Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 93

Full-Text Articles in Physical Sciences and Mathematics

The Privacy Preserving Framework With Virtual Ring And Identity-Based Cryptography For Smart Grid, Leonard Sutanto Dec 2019

The Privacy Preserving Framework With Virtual Ring And Identity-Based Cryptography For Smart Grid, Leonard Sutanto

Publications and Research

One of the main challenges in the smart grid is how to efficiently manage the high-volume data from smart meters and sensors and preserve the privacy from the consumption data to avoid potential attacks (e.g., identity theft) for the involved prosumers, retail electricity providers and other clusters of distributed energy resources. This poster proposes a two-layer framework with the cloud computing infrastructure. The virtual ring and identity-based cryptography are utilized in each layer to preserve privacy efficiently. The methods of the virtual ring and identity-based cryptography are introduced. The purposes and needs are discussed at the end of this poster.


A Note On Graphs With Prescribed Orbit Structure, Abbe Mowshowitz, Matthias Dehmer, Frank Emmert-Streib Nov 2019

A Note On Graphs With Prescribed Orbit Structure, Abbe Mowshowitz, Matthias Dehmer, Frank Emmert-Streib

Publications and Research

No abstract provided.


Csci49379: Intro To Blockchain (Syllabus), Wendy Mock, Nyc Tech-In-Residence Corps Oct 2019

Csci49379: Intro To Blockchain (Syllabus), Wendy Mock, Nyc Tech-In-Residence Corps

Open Educational Resources

Syllabus for the course: CSCI 49397 - Blockchain. Delivered at Hunter College in Fall 2019 by Wendy Mock as part of the Tech-in-Residence Corps program.


Amazon Alexa + Linked Open Data: Theorizing Concerning Relationships Between (Surveillant) Smart-Home Voice Assistants And Linked Open Data, Michelle Nitto Sep 2019

Amazon Alexa + Linked Open Data: Theorizing Concerning Relationships Between (Surveillant) Smart-Home Voice Assistants And Linked Open Data, Michelle Nitto

Publications and Research

No abstract provided.


Semi-Supervised Regression With Generative Adversarial Networks Using Minimal Labeled Data, Greg Olmschenk Sep 2019

Semi-Supervised Regression With Generative Adversarial Networks Using Minimal Labeled Data, Greg Olmschenk

Dissertations, Theses, and Capstone Projects

This work studies the generalization of semi-supervised generative adversarial networks (GANs) to regression tasks. A novel feature layer contrasting optimization function, in conjunction with a feature matching optimization, allows the adversarial network to learn from unannotated data and thereby reduce the number of labels required to train a predictive network. An analysis of simulated training conditions is performed to explore the capabilities and limitations of the method. In concert with the semi-supervised regression GANs, an improved label topology and upsampling technique for multi-target regression tasks are shown to reduce data requirements. Improvements are demonstrated on a wide variety of vision …


Do It Like A Syntactician: Using Binary Gramaticality Judgements To Train Sentence Encoders And Assess Their Sensitivity To Syntactic Structure, Pablo Gonzalez Martinez Sep 2019

Do It Like A Syntactician: Using Binary Gramaticality Judgements To Train Sentence Encoders And Assess Their Sensitivity To Syntactic Structure, Pablo Gonzalez Martinez

Dissertations, Theses, and Capstone Projects

The binary nature of grammaticality judgments and their use to access the structure of syntax are a staple of modern linguistics. However, computational models of natural language rarely make use of grammaticality in their training or application. Furthermore, developments in modern neural NLP have produced a myriad of methods that push the baselines in many complex tasks, but those methods are typically not evaluated from a linguistic perspective. In this dissertation I use grammaticality judgements with artificially generated ungrammatical sentences to assess the performance of several neural encoders and propose them as a suitable training target to make models learn …


