertations

Using APIs in a program is often difficult because of the incomplete documentation and the shortage of available examples. To cope with that, we have seen the increase of API checking tools that provide efficient suggestions for API usage. However, most of those checking tools use a pattern-based analysis to determine errors such as misuse of API calls. In this thesis, we introduce a different analysis technique that relies on explicit API state transitions for the analysis of the program. We adopt a static dataflow analysis framework from SOOT to inspect state transitions at each program point.


Mind & Matter: The Discursive Construction Of The Iphone In Apple's Advertising, Nicholas Stratton Dec 2014

Mind & Matter: The Discursive Construction Of The Iphone In Apple's Advertising, Nicholas Stratton

Theses and Dissertations

The widespread adoption of smartphone technology in the contemporary United States requires critical reflection on its role within society. This thesis compares the way Apple's television advertising discourse, from 2007 to 2011, frames the iPhone to consumers with the way Apple's iAd promotional material frames the iPhone to advertisers, and considers what the disparity between these two frameworks says about the still-evolving role of smartphone technology in society. It argues that the disparity between these two frameworks is indicative of a fundamental tension within smartphone technology. This tension is reflected in Apple's ability to discursively construct the iPhone as a …


Three Essays On Opinion Mining Of Social Media Texts, Shuyuan Deng Dec 2014

Three Essays On Opinion Mining Of Social Media Texts, Shuyuan Deng

Theses and Dissertations

This dissertation research is a collection of three essays on opinion mining of social media texts. I explore different theoretical and methodological perspectives in this inquiry. The first essay focuses on improving lexicon-based sentiment classification. I propose a method to automatically generate a sentiment lexicon that incorporates knowledge from both the language domain and the content domain. This method learns word associations from a large unannotated corpus. These associations are used to identify new sentiment words. Using a Twitter data set containing 743,069 tweets related to the stock market, I show that the sentiment lexicons generated using the proposed method …


Text Mining Of Patient Demographics And Diagnoses From Psychiatric Assessments, Eric James Klosterman Dec 2014

Text Mining Of Patient Demographics And Diagnoses From Psychiatric Assessments, Eric James Klosterman

Theses and Dissertations

Automatic extraction of patient demographics and psychiatric diagnoses from clinical notes allows for the collection of patient data on a large scale. This data could be used for a variety of research purposes including outcomes studies or developing clinical trials. However, current research has not yet discussed the automatic extraction of demographics and psychiatric diagnoses in detail. The aim of this study is to apply text mining to extract patient demographics - age, gender, marital status, education level, and admission diagnoses from the psychiatric assessments at a mental health hospital and also assign codes to each category. Gender is coded …


The Bioluminescence Heterozygous Genome Assembler, Jared Calvin Price Dec 2014

The Bioluminescence Heterozygous Genome Assembler, Jared Calvin Price

Theses and Dissertations

High-throughput DNA sequencing technologies are currently revolutionizing the fields of biology and medicine by elucidating the structure and function of the components of life. Modern DNA sequencing machines typically produce relatively short reads of DNA which are then assembled by software in an attempt to produce a representation of the entire genome. Due to the complex structure of all but the smallest genomes, especially the abundant presence of exact or almost exact repeats, all genome assemblers introduce errors into the final sequence and output a relatively large set of contigs instead of full-length chromosomes (a contig is a DNA sequence …


Replication And Knowledge Production In Empirical Software Engineering Research, Jonathan L. Krein Dec 2014

Replication And Knowledge Production In Empirical Software Engineering Research, Jonathan L. Krein

Theses and Dissertations

Although replication is considered an indispensable part of the scientific method in software engineering, few replication studies are published each year. The rate of replication, however, is not surprising given that replication theory in software engineering is immature. Not only are replication taxonomies varied and difficult to reconcile, but opinions on the role of replication contradict. In general, we have no clear sense of how to build knowledge via replication, particularly given the practical realities of our research field. Consequently, most replications in software engineering yield little useful information. In particular, the vast majority of external replications (i.e., replications performed …


