Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 67

Full-Text Articles in Physical Sciences and Mathematics

A Qualitative Representation Of Spatial Scenes In R2 With Regions And Lines, Joshua Lewis Dec 2019

A Qualitative Representation Of Spatial Scenes In R2 With Regions And Lines, Joshua Lewis

Electronic Theses and Dissertations

Regions and lines are common geographic abstractions for geographic objects. Collections of regions, lines, and other representations of spatial objects form a spatial scene, along with their relations. For instance, the states of Maine and New Hampshire can be represented by a pair of regions and related based on their topological properties. These two states are adjacent (i.e., they meet along their shared boundary), whereas Maine and Florida are not adjacent (i.e., they are disjoint).

A detailed model for qualitatively describing spatial scenes should capture the essential properties of a configuration such that a description of the represented objects …


A Longitudinal Study Of Mammograms Utilizing The Automated Wavelet Transform Modulus Maxima Method, Brian C. Toner Dec 2019

A Longitudinal Study Of Mammograms Utilizing The Automated Wavelet Transform Modulus Maxima Method, Brian C. Toner

Electronic Theses and Dissertations

Breast cancer is a disease which predominatly affects women. About 1 in 8 women are diagnosed with breast cancer during their lifetime. Early detection is key to increasing the survival rate of breast cancer patients since the longer the tumor goes undetected, the more deadly it can become. The modern approach for diagnosing breast cancer relies on a combination of self-breast exams and mammography to detect the formation of tumors. However, this approach only accounts for tumors which are either detectable by touch or are large enough to be observed during a screening mammogram. For some individuals, by the time …


Hybrid Recommender Systems Via Spectral Learning And A Random Forest, Alyssa Williams Dec 2019

Hybrid Recommender Systems Via Spectral Learning And A Random Forest, Alyssa Williams

Electronic Theses and Dissertations

We demonstrate spectral learning can be combined with a random forest classifier to produce a hybrid recommender system capable of incorporating meta information. Spectral learning is supervised learning in which data is in the form of one or more networks. Responses are predicted from features obtained from the eigenvector decomposition of matrix representations of the networks. Spectral learning is based on the highest weight eigenvectors of natural Markov chain representations. A random forest is an ensemble technique for supervised learning whose internal predictive model can be interpreted as a nearest neighbor network. A hybrid recommender can be constructed by first …


Machine Learning-Based Models For Assessing Impacts Before, During And After Hurricane Events, Julie L. Harvey Sep 2019

Machine Learning-Based Models For Assessing Impacts Before, During And After Hurricane Events, Julie L. Harvey

Electronic Theses and Dissertations

Social media provides an abundant amount of real-time information that can be used before, during, and after extreme weather events. Government officials, emergency managers, and other decision makers can use social media data for decision-making, preparation, and assistance. Machine learning-based models can be used to analyze data collected from social media. Social media data and cloud cover temperature as physical sensor data was analyzed in this study using machine learning techniques. Data was collected from Twitter regarding Hurricane Florence from September 11, 2018 through September 20, 2018 and Hurricane Michael from October 1, 2018 through October 18, 2018. Natural language …


A Tale Of Two Bays: The Development And Applications Of The Saco And Casco Modeling Project, Stephen M. Moore Aug 2019

A Tale Of Two Bays: The Development And Applications Of The Saco And Casco Modeling Project, Stephen M. Moore

Electronic Theses and Dissertations

This thesis details the development and application of a finite-volume, hydrodynamic model of Saco and Casco Bays. The primary study conducted herein focused on coupling storm simulations with sea level rise (SLR) to identify vulnerabilities of the two bays. The February 1978 Northeaster and an April freshwater discharge event in 2007 following the Patriot’s Day Storm were modeled by utilizing the Finite-Volume Coastal Ocean Model (FVCOM). Both events were repeatedly simulated under SLR scenarios ranging from 0 to 7 ft. Modeled storm responses were identified from the 1978 blizzard simulations and were tracked across SLR scenarios. By comparing changes in …


Designing And Sample Size Calculation In Presence Of Heterogeneity In Biological Studies Involving High-Throughput Data., Sudhir Srivastava Aug 2019

Designing And Sample Size Calculation In Presence Of Heterogeneity In Biological Studies Involving High-Throughput Data., Sudhir Srivastava