An Evolutionary Perspective On Foraging Strategies And Group Dynamics In Bio-Social Inspired Cognitive Radio Networks, Anna Wisniewska Sep 2019

An Evolutionary Perspective On Foraging Strategies And Group Dynamics In Bio-Social Inspired Cognitive Radio Networks, Anna Wisniewska

Dissertations, Theses, and Capstone Projects

Saturation of wireless channels is inevitable as the number of wireless devices grows exponentially in an environment of limited radio spectrum capacity. Cognitive radio technology has been proposed to relieve overcrowded spectrum resources by allowing licensed channels to be opportunistically accessed by unlicensed users (cognitive radio devices) during periods of time when the license holder (primary user) is absent from its channel. Uncoordinated competition over limited resources among cognitive radio devices poses complex co-existence challenges. We propose novel bio-social inspired behavioral models and map out plausible evolutionary trajectories of co-use strategies in the cognitive radio ecosystem. By drawing parallels between …


Deep Machine Learning Techniques For The Detection And Classification Of Sperm Whale Bioacoustics, Peter C. Bermant, Michael M. Bronstein, Robert J. Wood, Shane Gero, David F. Gruber Aug 2019

Deep Machine Learning Techniques For The Detection And Classification Of Sperm Whale Bioacoustics, Peter C. Bermant, Michael M. Bronstein, Robert J. Wood, Shane Gero, David F. Gruber

Publications and Research

We implemented Machine Learning (ML) techniques to advance the study of sperm whale (Physeter macrocephalus) bioacoustics. This entailed employing Convolutional Neural Networks (CNNs) to construct an echolocation click detector designed to classify spectrograms generated from sperm whale acoustic data according to the presence or absence of a click. The click detector achieved 99.5% accuracy in classifying 650 spectrograms. The successful application of CNNs to clicks reveals the potential of future studies to train CNN-based architectures to extract finer-scale details from cetacean spectrograms. Long short-term memory and gated recurrent unit recurrent neural networks were trained to perform classification tasks, including (1) …


Going Big: A Large-Scale Study On What Big Data Developers Ask, Mehdi Bagherzadeh, Raffi T. Khatchadourian Aug 2019

Going Big: A Large-Scale Study On What Big Data Developers Ask, Mehdi Bagherzadeh, Raffi T. Khatchadourian

Publications and Research

Software developers are increasingly required to write big data code. However, they find big data software development challenging. To help these developers it is necessary to understand big data topics that they are interested in and the difficulty of finding answers for questions in these topics. In this work, we conduct a large-scale study on Stackoverflow to understand the interest and difficulties of big data developers. To conduct the study, we develop a set of big data tags to extract big data posts from Stackoverflow; use topic modeling to group these posts into big data topics; group similar topics into …


A Note On Distance-Based Entropy Of Dendrimers, Modjtaba Ghorbani, Matthias Dehmer, Samaneh Zangi, Abbe Mowshowitz, Frank Emmert-Streib Aug 2019

A Note On Distance-Based Entropy Of Dendrimers, Modjtaba Ghorbani, Matthias Dehmer, Samaneh Zangi, Abbe Mowshowitz, Frank Emmert-Streib

Publications and Research

This paper introduces a variant of entropy measures based on vertex eccentricity and applies it to all graphs representing the isomers of octane. Taking into account the vertex degree as well (degree-ecc-entropy), we find a good correlation with the acentric factor of octane isomers. In particular, we compute the degree-ecc-entropy for three classes of dendrimer graphs.