Framework To Implement Authentication, Authorization And Secure Communications In A Multiuser Collaborative Cax Environment, Francis Mensah Dec 2014

Framework To Implement Authentication, Authorization And Secure Communications In A Multiuser Collaborative Cax Environment, Francis Mensah

Theses and Dissertations

Computer Aided Design (CAD) applications have historically been based on a single user per application architecture. Although this architecture is still popular to date, it does have several drawbacks. First of all the single user CAD architecture inhibits a concurrent engineering design process where several designers can work on the same model simultaneously. This limitation introduces time inefficiency especially when a project involves geographically dispersed designers. A solution to these drawbacks could be a transition from the traditional single user CAD architecture to a multiuser collaborative architecture. Advances in computer networking technologies, especially relating to the Internet, have provided the …


Classifying And Cataloging Cyber-Security Incidents Within Cyber-Physical Systems, William B. Miller Dec 2014

Classifying And Cataloging Cyber-Security Incidents Within Cyber-Physical Systems, William B. Miller

Theses and Dissertations

In the past, there were perceived delineations between the cyber world and the physical world. We are becoming increasingly aware of the overlap between these two worlds, and the overlap itself is increasing. The overlap between these two worlds is known as cyber-physical systems. There have been several incidents involving cyber-physical systems and the number of these incidents is increasing dramatically. In the past there has been no effort to identify methods for describing these incidents in the unique context of cyber-physical systems. This research provides a taxonomy for classifying these incidents that focuses on cross domain, impact oriented analysis. …


Using Random Forest In The Field Of Metabolomics, Curtis White Nov 2014

Using Random Forest In The Field Of Metabolomics, Curtis White

Theses and Dissertations

Metabolomics is the science of comprehensive evaluation of changes in the metabolome with a goal to elucidate underlying biological mechanisms of a living system. There is an opinion in the field of metabolomics, the study of the set of metabolites present within an organism, cell, or tissue, that the future development of the field is contingent upon two factors. One of the factors is the advancement of analytical instrumentation, and the other is developing data mining methodologies for extracting meaningful and interpretable experimental results. There are many different types of data mining methodologies, but the undertaking of selecting a particular …


A Privacy Risk Scoring Framework For Mobile, Jedidiah Spencer Montgomery Nov 2014

A Privacy Risk Scoring Framework For Mobile, Jedidiah Spencer Montgomery

Theses and Dissertations

Protecting personal privacy has become an increasingly important issue as computers become a more integral part of everyday life. As people begin to trust more personal information to be contained in computers they will question if that information is safe from unwanted intrusion and access. With the rise of mobile devices (e.g., smartphones, tablets, wearable technology) users have enjoyed the convenience and availability of stored personal information in mobile devices, both in the operating system and within applications.For a mobile application to function correctly it needs permission or privileges to access and control various resources and controls on the mobile …


Using Variations Of Shape And Appearance In Alignment Methods For Classifying Human Actions, Sultan Mohammad Almotairi Nov 2014

Using Variations Of Shape And Appearance In Alignment Methods For Classifying Human Actions, Sultan Mohammad Almotairi

Theses and Dissertations

In this dissertation, we address the problem of recognizing human-action from videos. The recognition aims at recovering action information from the image sequences using different features such as variations of the human shape. Approaches based on such features often use sequence-alignment methods. We propose two novel methods for human-action recognition. We also propose an elliptical-shaped band for the Dynamic Time Warping (DTW) that provides a good compromise between alignment accuracy and computational speed. First, we study the applicability of the pairwise shape-similarity measurements for human-action recognition. Since action can be seen as a sequence of shapes of silhouette poses, there …


Scalable Detection And Extraction Of Data In Lists In Ocred Text For Ontology Population Using Semi-Supervised And Unsupervised Active Wrapper Induction, Thomas L. Packer Oct 2014

Scalable Detection And Extraction Of Data In Lists In Ocred Text For Ontology Population Using Semi-Supervised And Unsupervised Active Wrapper Induction, Thomas L. Packer

