Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

2019

Institution
Keyword
Publication
Publication Type
File Type

Articles 3841 - 3866 of 3866

Full-Text Articles in Physical Sciences and Mathematics

Equilibrium Structures And Thermal Fluctuations In Interacting Monolayers, Emmanuel Rivera Jan 2019

Equilibrium Structures And Thermal Fluctuations In Interacting Monolayers, Emmanuel Rivera

Williams Honors College, Honors Research Projects

Coherency strains appear in interacting atomic monolayers due to differing bond lengths, which can arise from different materials or geometries. Examples include extended monolayers interacting with a substrate and the interacting walls of a multi-walled carbon nanotube. These strains can induce various equilibrium configurations, which we will analyze by means of a phenomenological model that incorporates forces from bond stretching and bending within each layer and the weak van der Waals interactions connecting the separate layers. We vary the strengths of each interaction to explore their effects on equilibrium structures, and the specific case of a two-walled carbon nanotube is …


High-Speed Video From Asynchronous Camera Array (Poster), Si Lu Jan 2019

High-Speed Video From Asynchronous Camera Array (Poster), Si Lu

Computer Science Faculty Publications and Presentations

Poster presented at: 2019 IEEE Winter Conference on Applications of Computer Vision (WACV)


Survey Of Biosynthetic Gene Clusters From Sequenced Myxobacteria And Analysis Of Potential Metabolic Diversity, Katherine C. Gregory Jan 2019

Survey Of Biosynthetic Gene Clusters From Sequenced Myxobacteria And Analysis Of Potential Metabolic Diversity, Katherine C. Gregory

Honors Theses

The importance of natural product discovery to society is undeniable as natural products have seemingly infinite applications, particularly in regard to pharmacological use as antibacterial, antifungal, antiparasitic, anticancer and immunosuppressive agents. The search for new therapeutics and other new chemical commodities thus grows simultaneously with antibiotic resistance and commercial pressure on pharmaceutical research. However, the increasingly common phenomenon of natural product rediscovery continues to inhibit advancement in this field. We contend that the likelihood of rediscovery can be predicted by taxonomic distance between the bacteria in question and previously studied bacteria. That is, our data supports a correlation between chemical …


Classically Biased: A Quantitative Analysis Of Gender & Writing Styles In Classical Literature, Madeleine Rose Delcambre Jan 2019

Classically Biased: A Quantitative Analysis Of Gender & Writing Styles In Classical Literature, Madeleine Rose Delcambre

Honors Theses

This thesis is a first attempt in assessing patterns related to gender in classical literature prior to the 21st century, specifically looking at the way writing styles and language di↵er among female and male authors; e.g., sentence structuring, lexical diversity, and dictionary similarities. Further topics of analysis included gender distribution and sentiment within the novels themselves. Seventy-eight open-source novels were used in the analysis, with thirty-one books by female authors and forty-seven by male authors. Data from the novels was acquired using Python, natural language processing, and the Natural Language Toolkit (NLTK). Graphs and visuals were then created to summarize …


Here, There, And Everywhere: Building A Scaffolding For Children’S Learning Through Recommendations, Ashlee Milton, Emiliana Murgia, Monica Landoni, Theo Huibers, Maria Soledad Pera Jan 2019

Here, There, And Everywhere: Building A Scaffolding For Children’S Learning Through Recommendations, Ashlee Milton, Emiliana Murgia, Monica Landoni, Theo Huibers, Maria Soledad Pera

Computer Science Faculty Publications and Presentations

Reading and literacy are on the decline among children. This is compounded by the fact that children have trouble with the discovery of resources that are appropriate, diverse, and appealing. With technology becoming an evermore presence in children’s lives, tools that can minimize choice overload and ease access to online resources become a must. A powerful but underutilized tool in regards to children that could assist in this situation is a recommender system (RS). We posit that RS could be used to impact children’s learning, using them to not only suggest what children might like but what they need in …


Investigating The Social And Temporal Aspects Of Children’S Physical Activity Games, Ankita Samariya, Jerry Alan Fails, Derek Hansen Jan 2019

Investigating The Social And Temporal Aspects Of Children’S Physical Activity Games, Ankita Samariya, Jerry Alan Fails, Derek Hansen

Computer Science Faculty Publications and Presentations

There are a variety of fitness technologies such as activity trackers, exergames and mobile applications available to promote physical activity. Based on our previous research, we found that children prefer having social interaction, a narrative and flexibility while interacting with such technologies. Other research has shown that persuasive displays encouraged adults towards physical activity. In this research, we present the initial results from a user study conducted on 16 children (ages 6-11) who used the Kidfit suite, a collection of mobile applications that combine and utilize the elements found from previous research to promote activity in children.