An Optimized Encoding Algorithm For Systematic Polar Codes, Xiumin Wang, Zhihong Zhang, Jun Li, Yu Wang, Haiyan Cao, Zhengquan Li, Liang Shan Aug 2019

An Optimized Encoding Algorithm For Systematic Polar Codes, Xiumin Wang, Zhihong Zhang, Jun Li, Yu Wang, Haiyan Cao, Zhengquan Li, Liang Shan

Publications and Research

Many different encoding algorithms for systematic polar codes (SPC) have been introduced since SPC was proposed in 2011. However, the number of the computing units of exclusive OR (XOR) has not been optimized yet. According to an iterative property of the generator matrix and particular lower triangular structure of the matrix, we propose an optimized encoding algorithm (OEA) of SPC that can reduce the number of XOR computing units compared with existing non-recursive algorithms. We also prove that this property of the generator matrix could extend to different code lengths and rates of the polar codes. Through the matrix segmentation …


Safe Automated Refactoring For Intelligent Parallelization Of Java 8 Streams, Raffi T. Khatchadourian, Yiming Tang, Mehdi Bagherzadeh, Syed Ahmed Jul 2019

Safe Automated Refactoring For Intelligent Parallelization Of Java 8 Streams, Raffi T. Khatchadourian, Yiming Tang, Mehdi Bagherzadeh, Syed Ahmed

Publications and Research

Streaming APIs are becoming more pervasive in mainstream Object-Oriented programming languages and platforms. For example, the Stream API introduced in Java 8 allows for functional-like, MapReduce-style operations in processing both finite, e.g., collections, and infinite data structures. However, using this API efficiently involves subtle considerations such as determining when it is best for stream operations to run in parallel, when running operations in parallel can be less efficient, and when it is safe to run in parallel due to possible lambda expression side-effects. Also, streams may not run all operations in parallel depending on particular collectors used in reductions. In …


Weaving The Dark Web: Legitimacy On Freenet, Tor, And I2p, John Schriner Jun 2019

Weaving The Dark Web: Legitimacy On Freenet, Tor, And I2p, John Schriner

Publications and Research

This is a book review of Robert W. Gehl's Weaving the Dark Web: Legitimacy on Freenet, Tor, and I2P (2018). The book explores these anonymity networks and the concept of legitimacy throughout. Using a multidisciplinary approach and interviews with network-builders and users, Gehl helps to demystify the dark web and critically examine these networks and technologies.


Enhancing The Study Of Art History Utilizing Computational Thinking: Focus, Abstraction In Art (Modern), Douglas L. Moody, Sandra Cheng Jun 2019

Enhancing The Study Of Art History Utilizing Computational Thinking: Focus, Abstraction In Art (Modern), Douglas L. Moody, Sandra Cheng

Open Educational Resources

No abstract provided.


Cs+Sociology: Global Inequality Lab 2, Elin Waring, Janet Michello May 2019

Cs+Sociology: Global Inequality Lab 2, Elin Waring, Janet Michello

Open Educational Resources

These materials include background for the instructor and a lab that engages student in an analysis of global inequality while learning and using the R language (a programming language for statistics). Students ultimately write a function to access country level data from the CIA World Factbook.


Cs+Sociology: Global Inequality Lab 1, Elin Waring, Janet Michello May 2019

Cs+Sociology: Global Inequality Lab 1, Elin Waring, Janet Michello

Open Educational Resources

These materials include background for the instructor and a lab that engages student in an analysis of global inequality while learning and using the R language (a programming language for statistics). Students obtain data on the US and two other countries (one more developed and one less developed).


Safe Automated Refactoring For Intelligent Parallelization Of Java 8 Streams, Raffi T. Khatchadourian, Yiming Tang, Mehdi Bagherzadeh, Syed Ahmed May 2019

Safe Automated Refactoring For Intelligent Parallelization Of Java 8 Streams, Raffi T. Khatchadourian, Yiming Tang, Mehdi Bagherzadeh, Syed Ahmed

Publications and Research

Streaming APIs are becoming more pervasive in mainstream Object-Oriented programming languages. For example, the Stream API introduced in Java 8 allows for functional-like, MapReduce-style operations in processing both finite and infinite data structures. However, using this API efficiently involves subtle considerations like determining when it is best for stream operations to run in parallel, when running operations in parallel can be less efficient, and when it is safe to run in parallel due to possible lambda expression side-effects. In this paper, we present an automated refactoring approach that assists developers in writing efficient stream code in a semantics-preserving fashion. The …