Theses and Dissertations

Lists of records in machine-printed documents contain much useful information. As one example, the thousands of family history books scanned, OCRed, and placed on-line by FamilySearch.org probably contain hundreds of millions of fact assertions about people, places, family relationships, and life events. Data like this cannot be fully utilized until a person or process locates the data in the document text, extracts it, and structures it with respect to an ontology or database schema. Yet, in the family history industry and other industries, data in lists goes largely unused because no known approach adequately addresses all of the costs, challenges, …


Arimaa: Developing A Higher Ranked Fall Back Move Generator Using A Relational Database, Patrick Mckee Sep 2014

Arimaa: Developing A Higher Ranked Fall Back Move Generator Using A Relational Database, Patrick Mckee

Theses and Dissertations

Our approach to playing the game of Arimaa understands that the game was created to showcase the limits of brute force computing power. Using a relational database, we will be able to view similar situations that have already been played out, inventory a number of suitable reactions and make the best move given a number of attributes. This results in us making a decision that can theoretically result in a win, and hopefully will. Measurable positive results have been procured specifically from the area of concentration component of the research. In the area of concentration component we target a specific …


Intelligent Indexing: A Semi-Automated, Trainable System For Field Labeling, Robert T. Clawson Sep 2014

Intelligent Indexing: A Semi-Automated, Trainable System For Field Labeling, Robert T. Clawson

Theses and Dissertations

We present Intelligent Indexing: a general, scalable, collaborative approach to indexing and transcription of non-machine-readable documents that exploits visual consensus and group labeling while harnessing human recognition and domain expertise. In our system, indexers work directly on the page, and with minimal context switching can navigate the page, enter labels, and interact with the recognition engine. Interaction with the recognition engine occurs through preview windows that allow the indexer to quickly verify and correct recommendations. This interaction is far superior to conventional, tedious, inefficient post-correction and editing. Intelligent Indexing is a trainable system that improves over time and can provide …


Measuring Human Workload In Unmanned Aerial Vehicles, Timothy J. Gledhill Sep 2014

Measuring Human Workload In Unmanned Aerial Vehicles, Timothy J. Gledhill

Theses and Dissertations

Unmanned aerial systems (UASs) often require multiple human operators fulfilling diverse roles for safe and correct operation. Reliably designing the human interaction, autonomy, and decision making aspects of these systems requires the use of modeling. We propose a conceptual model that models human machine interaction systems as a group of actors connected by a network of communication channels. We present a simulation framework implemented in Java, with an optional XML model parser that can be analyzed using the Java Pathfinder (JPF) model checker. We propose two human workload metrics based on a taxonomy extracted from the relevant literature. Using the …


A Method To Develop Neck Injury Criteria To Aid Design And Test Of Escape Systems Incorporating Helmet Mounted Displays, Jeffrey C. Parr Sep 2014

A Method To Develop Neck Injury Criteria To Aid Design And Test Of Escape Systems Incorporating Helmet Mounted Displays, Jeffrey C. Parr

Theses and Dissertations

HMDs are becoming common human-machine interface equipment in manned military flight, but introducing this equipment into the overall aircraft escape system poses new and significant system design, development, and test concerns. Although HMDs add capabilities, which improve operator performance, the increased capability is often accompanied by increased head supported mass. The increased mass can amplify the risk of pilot neck injury during ejection when compared to lighter legacy helmets. Currently no adequate USAF neck injury criteria exist to effectively guide the requirements, design, and test of escape systems for pilots with HMDs. This research effort presents a novel method to …


Browser-Based Manual Encryption, Yuanzheng Song Aug 2014

Browser-Based Manual Encryption, Yuanzheng Song

Theses and Dissertations

Billions of web-based email and chat messages are sent over the Internet every day. However, very few service providers support end-to-end privacy protection. While providing security for these messages is technically feasible, usability remains a challenge in this field. Recent research attempts to hide security details like key management and encryption in order to make the system more usable. However usability studies demonstrated that hiding these details may confuse the user and contribute to mistakes (e.g., sending out an email in plaintext when the user thought it would be encrypted). In an effort to increase trust and eliminate mistakes, this …


Complex Network Analysis For Scientific Collaboration Prediction And Biological Hypothesis Generation, Qing Zhang Aug 2014

