Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Computer Science (11)
- Cs0 (8)
- Cs04all (8)
- Cs4all (8)
- Python (7)
-
- Bioinformatics (5)
- CS0 (5)
- CS04ALL (5)
- Computer science (4)
- Gene-sequencing file formats (4)
- Perl (4)
- Data analysis (3)
- Agile Project Management (2)
- Alignment (2)
- Automatic parallelization (2)
- CIA Factbook (2)
- Computational biology (2)
- Data science (2)
- Deep Learning (2)
- Functions (2)
- Global (2)
- Graph entropy (2)
- INDELs (2)
- Internet of Things (2)
- Java 8 (2)
- LEGO EV3 Robot (2)
- Linux file system (2)
- Lists (2)
- Machine Learning (2)
- Mobile Application & Product Development (2)
- Publication
- Publication Type
- File Type
Articles 1 - 30 of 93
Full-Text Articles in Physical Sciences and Mathematics
The Privacy Preserving Framework With Virtual Ring And Identity-Based Cryptography For Smart Grid, Leonard Sutanto
The Privacy Preserving Framework With Virtual Ring And Identity-Based Cryptography For Smart Grid, Leonard Sutanto
Publications and Research
One of the main challenges in the smart grid is how to efficiently manage the high-volume data from smart meters and sensors and preserve the privacy from the consumption data to avoid potential attacks (e.g., identity theft) for the involved prosumers, retail electricity providers and other clusters of distributed energy resources. This poster proposes a two-layer framework with the cloud computing infrastructure. The virtual ring and identity-based cryptography are utilized in each layer to preserve privacy efficiently. The methods of the virtual ring and identity-based cryptography are introduced. The purposes and needs are discussed at the end of this poster.
A Note On Graphs With Prescribed Orbit Structure, Abbe Mowshowitz, Matthias Dehmer, Frank Emmert-Streib
A Note On Graphs With Prescribed Orbit Structure, Abbe Mowshowitz, Matthias Dehmer, Frank Emmert-Streib
Publications and Research
No abstract provided.
Csci49379: Intro To Blockchain (Syllabus), Wendy Mock, Nyc Tech-In-Residence Corps
Csci49379: Intro To Blockchain (Syllabus), Wendy Mock, Nyc Tech-In-Residence Corps
Open Educational Resources
Syllabus for the course: CSCI 49397 - Blockchain. Delivered at Hunter College in Fall 2019 by Wendy Mock as part of the Tech-in-Residence Corps program.
Amazon Alexa + Linked Open Data: Theorizing Concerning Relationships Between (Surveillant) Smart-Home Voice Assistants And Linked Open Data, Michelle Nitto
Amazon Alexa + Linked Open Data: Theorizing Concerning Relationships Between (Surveillant) Smart-Home Voice Assistants And Linked Open Data, Michelle Nitto
Publications and Research
No abstract provided.