Arecibo Message, Joshua P. Tan May 2019

Arecibo Message, Joshua P. Tan

Open Educational Resources

This two week assignment asks students to interpret and analyze the 1974 Arecibo Message sent by Drake and Sagan. Week 1 introduces the concepts behind the construction of the message and engages with a critical analysis of the architecture and the contents of the message. Week 2 asks students to develop software in a Jupyter Notebook (available for free from the Anaconda Python Distribution) to interpret messages that were similar to those produced by Drake and Sagan.


Mapping In The Humanities: Gis Lessons For Poets, Historians, And Scientists, Emily W. Fairey May 2019

Mapping In The Humanities: Gis Lessons For Poets, Historians, And Scientists, Emily W. Fairey

Open Educational Resources

User-friendly Geographic Information Systems (GIS) is the common thread of this collection of presentations, and activities with full lesson plans. The first section of the site contains an overview of cartography, the art of creating maps, and then looks at historical mapping platforms like Hypercities and Donald Rumsey Historical Mapping Project. In the next section Google Earth Desktop Pro is introduced, with lessons and activities on the basics of GE such as pins, paths, and kml files, as well as a more complex activity on "georeferencing" an historic map over Google Earth imagery. The final section deals with ARCGIS Online …


Module: Robot Senses, Mohammad Azhar May 2019

Module: Robot Senses, Mohammad Azhar

Open Educational Resources

Learning Objectives:

Students will be able to:

  • Describe the basics of Sensors

  • Learn how to program the LEGO Robot to make decision using touch sensors


Module: Robot Locomotion Mini Hackathon, Mohammad Azhar May 2019

Module: Robot Locomotion Mini Hackathon, Mohammad Azhar

Open Educational Resources

Learning Objectives:

Students will be able to:

  • Describe the basics of Robots.

  • Describe basic hardware and software of the LEGO Robot.

  • Write sequential code for LEGO Robot to move.


On Properties Of Distance-Based Entropies On Fullerene Graphs, Modjtaba Ghorbani, Matthias Dehmer, Mina Rajabi-Parsa, Abbe Mowshowitz, Frank Emmert-Streib May 2019

On Properties Of Distance-Based Entropies On Fullerene Graphs, Modjtaba Ghorbani, Matthias Dehmer, Mina Rajabi-Parsa, Abbe Mowshowitz, Frank Emmert-Streib

Publications and Research

In this paper, we study several distance-based entropy measures on fullerene graphs. These include the topological information content of a graph Ia(G), a degree-based entropy measure, the eccentric-entropy Ifs(G), the Hosoya entropy H(G) and, finally, the radial centric information entropy Hecc. We compare these measures on two infinite classes of fullerene graphs denoted by A12n+4 and B12n+6. We have chosen these measures as they are easily computable and capture meaningful graph properties. To demonstrate the utility of these measures, we investigate the Pearson correlation between them on the fullerene graphs.


Designing Computational Biology Workflows With Perl - Part 1, Esma Yildirim May 2019

Designing Computational Biology Workflows With Perl - Part 1, Esma Yildirim

Open Educational Resources

This material introduces Linux File System structures and demonstrates how to use commands to communicate with the operating system through a Terminal program. Basic program structures and system() function of Perl are discussed. A brief introduction to gene-sequencing terminology and file formats are given.


Designing Computational Biology Workflows With Perl - Part 1, Esma Yildirim May 2019

Designing Computational Biology Workflows With Perl - Part 1, Esma Yildirim

Open Educational Resources

This material introduces the AWS console interface, describes how to create an instance on AWS with the VMI provided, connect to that machine instance using the SSH protocol. Once connected, it requires the students to write a script to enter the data folder, which includes gene-sequencing input files and print the first five line of each file remotely. The same exercise can be applied if the VMI is installed on a local machine using virtualization software (e.g. Oracle VirtualBox). In this case, the Terminal program of the VMI can be used to do the exercise.