Electronic Theses and Dissertations

The designing and determination of sample size are important for conducting high-throughput biological experiments such as proteomics experiments and RNA-Seq expression studies, thus leading to better understanding of complex mechanisms underlying various biological processes. The variations in the biological data or technical approaches to data collection lead to heterogeneity for the samples under study. We critically worked on the issues of technical and biological heterogeneity. The quantitative measurements based on liquid chromatography (LC) coupled with mass spectrometry (MS) often suffer from the problem of missing values (MVs) and data heterogeneity. We considered a proteomics data set generated from human kidney …


Formally Designing And Implementing Cyber Security Mechanisms In Industrial Control Networks., Mehdi Sabraoui Aug 2019

Formally Designing And Implementing Cyber Security Mechanisms In Industrial Control Networks., Mehdi Sabraoui

Electronic Theses and Dissertations

This dissertation describes progress in the state-of-the-art for developing and deploying formally verified cyber security devices in industrial control networks. It begins by detailing the unique struggles that are faced in industrial control networks and why concepts and technologies developed for securing traditional networks might not be appropriate. It uses these unique struggles and examples of contemporary cyber-attacks targeting control systems to argue that progress in securing control systems is best met with formal verification of systems, their specifications, and their security properties. This dissertation then presents a development process and identifies two technologies, TLA+ and seL4, that can be …


Synergistic Visualization And Quantitative Analysis Of Volumetric Medical Images, Neslisah Torosdagli May 2019

Synergistic Visualization And Quantitative Analysis Of Volumetric Medical Images, Neslisah Torosdagli

Electronic Theses and Dissertations

The medical diagnosis process starts with an interview with the patient, and continues with the physical exam. In practice, the medical professional may require additional screenings to precisely diagnose. Medical imaging is one of the most frequently used non-invasive screening methods to acquire insight of human body. Medical imaging is not only essential for accurate diagnosis, but also it can enable early prevention. Medical data visualization refers to projecting the medical data into a human understandable format at mediums such as 2D or head-mounted displays without causing any interpretation which may lead to clinical intervention. In contrast to the medical …


Student Community Detection And Recommendation Of Customized Paths To Reinforce Academic Success, Yuan Shao May 2019

Student Community Detection And Recommendation Of Customized Paths To Reinforce Academic Success, Yuan Shao

Electronic Theses and Dissertations

Educational Data Mining (EDM) is a research area that analyzes educational data and extracts interesting and unique information to address education issues. EDM implements computational methods to explore data for the purpose of studying questions related to educational achievements. A common task in an educational environment is the grouping of students and the identification of communities that have common features. Then, these communities of students may be studied by a course developer to build a personalized learning system, promote effective group learning, provide adaptive contents, etc. The objective of this thesis is to find an approach to detect student communities …


Describing Images By Semantic Modeling Using Attributes And Tags, Mahdi Mahmoudkalayeh May 2019

Describing Images By Semantic Modeling Using Attributes And Tags, Mahdi Mahmoudkalayeh

Electronic Theses and Dissertations

This dissertation addresses the problem of describing images using visual attributes and textual tags, a fundamental task that narrows down the semantic gap between the visual reasoning of humans and machines. Automatic image annotation assigns relevant textual tags to the images. In this dissertation, we propose a query-specific formulation based on Weighted Multi-view Non-negative Matrix Factorization to perform automatic image annotation. Our proposed technique seamlessly adapt to the changes in training data, naturally solves the problem of feature fusion and handles the challenge of the rare tags. Unlike tags, attributes are category-agnostic, hence their combination models an exponential number of …


Framework For Modeling Attacker Capabilities With Deception, Sharif Hassan May 2019

Framework For Modeling Attacker Capabilities With Deception, Sharif Hassan

Electronic Theses and Dissertations

In this research we built a custom experimental range using opensource emulated and custom pure honeypots designed to detect or capture attacker activity. The focus is to test the effectiveness of a deception in its ability to evade detection coupled with attacker skill levels. The range consists of three zones accessible via virtual private networking. The first zone houses varying configurations of opensource emulated honeypots, custom built pure honeypots, and real SSH servers. The second zone acts as a point of presence for attackers. The third zone is for administration and monitoring. Using the range, both a control and participant-based …


Mediated Physicality: Inducing Illusory Physicality Of Virtual Humans Via Their Interactions With Physical Objects, Myungho Lee May 2019

Mediated Physicality: Inducing Illusory Physicality Of Virtual Humans Via Their Interactions With Physical Objects, Myungho Lee