Semi-Supervised Regression With Generative Adversarial Networks Using Minimal Labeled Data, Greg Olmschenk
Semi-Supervised Regression With Generative Adversarial Networks Using Minimal Labeled Data, Greg Olmschenk
Dissertations, Theses, and Capstone Projects
This work studies the generalization of semi-supervised generative adversarial networks (GANs) to regression tasks. A novel feature layer contrasting optimization function, in conjunction with a feature matching optimization, allows the adversarial network to learn from unannotated data and thereby reduce the number of labels required to train a predictive network. An analysis of simulated training conditions is performed to explore the capabilities and limitations of the method. In concert with the semi-supervised regression GANs, an improved label topology and upsampling technique for multi-target regression tasks are shown to reduce data requirements. Improvements are demonstrated on a wide variety of vision …
Do It Like A Syntactician: Using Binary Gramaticality Judgements To Train Sentence Encoders And Assess Their Sensitivity To Syntactic Structure, Pablo Gonzalez Martinez
Do It Like A Syntactician: Using Binary Gramaticality Judgements To Train Sentence Encoders And Assess Their Sensitivity To Syntactic Structure, Pablo Gonzalez Martinez
Dissertations, Theses, and Capstone Projects
The binary nature of grammaticality judgments and their use to access the structure of syntax are a staple of modern linguistics. However, computational models of natural language rarely make use of grammaticality in their training or application. Furthermore, developments in modern neural NLP have produced a myriad of methods that push the baselines in many complex tasks, but those methods are typically not evaluated from a linguistic perspective. In this dissertation I use grammaticality judgements with artificially generated ungrammatical sentences to assess the performance of several neural encoders and propose them as a suitable training target to make models learn …
An Evolutionary Perspective On Foraging Strategies And Group Dynamics In Bio-Social Inspired Cognitive Radio Networks, Anna Wisniewska
An Evolutionary Perspective On Foraging Strategies And Group Dynamics In Bio-Social Inspired Cognitive Radio Networks, Anna Wisniewska
Dissertations, Theses, and Capstone Projects
Saturation of wireless channels is inevitable as the number of wireless devices grows exponentially in an environment of limited radio spectrum capacity. Cognitive radio technology has been proposed to relieve overcrowded spectrum resources by allowing licensed channels to be opportunistically accessed by unlicensed users (cognitive radio devices) during periods of time when the license holder (primary user) is absent from its channel. Uncoordinated competition over limited resources among cognitive radio devices poses complex co-existence challenges. We propose novel bio-social inspired behavioral models and map out plausible evolutionary trajectories of co-use strategies in the cognitive radio ecosystem. By drawing parallels between …
Deep Machine Learning Techniques For The Detection And Classification Of Sperm Whale Bioacoustics, Peter C. Bermant, Michael M. Bronstein, Robert J. Wood, Shane Gero, David F. Gruber
Deep Machine Learning Techniques For The Detection And Classification Of Sperm Whale Bioacoustics, Peter C. Bermant, Michael M. Bronstein, Robert J. Wood, Shane Gero, David F. Gruber
Publications and Research
We implemented Machine Learning (ML) techniques to advance the study of sperm whale (Physeter macrocephalus) bioacoustics. This entailed employing Convolutional Neural Networks (CNNs) to construct an echolocation click detector designed to classify spectrograms generated from sperm whale acoustic data according to the presence or absence of a click. The click detector achieved 99.5% accuracy in classifying 650 spectrograms. The successful application of CNNs to clicks reveals the potential of future studies to train CNN-based architectures to extract finer-scale details from cetacean spectrograms. Long short-term memory and gated recurrent unit recurrent neural networks were trained to perform classification tasks, including (1) …
Going Big: A Large-Scale Study On What Big Data Developers Ask, Mehdi Bagherzadeh, Raffi T. Khatchadourian
Going Big: A Large-Scale Study On What Big Data Developers Ask, Mehdi Bagherzadeh, Raffi T. Khatchadourian
Publications and Research
Software developers are increasingly required to write big data code. However, they find big data software development challenging. To help these developers it is necessary to understand big data topics that they are interested in and the difficulty of finding answers for questions in these topics. In this work, we conduct a large-scale study on Stackoverflow to understand the interest and difficulties of big data developers. To conduct the study, we develop a set of big data tags to extract big data posts from Stackoverflow; use topic modeling to group these posts into big data topics; group similar topics into …
A Note On Distance-Based Entropy Of Dendrimers, Modjtaba Ghorbani, Matthias Dehmer, Samaneh Zangi, Abbe Mowshowitz, Frank Emmert-Streib
A Note On Distance-Based Entropy Of Dendrimers, Modjtaba Ghorbani, Matthias Dehmer, Samaneh Zangi, Abbe Mowshowitz, Frank Emmert-Streib
Publications and Research
This paper introduces a variant of entropy measures based on vertex eccentricity and applies it to all graphs representing the isomers of octane. Taking into account the vertex degree as well (degree-ecc-entropy), we find a good correlation with the acentric factor of octane isomers. In particular, we compute the degree-ecc-entropy for three classes of dendrimer graphs.