Complex Network Analysis For Scientific Collaboration Prediction And Biological Hypothesis Generation, Qing Zhang

Theses and Dissertations

With the rapid development of digitalized literature, more and more knowledge has been discovered by computational approaches. This thesis addresses the problem of link prediction in co-authorship networks and protein--protein interaction networks derived from the literature. These networks (and most other types of networks) are growing over time and we assume that a machine can learn from past link creations by examining the network status at the time of their creation. Our goal is to create a computationally efficient approach to recommend new links for a node in a network (e.g., new collaborations in co-authorship networks and new interactions in …


#Mplp: A Comparison Of Domain Novice And Expert User-Generated Tags In A Minimally Processed Digital Archive, Edward A. Benoit Iii Aug 2014

#Mplp: A Comparison Of Domain Novice And Expert User-Generated Tags In A Minimally Processed Digital Archive, Edward A. Benoit Iii

Theses and Dissertations

The high costs of creating and maintaining digital archives precluded many archives from providing users with digital content or increasing the amount of digitized materials. Studies have shown users increasingly demand immediate online access to archival materials with detailed descriptions (access points). The adoption of minimal processing to digital archives limits the access points at the folder or series level rather than the item-level description users' desire. User-generated content such as tags, could supplement the minimally processed metadata, though users are reluctant to trust or use unmediated tags. This dissertation project explores the potential for controlling/mediating the supplemental metadata from …


A Computer Learning Environment For Novice Java Programmers That Supports Cognitive Load Reducing Adaptations And Dynamic Visualizations Of Computer Memory, James Stephen Williams Aug 2014

A Computer Learning Environment For Novice Java Programmers That Supports Cognitive Load Reducing Adaptations And Dynamic Visualizations Of Computer Memory, James Stephen Williams

Theses and Dissertations

Learning to program a computer is difficult for many. The Learning Edge Momentum hypothesis suggests that the difficulty may be due to the tightly integrated nature of programming concepts and adapting the way curriculum is offered may have a significant influence on the outcomes. We investigate applying cognitive load reducing methods to instruction of the introductory programming concepts of declaration, assignment and sequence, using a new learning environment that an instructor can adapt for a specific example or that a student can personalize for amount and modality of content provided. Our study has three learning surveys. Each learning survey has …


Communicating Affective Meaning From Software To Wetware Through The Medium Of Digital Art, R David Norton Aug 2014

Communicating Affective Meaning From Software To Wetware Through The Medium Of Digital Art, R David Norton

Theses and Dissertations

Computational creativity is a new and developing field of artificial intelligence concerned with computational systems that either autonomously produce original and functional products, or that augment the ability of humans to do so. As the role of computers in our daily lives is continuing to expand, the need for such systems is becoming increasingly important. We introduce and document the development of a new “creative” system, called DARCI (Digital ARtist Communicating Intention), that is designed to autonomously create novel artistic images that convey linguistic concepts to the viewer. Within the scope of this work, the system becomes capable of creating …


Using A Model Of Temporal Latency To Improve Supervisory Control Of Human-Robot Teams, Kyle Lee Blatter Jul 2014

Using A Model Of Temporal Latency To Improve Supervisory Control Of Human-Robot Teams, Kyle Lee Blatter

Theses and Dissertations

When humans and remote robots work together on a team, the robots always interact with a human supervisor, even if the interaction is limited to occasional reports. Distracting a human with robotic interactions doesn't pose a problem so long as the inclusion of robots increases the team's overall effectiveness. Unfortunately, increasing the supervisor's cognitive load may decrease the team's sustainable performance to the point where robotic agents are more a liability than an asset. Present approaches resolve this problem with adaptive autonomy, where a robot changes its level of autonomy based on the supervisor's cognitive load. This thesis proposes to …