Electronic Theses and Dissertations

The term virtual human (VH) generally refers to a human-like entity comprised of computer graphics and/or physical body. In the associated research literature, a VH can be further classified as an avatar - a human-controlled VH, or an agent - a computer-controlled VH. Because of the resemblance with humans, people naturally distinguish them from non-human objects, and often treat them in ways similar to real humans. Sometimes people develop a sense of co-presence or social presence with the VH - a phenomenon that is often exploited for training simulations where the VH assumes the role of a human. Prior research …


Machine Learning From Casual Conversation, Awrad Mohammed Ali May 2019

Machine Learning From Casual Conversation, Awrad Mohammed Ali

Electronic Theses and Dissertations

Human social learning is an effective process that has inspired many existing machine learning techniques, such as learning from observation and learning by demonstration. In this dissertation, we introduce another form of social learning, Learning from a Casual Conversation (LCC). LCC is an open-ended machine learning system in which an artificially intelligent agent learns from an extended dialog with a human. Our system enables the agent to incorporate changes into its knowledge base, based on the human's conversational text input. This system emulates how humans learn from each other through a dialog. LCC closes the gap in the current research …


Quality Diversity: Harnessing Evolution To Generate A Diversity Of High-Performing Solutions, Justin Pugh May 2019

Quality Diversity: Harnessing Evolution To Generate A Diversity Of High-Performing Solutions, Justin Pugh

Electronic Theses and Dissertations

Evolution in nature has designed countless solutions to innumerable interconnected problems, giving birth to the impressive array of complex modern life observed today. Inspired by this success, the practice of evolutionary computation (EC) abstracts evolution artificially as a search operator to find solutions to problems of interest primarily through the adaptive mechanism of survival of the fittest, where stronger candidates are pursued at the expense of weaker ones until a solution of satisfying quality emerges. At the same time, research in open-ended evolution (OEE) draws different lessons from nature, seeking to identify and recreate processes that lead to the type …


A Deep Learning Approach To Diagnosing Schizophrenia, Justin Barry May 2019

A Deep Learning Approach To Diagnosing Schizophrenia, Justin Barry

Electronic Theses and Dissertations

In this article, the investigators present a new method using a deep learning approach to diagnose schizophrenia. In the experiment presented, the investigators have used a secondary dataset provided by National Institutes of Health. The aforementioned experimentation involves analyzing this dataset for existence of schizophrenia using traditional machine learning approaches such as logistic regression, support vector machine, and random forest. This is followed by application of deep learning techniques using three hidden layers in the model. The results obtained indicate that deep learning provides state-of-the-art accuracy in diagnosing schizophrenia. Based on these observations, there is a possibility that deep learning …


Realtime Editing In Virtual Reality For Room Scale Scans, Charles Greenwood May 2019

Realtime Editing In Virtual Reality For Room Scale Scans, Charles Greenwood

Electronic Theses and Dissertations

This work presents a system for the design and implementation of tools that support the editing of room-scale scans within a virtual reality environment, in real time. The moniker REVRRSS ("reverse") thus stands for Real-time Editing (in) Virtual Reality (of) Room Scale Scans. The tools were evaluated for usefulness based upon whether they meet the criterion of real time usability. Users evaluated the editing experience with traditional keyboard-video-mouse compared to a head mounted display and hand-held controllers for Virtual Reality. Results show that users prefer the VR approach. The quality of the finished product when using VR is comparable to …


Transparency And Communication Patterns In Human-Robot Teaming, Shan Lakhmani May 2019

Transparency And Communication Patterns In Human-Robot Teaming, Shan Lakhmani

Electronic Theses and Dissertations

In anticipation of the complex, dynamic battlefields of the future, military operations are increasingly demanding robots with increased autonomous capabilities to support soldiers. Effective communication is necessary to establish a common ground on which human-robot teamwork can be established across the continuum of military operations. However, the types and format of communication for mixed-initiative collaboration is still not fully understood. This study explores two approaches to communication in human-robot interaction, transparency and communication pattern, and examines how manipulating these elements with a robot teammate affects its human counterpart in a collaborative exercise. Participants were coupled with a computer-simulated robot to …