An Optimized Encoding Algorithm For Systematic Polar Codes, Xiumin Wang, Zhihong Zhang, Jun Li, Yu Wang, Haiyan Cao, Zhengquan Li, Liang Shan
An Optimized Encoding Algorithm For Systematic Polar Codes, Xiumin Wang, Zhihong Zhang, Jun Li, Yu Wang, Haiyan Cao, Zhengquan Li, Liang Shan
Publications and Research
Many different encoding algorithms for systematic polar codes (SPC) have been introduced since SPC was proposed in 2011. However, the number of the computing units of exclusive OR (XOR) has not been optimized yet. According to an iterative property of the generator matrix and particular lower triangular structure of the matrix, we propose an optimized encoding algorithm (OEA) of SPC that can reduce the number of XOR computing units compared with existing non-recursive algorithms. We also prove that this property of the generator matrix could extend to different code lengths and rates of the polar codes. Through the matrix segmentation …
Safe Automated Refactoring For Intelligent Parallelization Of Java 8 Streams, Raffi T. Khatchadourian, Yiming Tang, Mehdi Bagherzadeh, Syed Ahmed
Safe Automated Refactoring For Intelligent Parallelization Of Java 8 Streams, Raffi T. Khatchadourian, Yiming Tang, Mehdi Bagherzadeh, Syed Ahmed
Publications and Research
Streaming APIs are becoming more pervasive in mainstream Object-Oriented programming languages and platforms. For example, the Stream API introduced in Java 8 allows for functional-like, MapReduce-style operations in processing both finite, e.g., collections, and infinite data structures. However, using this API efficiently involves subtle considerations such as determining when it is best for stream operations to run in parallel, when running operations in parallel can be less efficient, and when it is safe to run in parallel due to possible lambda expression side-effects. Also, streams may not run all operations in parallel depending on particular collectors used in reductions. In …
Weaving The Dark Web: Legitimacy On Freenet, Tor, And I2p, John Schriner
Weaving The Dark Web: Legitimacy On Freenet, Tor, And I2p, John Schriner
Publications and Research
This is a book review of Robert W. Gehl's Weaving the Dark Web: Legitimacy on Freenet, Tor, and I2P (2018). The book explores these anonymity networks and the concept of legitimacy throughout. Using a multidisciplinary approach and interviews with network-builders and users, Gehl helps to demystify the dark web and critically examine these networks and technologies.
Enhancing The Study Of Art History Utilizing Computational Thinking: Focus, Abstraction In Art (Modern), Douglas L. Moody, Sandra Cheng
Enhancing The Study Of Art History Utilizing Computational Thinking: Focus, Abstraction In Art (Modern), Douglas L. Moody, Sandra Cheng
Open Educational Resources
No abstract provided.
Cs+Sociology: Global Inequality Lab 2, Elin Waring, Janet Michello
Cs+Sociology: Global Inequality Lab 2, Elin Waring, Janet Michello
Open Educational Resources
These materials include background for the instructor and a lab that engages student in an analysis of global inequality while learning and using the R language (a programming language for statistics). Students ultimately write a function to access country level data from the CIA World Factbook.
Cs+Sociology: Global Inequality Lab 1, Elin Waring, Janet Michello
Cs+Sociology: Global Inequality Lab 1, Elin Waring, Janet Michello
Open Educational Resources
These materials include background for the instructor and a lab that engages student in an analysis of global inequality while learning and using the R language (a programming language for statistics). Students obtain data on the US and two other countries (one more developed and one less developed).