Designing Computational Biology Workflows With Perl - Part 2, Esma Yildirim May 2019

Designing Computational Biology Workflows With Perl - Part 2, Esma Yildirim

Open Educational Resources

This material introduces the AWS console interface, describes how to create an instance on AWS with the VMI provided and connect to that machine instance using the SSH protocol. Once connected, it requires the students to write a script to automate the tasks to create VCF files from two different sample genomes belonging to E.coli microorganisms by using the FASTA and FASTQ files in the input folder of the virtual machine. The same exercise can be applied if the VMI is installed on a local machine using virtualization software (e.g. Oracle VirtualBox). In this case, the Terminal program of the …


Designing Computational Biology Workflows With Perl - Part 2, Esma Yildirim May 2019

Designing Computational Biology Workflows With Perl - Part 2, Esma Yildirim

Open Educational Resources

This material briefly reintroduces the DNA double Helix structure, explains SNP and INDEL mutations in genes and describes FASTA, FASTQ, BAM and VCF file formats. It also explains the index creation, alignment, sorting, marking duplicates and variant calling steps of a simple preprocessing workflow and how to write a Perl script to automate the execution of these steps on a Virtual Machine Image.


Designing Computational Biology Workflows With Perl - Part 1 & 2, Esma Yildirim May 2019

Designing Computational Biology Workflows With Perl - Part 1 & 2, Esma Yildirim

Open Educational Resources

This manual guides the instructor to combine the partial files of the virtual machine image and construct sequencer.ova file. It is accompanied by the partial files of the virtual machine image.


Understanding Water Consumption And Energy Trends In New York City, Wen Yong Huang, Johann Thiel May 2019

Understanding Water Consumption And Energy Trends In New York City, Wen Yong Huang, Johann Thiel

Publications and Research

In this study, we will be using the NYC Open Data website to examine publicly available data sets on water and energy consumption in New York City. In particular, we will use various scientific programming and machine learning modules in Python to analyze and visualize trends in water and energy usage within the five boroughs.


Online Learning And Planning For Crowd-Aware Service Robot Navigation, Anoop Aroor May 2019

Online Learning And Planning For Crowd-Aware Service Robot Navigation, Anoop Aroor

Dissertations, Theses, and Capstone Projects

Mobile service robots are increasingly used in indoor environments (e.g., shopping malls or museums) among large crowds of people. To efficiently navigate in these environments, such a robot should be able to exhibit a variety of behaviors. It should avoid crowded areas, and not oppose the flow of the crowd. It should be able to identify and avoid specific crowds that result in additional delays (e.g., children in a particular area might slow down the robot). and to seek out a crowd if its task requires it to interact with as many people as possible. These behaviors require the ability …


Analysis Of A Group Of Automorphisms Of A Free Group As A Platform For Conjugacy-Based Group Cryptography, Pavel Shostak May 2019

Analysis Of A Group Of Automorphisms Of A Free Group As A Platform For Conjugacy-Based Group Cryptography, Pavel Shostak

Dissertations, Theses, and Capstone Projects

Let F be a finitely generated free group and Aut(F) its group of automorphisms.

In this monograph we discuss potential uses of Aut(F) in group-based cryptography.

Our main focus is on using Aut(F) as a platform group for the Anshel-Anshel-Goldfeld protocol, Ko-Lee protocol, and other protocols based on different versions of the conjugacy search problem or decomposition problem, such as Shpilrain-Ushakov protocol.

We attack the Anshel-Anshel-Goldfeld and Ko-Lee protocols by adapting the existing types of the length-based attack to the specifics of Aut(F). We also present our own version of the length-based attack that significantly increases the attack' success …