Efficient String Graph Construction Algorithm, S.M. Iqbal Morshed May 2019

Efficient String Graph Construction Algorithm, S.M. Iqbal Morshed

Electronic Theses and Dissertations

In the field of genome assembly research where assemblers are dominated by de Bruijn graph-based approaches, string graph-based assembly approach is getting more attention because of its ability to losslessly retain information from sequence data. Despite the advantages provided by a string graph in repeat detection and in maintaining read coherence, the high computational cost for constructing a string graph hinders its usability for genome assembly. Even though different algorithms have been proposed over the last decade for string graph construction, efficiency is still a challenge due to the demand for processing a large amount of sequence data generated by …


Leaning Robust Sequence Features Via Dynamic Temporal Pattern Discovery, Hao Hu May 2019

Leaning Robust Sequence Features Via Dynamic Temporal Pattern Discovery, Hao Hu

Electronic Theses and Dissertations

As a major type of data, time series possess invaluable latent knowledge for describing the real world and human society. In order to improve the ability of intelligent systems for understanding the world and people, it is critical to design sophisticated machine learning algorithms for extracting robust time series features from such latent knowledge. Motivated by the successful applications of deep learning in computer vision, more and more machine learning researchers put their attentions on the topic of applying deep learning techniques to time series data. However, directly employing current deep models in most time series domains could be problematic. …


Decision-Making For Vehicle Path Planning, Jun Xu May 2019

Decision-Making For Vehicle Path Planning, Jun Xu

Electronic Theses and Dissertations

This dissertation presents novel algorithms for vehicle path planning in scenarios where the environment changes. In these dynamic scenarios the path of the vehicle needs to adapt to changes in the real world. In these scenarios, higher performance paths can be achieved if we are able to predict the future state of the world, by learning the way it evolves from historical data. We are relying on recent advances in the field of deep learning and reinforcement learning to learn appropriate world models and path planning behaviors. There are many different practical applications that map to this model. In this …


Predicting Students' Academic Performance With Decision Tree And Neural Network, Junshuai Feng May 2019

Predicting Students' Academic Performance With Decision Tree And Neural Network, Junshuai Feng

Electronic Theses and Dissertations

Educational Data Mining (EDM) is a developing research field that involves many techniques to explore data relating to educational background. EDM can analyze and resolve educational data with computational methods to address educational questions. Similar to EDM, neural networks have been utilized in widespread and successful data mining applications. In this paper, synthetic datasets are employed since this paper aims to explore the methodologies such as decision tree classifiers and neural networks to predict student performance in the context of EDM. Firstly, it introduces EDM and some relative works that have been accomplished previously in this field along with their …


Federal, State And Local Law Enforcement Agency Interoperability Capabilities And Cyber Vulnerabilities, Tyrone Trapnell May 2019

Federal, State And Local Law Enforcement Agency Interoperability Capabilities And Cyber Vulnerabilities, Tyrone Trapnell

Electronic Theses and Dissertations

The National Data Exchange (N-DEx) System is the central informational hub located at the Federal Bureau of Investigation (FBI). Its purpose is to provide network subscriptions to all Federal, state and local level law enforcement agencies while increasing information collaboration across all domains. The National Data Exchange users must satisfy the Advanced Permission Requirements, confirming the terms of N-DEx information use, and the Verification Requirement (verifying the completeness, timeliness, accuracy, and relevancy of N-DEx information) through coordination with the record-owning agency (Management, 2018). A network infection model is proposed to simulate the spread impact of various cyber-attacks within Federal, state …


Clustering Of Multiple Instance Data., Andrew D. Karem May 2019

Clustering Of Multiple Instance Data., Andrew D. Karem

Electronic Theses and Dissertations

An emergent area of research in machine learning that aims to develop tools to analyze data where objects have multiple representations is Multiple Instance Learning (MIL). In MIL, each object is represented by a bag that includes a collection of feature vectors called instances. A bag is positive if it contains at least one positive instance, and negative if no instances are positive. One of the main objectives in MIL is to identify a region in the instance feature space with high correlation to instances from positive bags and low correlation to instances from negative bags -- this region is …


An Explainable Sequence-Based Deep Learning Predictor With Applications To Song Recommendation And Text Classification., Khalil Damak May 2019

An Explainable Sequence-Based Deep Learning Predictor With Applications To Song Recommendation And Text Classification., Khalil Damak

Electronic Theses and Dissertations

Streaming applications are now the predominant tools for listening to music. What makes the success of such software is the availability of songs and especially their ability to provide users with relevant personalized recommendations. State of the art music recommender systems mainly rely on either Matrix factorization-based collaborative filtering approaches or deep learning architectures. Deep learning models usually use metadata for content-based filtering or predict the next user interaction (listening to a song) using a memory-based deep learning structure that learns from temporal sequences of user actions. Despite advances in deep learning models for song recommendation systems, none has taken …