Safe Automated Refactoring For Intelligent Parallelization Of Java 8 Streams, Raffi T. Khatchadourian, Yiming Tang, Mehdi Bagherzadeh, Syed Ahmed
Safe Automated Refactoring For Intelligent Parallelization Of Java 8 Streams, Raffi T. Khatchadourian, Yiming Tang, Mehdi Bagherzadeh, Syed Ahmed
Publications and Research
Streaming APIs are becoming more pervasive in mainstream Object-Oriented programming languages. For example, the Stream API introduced in Java 8 allows for functional-like, MapReduce-style operations in processing both finite and infinite data structures. However, using this API efficiently involves subtle considerations like determining when it is best for stream operations to run in parallel, when running operations in parallel can be less efficient, and when it is safe to run in parallel due to possible lambda expression side-effects. In this paper, we present an automated refactoring approach that assists developers in writing efficient stream code in a semantics-preserving fashion. The …
Arecibo Message, Joshua P. Tan
Arecibo Message, Joshua P. Tan
Open Educational Resources
This two week assignment asks students to interpret and analyze the 1974 Arecibo Message sent by Drake and Sagan. Week 1 introduces the concepts behind the construction of the message and engages with a critical analysis of the architecture and the contents of the message. Week 2 asks students to develop software in a Jupyter Notebook (available for free from the Anaconda Python Distribution) to interpret messages that were similar to those produced by Drake and Sagan.
Mapping In The Humanities: Gis Lessons For Poets, Historians, And Scientists, Emily W. Fairey
Mapping In The Humanities: Gis Lessons For Poets, Historians, And Scientists, Emily W. Fairey
Open Educational Resources
User-friendly Geographic Information Systems (GIS) is the common thread of this collection of presentations, and activities with full lesson plans. The first section of the site contains an overview of cartography, the art of creating maps, and then looks at historical mapping platforms like Hypercities and Donald Rumsey Historical Mapping Project. In the next section Google Earth Desktop Pro is introduced, with lessons and activities on the basics of GE such as pins, paths, and kml files, as well as a more complex activity on "georeferencing" an historic map over Google Earth imagery. The final section deals with ARCGIS Online …
Module: Robot Senses, Mohammad Azhar
Module: Robot Senses, Mohammad Azhar
Open Educational Resources
Learning Objectives:
Students will be able to:
-
Describe the basics of Sensors
-
Learn how to program the LEGO Robot to make decision using touch sensors
Module: Robot Locomotion Mini Hackathon, Mohammad Azhar
Module: Robot Locomotion Mini Hackathon, Mohammad Azhar
Open Educational Resources
Learning Objectives:
Students will be able to:
-
Describe the basics of Robots.
-
Describe basic hardware and software of the LEGO Robot.
-
Write sequential code for LEGO Robot to move.
On Properties Of Distance-Based Entropies On Fullerene Graphs, Modjtaba Ghorbani, Matthias Dehmer, Mina Rajabi-Parsa, Abbe Mowshowitz, Frank Emmert-Streib
On Properties Of Distance-Based Entropies On Fullerene Graphs, Modjtaba Ghorbani, Matthias Dehmer, Mina Rajabi-Parsa, Abbe Mowshowitz, Frank Emmert-Streib
Publications and Research
In this paper, we study several distance-based entropy measures on fullerene graphs. These include the topological information content of a graph Ia(G), a degree-based entropy measure, the eccentric-entropy Ifs(G), the Hosoya entropy H(G) and, finally, the radial centric information entropy Hecc. We compare these measures on two infinite classes of fullerene graphs denoted by A12n+4 and B12n+6. We have chosen these measures as they are easily computable and capture meaningful graph properties. To demonstrate the utility of these measures, we investigate the Pearson correlation between them on the fullerene graphs.
Designing Computational Biology Workflows With Perl - Part 1, Esma Yildirim
Designing Computational Biology Workflows With Perl - Part 1, Esma Yildirim
Open Educational Resources
This material introduces Linux File System structures and demonstrates how to use commands to communicate with the operating system through a Terminal program. Basic program structures and system() function of Perl are discussed. A brief introduction to gene-sequencing terminology and file formats are given.