Nderlidhja Mes Rrjetit Fiks Dhe Rrjetit Mobil, Saranda Xhokli Jul 2014

Nderlidhja Mes Rrjetit Fiks Dhe Rrjetit Mobil, Saranda Xhokli

Theses and Dissertations

Qëllimi i punimit tim është paraqitja e ndërlidhjes të rrjetit fiks dhe rrjetit mobil të telekomit të Kosovës, teknologji të cilat bashkjetojnë për mëse 5 vite dhe I japin shërbime abonentëve, duke përfshirë organizimit të shtyllës kurrizore të rrjetit transmetues të Kosovës i cili zhvillohet nëpërmjet kabllit optik, sistemti transmetues PDH/SDH në skaje të të cilave janë të lidhura paisjet komutuese të paketëve IP të quajtura SOFT SWICH i cili është i vendosur në qendër dhe paraqet boshtin kurrizor të telekomit si dhe nderlidhjen me rrjetin e telefonisë mobile GSM 2.75 dhe në parim paraqet shpirtin komunikues i ndërlidhur në …


Slice—N—Dice Algorithm Implementation In Jpf, Eric S. Noonan Jul 2014

Slice—N—Dice Algorithm Implementation In Jpf, Eric S. Noonan

Theses and Dissertations

This work deals with evaluating the effectiveness of a new verification algorithm called slice--n--dice. In order to evaluate the effectiveness of slice--n--dice, a vector clock POR was implemented to compare it against. The first paper contained in this work was published in ACM SIGSOFT Software Engineering Notes and discusses the implementation of the vector clock POR. The results of this paper show the vector clock POR performing better than the POR in Java Pathfinder by at least a factor of two. The second paper discusses the implementation of slice--n--dice and compares it against other verification techniques. The results show that …


Autocompletion Without Static Typing, Nicholas Mckay Shelley Jun 2014

Autocompletion Without Static Typing, Nicholas Mckay Shelley

Theses and Dissertations

Code completion systems act both as a way to decrease typing and as a way to easily access documentation, both implicit and explicit. The former is typically done by completing known variable or function names, while the latter is done by providing a list of possible completions or by providing convenient views of or access to documentation. Because static type information makes these goals possible and feasible for qualifying languages, many improvements to completion systems are focused on improving the order of results or trimming less-valuable results. It follows that almost all validation techniques for this work have focused on …


Improved Computer-Generated Simulation Using Motion Capture Data, Seth A. Brunner Jun 2014

Improved Computer-Generated Simulation Using Motion Capture Data, Seth A. Brunner

Theses and Dissertations

Ever since the first use of crowds in films and videogames there has been an interest in larger, more efficient and more realistic simulations of crowds. Most crowd simulation algorithms are able to satisfy the viewer from a distance but when inspected from close up the flaws in the individual agent's movements become noticeable. One of the bigger challenges faced in crowd simulation is finding a solution that models the actual movement of an individual in a crowd. This paper simulates a more realistic crowd by using individual motion capture data as well as traditional crowd control techniques to reach …


Towards An Automated System For Evaluation Of Visualizations, Douglas Taggart Jun 2014

Towards An Automated System For Evaluation Of Visualizations, Douglas Taggart

Theses and Dissertations

The Information Visualization field focuses on the visualization of abstract data, and with the growing interest in big data analysis, the need for analyzing complex datasets is nowadays highly relevant. With the growing amount and diversity of these datasets new and exciting ways to visualize them are being developed. However, being able to thoroughly test and evaluate the effectiveness of these new visualization techniques is an arduous manual process. Moreover, different researchers hold different opinions on how to thoroughly evaluate a new visualization method. A step towards automating the process of evaluation of visualizations, called the Framework for the Evaluation …


Necessary And Sufficient Conditions For State-Space Network Realization, Philip E. Paré Jr. Jun 2014

Necessary And Sufficient Conditions For State-Space Network Realization, Philip E. Paré Jr.

Theses and Dissertations

This thesis presents the formulation and solution of a new problem in systems and control theory, called the Network Realization Problem. Its relationship to other problems, such as State Realization and Structural Identifiability, is shown. The motivation for this work is the desire to completely quantify the conditions for transitioning between different mathematical representations of linear time-invariant systems. The solution to this problem is useful for theorists because it lays a foundation for quantifying the information cost of identifying a system's complete network structure from the transfer function.