Studying And Handling Iterated Algorithmic Biases In Human And Machine Learning Interaction., Wenlong Sun May 2019

Studying And Handling Iterated Algorithmic Biases In Human And Machine Learning Interaction., Wenlong Sun

Electronic Theses and Dissertations

Algorithmic bias consists of biased predictions born from ingesting unchecked information, such as biased samples and biased labels. Furthermore, the interaction between people and algorithms can exacerbate bias such that neither the human nor the algorithms receive unbiased data. Thus, algorithmic bias can be introduced not only before and after the machine learning process but sometimes also in the middle of the learning process. With a handful of exceptions, only a few categories of bias have been studied in Machine Learning, and there are few, if any, studies of the impact of bias on both human behavior and algorithm performance. …


Automated Synthesis Of Memristor Crossbar Networks, Dwaipayan Chakraborty Jan 2019

Automated Synthesis Of Memristor Crossbar Networks, Dwaipayan Chakraborty

Electronic Theses and Dissertations

The advancement of semiconductor device technology over the past decades has enabled the design of increasingly complex electrical and computational machines. Electronic design automation (EDA) has played a significant role in the design and implementation of transistor-based machines. However, as transistors move closer toward their physical limits, the speed-up provided by Moore's law will grind to a halt. Once again, we find ourselves on the verge of a paradigm shift in the computational sciences as newer devices pave the way for novel approaches to computing. One of such devices is the memristor -- a resistor with non-volatile memory. Memristors can …


Detecting Anomalies From Big Data System Logs, Siyang Lu Jan 2019

Detecting Anomalies From Big Data System Logs, Siyang Lu

Electronic Theses and Dissertations

Nowadays, big data systems (e.g., Hadoop and Spark) are being widely adopted by many domains for offering effective data solutions, such as manufacturing, healthcare, education, and media. A common problem about big data systems is called anomaly, e.g., a status deviated from normal execution, which decreases the performance of computation or kills running programs. It is becoming a necessity to detect anomalies and analyze their causes. An effective and economical approach is to analyze system logs. Big data systems produce numerous unstructured logs that contain buried valuable information. However manually detecting anomalies from system logs is a tedious and daunting …


Reducing The Large Class Code Smell By Applying Design Patterns, Bayan Turkistani Jan 2019

Reducing The Large Class Code Smell By Applying Design Patterns, Bayan Turkistani

Electronic Theses and Dissertations

Software systems need continuous developing to cope and keep up with everchanging requirements. Source code quality affects the software development costs. In software refactoring object-oriented systems, Large Class, in particular, hinder the maintenance of a system by letting it difficult for software developers to understand and perform modifications. Also, it is making the development process labor-intensive and time-wasting. Reducing the Large Class code smell by applying design patterns can make the refactoring process more manageable, ease developing the system and decrease the effort required for the maintaining of software. To guarantee object-oriented software stays clear to read, understand and modify …


A Dynamic Fault Tolerance Model For Microservices Architecture, Hajar Hameed Addeen Jan 2019

A Dynamic Fault Tolerance Model For Microservices Architecture, Hajar Hameed Addeen

Electronic Theses and Dissertations

Microservices architecture is popular for its distributive system styles due to the independent character of each of the services in the architecture. Microservices are built to be single and each service has its running process and interconnecting with a lightweight mechanism that called application programming interface (API). The interaction through microservices needs to communicate internally. Microservices are a service that is likely to become unreachable to its consumers because, in any distributed setup, communication will fail on occasions due to the number of messages passing between services. Failures can occur when the networks are unreliable, and thus the connections can …


Towards More Reliable Neural Network Learning Models, Navid Kardan Jan 2019

Towards More Reliable Neural Network Learning Models, Navid Kardan

Electronic Theses and Dissertations

Ideally, when a neural network makes a wrong decision or encounters an out-of-distribution example, its predictive confidence should be as low as possible. Three primary contributions in this dissertation address this challenge. The first two contributions are new approaches to mitigate overconfident predictions in modern neural networks. In the first (1), called competitive overcomplete output layer neural networks, several classifiers, as part of the same output layer, are trained simultaneously and later their consensus produces more reliable predictions. The second approach (2) reformulates the original classification problem into several new versions by combining classes together and training a classifier on …