Designing Computational Biology Workflows With Perl - Part 1, Esma Yildirim
Designing Computational Biology Workflows With Perl - Part 1, Esma Yildirim
Open Educational Resources
This material introduces the AWS console interface, describes how to create an instance on AWS with the VMI provided, connect to that machine instance using the SSH protocol. Once connected, it requires the students to write a script to enter the data folder, which includes gene-sequencing input files and print the first five line of each file remotely. The same exercise can be applied if the VMI is installed on a local machine using virtualization software (e.g. Oracle VirtualBox). In this case, the Terminal program of the VMI can be used to do the exercise.
Designing Computational Biology Workflows With Perl - Part 2, Esma Yildirim
Designing Computational Biology Workflows With Perl - Part 2, Esma Yildirim
Open Educational Resources
This material introduces the AWS console interface, describes how to create an instance on AWS with the VMI provided and connect to that machine instance using the SSH protocol. Once connected, it requires the students to write a script to automate the tasks to create VCF files from two different sample genomes belonging to E.coli microorganisms by using the FASTA and FASTQ files in the input folder of the virtual machine. The same exercise can be applied if the VMI is installed on a local machine using virtualization software (e.g. Oracle VirtualBox). In this case, the Terminal program of the …
Designing Computational Biology Workflows With Perl - Part 2, Esma Yildirim
Designing Computational Biology Workflows With Perl - Part 2, Esma Yildirim
Open Educational Resources
This material briefly reintroduces the DNA double Helix structure, explains SNP and INDEL mutations in genes and describes FASTA, FASTQ, BAM and VCF file formats. It also explains the index creation, alignment, sorting, marking duplicates and variant calling steps of a simple preprocessing workflow and how to write a Perl script to automate the execution of these steps on a Virtual Machine Image.
Designing Computational Biology Workflows With Perl - Part 1 & 2, Esma Yildirim
Designing Computational Biology Workflows With Perl - Part 1 & 2, Esma Yildirim
Open Educational Resources
This manual guides the instructor to combine the partial files of the virtual machine image and construct sequencer.ova file. It is accompanied by the partial files of the virtual machine image.
Understanding Water Consumption And Energy Trends In New York City, Wen Yong Huang, Johann Thiel
Understanding Water Consumption And Energy Trends In New York City, Wen Yong Huang, Johann Thiel
Publications and Research
In this study, we will be using the NYC Open Data website to examine publicly available data sets on water and energy consumption in New York City. In particular, we will use various scientific programming and machine learning modules in Python to analyze and visualize trends in water and energy usage within the five boroughs.
Online Learning And Planning For Crowd-Aware Service Robot Navigation, Anoop Aroor
Online Learning And Planning For Crowd-Aware Service Robot Navigation, Anoop Aroor
Dissertations, Theses, and Capstone Projects
Mobile service robots are increasingly used in indoor environments (e.g., shopping malls or museums) among large crowds of people. To efficiently navigate in these environments, such a robot should be able to exhibit a variety of behaviors. It should avoid crowded areas, and not oppose the flow of the crowd. It should be able to identify and avoid specific crowds that result in additional delays (e.g., children in a particular area might slow down the robot). and to seek out a crowd if its task requires it to interact with as many people as possible. These behaviors require the ability …
Analysis Of A Group Of Automorphisms Of A Free Group As A Platform For Conjugacy-Based Group Cryptography, Pavel Shostak
Analysis Of A Group Of Automorphisms Of A Free Group As A Platform For Conjugacy-Based Group Cryptography, Pavel Shostak
Dissertations, Theses, and Capstone Projects
Let F be a finitely generated free group and Aut(F) its group of automorphisms.
In this monograph we discuss potential uses of Aut(F) in group-based cryptography.
Our main focus is on using Aut(F) as a platform group for the Anshel-Anshel-Goldfeld protocol, Ko-Lee protocol, and other protocols based on different versions of the conjugacy search problem or decomposition problem, such as Shpilrain-Ushakov protocol.
We attack the Anshel-Anshel-Goldfeld and Ko-Lee protocols by adapting the existing types of the length-based attack to the specifics of Aut(F). We also present our own version of the length-based attack that significantly increases the attack' success …