Kidled: A Colorful Approach To Children's Activity Awareness, Ankita Samariya, Anud Sharma, Margiawan Fitriani, Tucker Ferguson, Jerry Alan Fails Jan 2019

Kidled: A Colorful Approach To Children's Activity Awareness, Ankita Samariya, Anud Sharma, Margiawan Fitriani, Tucker Ferguson, Jerry Alan Fails

Computer Science Faculty Publications and Presentations

Obesity in children is a growing cause of concern as it affects more than 18% of children in the United States. Sedentary behaviour is one of the contributors to childhood obesity. Technological interventions like activity trackers and fitness games have been introduced to motivate both children and adults to be physically active. Most of these technologies encourage activity by making them aware of their activity levels. While awareness of current activity levels may help motivating adults, it can be difficult for children to understand their activity levels in terms of number of steps (the most common method used by adults). …


The Seven Layers Of Complexity Of Recommender Systems For Children In Educational Contexts, Emiliana Murgia, Monica Landoni, Theo Huibers, Jerry Alan Fails, Maria Soledad Pera Jan 2019

The Seven Layers Of Complexity Of Recommender Systems For Children In Educational Contexts, Emiliana Murgia, Monica Landoni, Theo Huibers, Jerry Alan Fails, Maria Soledad Pera

Computer Science Faculty Publications and Presentations

Recommender systems (RS) in their majority focus on an average target user: adults. We argue that for non-traditional populations in specific contexts, the task is not as straightforward–we must look beyond existing recommendation algorithms, premises for interface design, and standard evaluation metrics and frameworks. We explore the complexity of RS in an educational context for which young children are the target audience. The aim of this position paper is to spell out, label, and organize the specific layers of complexity observed in this context.


Good Similar Patches For Image Denoising (Poster), Si Lu Jan 2019

Good Similar Patches For Image Denoising (Poster), Si Lu

Computer Science Faculty Publications and Presentations

Patch-based denoising algorithms like BM3D have achieved outstanding performance. An important idea for the success of these methods is to exploit the recurrence of similar patches in an input image to estimate the underlying image structures....


The Impact Of Terrain And Other Factors On Wild Fires, Matthew L. Kingston Jan 2019

The Impact Of Terrain And Other Factors On Wild Fires, Matthew L. Kingston

Undergraduate Theses, Professional Papers, and Capstone Artifacts

Abstract - Wild fires have become an annual concern in the United States, and despite the vast amount of resources and manpower used to combat the spread of wild fires, the success rate tends to vary. With this in mind, a research project has commenced which is primarily aimed at discovering the relationship between environmental factors and wild fire growth, or lack of growth. This research analyzes data available in the Google Earth Engine and includes geographical features such as roads, elevation, and other factors like humidity and wind. Using Google Earth Engine programs, the goal is to establish meaningful …


Joint Stabilization And Direction Of 360° Videos, Chengzhou Tang, Oliver Wang, Feng Liu, Ping Tan Jan 2019

Joint Stabilization And Direction Of 360° Videos, Chengzhou Tang, Oliver Wang, Feng Liu, Ping Tan

Computer Science Faculty Publications and Presentations

Three-hundred-sixty-degree (360°) video provides an immersive experience for viewers, allowing them to freely explore the world by turning their head. However, creating high-quality 360° video content can be challenging, as viewers may miss important events by looking in the wrong direction, or they may see things that ruin the immersion, such as stitching artifacts and the film crew. We take advantage of the fact that not all directions are equally likely to be observed; most viewers are more likely to see content located at “true north,” i.e., in front of them, due to ergonomic constraints. We therefore propose 360° video …


Context-Aware Synthesis For Video Frame Interpolation, Simon Niklaus, Feng Liu Jan 2019

Context-Aware Synthesis For Video Frame Interpolation, Simon Niklaus, Feng Liu

Computer Science Faculty Publications and Presentations

Video frame interpolation algorithms typically estimate optical flow or its variations and then use it to guide the synthesis of an intermediate frame between two consecutive original frames. To handle challenges like occlusion, bidirectional flow between the two input frames is often estimated and used to warp and blend the input frames. However, how to effectively blend the two warped frames still remains a challenging problem. This paper presents a context-aware synthesis approach that warps not only the input frames but also their pixel-wise contextual information and uses them to interpolate a high-quality intermediate frame. Specifically, we first use a …


Designing Pre-Test Questions As Phone Notifications: Studying The Effects Of A Mobile Learning Intervention, Ingrid Yvonne Herras, Don Romielito N. Abanes, Nico B. Del Rosario, Jonathan D.L Casano Jan 2019

Designing Pre-Test Questions As Phone Notifications: Studying The Effects Of A Mobile Learning Intervention, Ingrid Yvonne Herras, Don Romielito N. Abanes, Nico B. Del Rosario, Jonathan D.L Casano

Department of Information Systems & Computer Science Faculty Publications

Mobile devices are increasingly becoming more pervasive and emerging as part of our daily life, particularly with university students. From these devices developed in tandem with face-to-face class interaction it has opened new possibilities for ubiquitous learning. We present out work on designing a smart-phone Mobile Learning application that streamlines pre-test questions into a “set it then forget it” input system where students can answer quiz items as slide-down notifications within the day prior to a scheduled lecture. Teachers using the application are afforded a web application to create pre-tests in advance and review class scores. The study was conducted …


A Power-Efficient Multiband Planar Usb Dongle Antenna For Wireless Sensor Networks, Wei-Yuan Chiang, Chia-Hao Ku, Chiung-An Chen, Le-Yu Wang, Patricia Angela R. Abu, Pei-Zong Rao, Chih-Kai Liu, Chao-Hsiang Liao, Shih-Lun Chen Jan 2019

A Power-Efficient Multiband Planar Usb Dongle Antenna For Wireless Sensor Networks, Wei-Yuan Chiang, Chia-Hao Ku, Chiung-An Chen, Le-Yu Wang, Patricia Angela R. Abu, Pei-Zong Rao, Chih-Kai Liu, Chao-Hsiang Liao, Shih-Lun Chen

Department of Information Systems & Computer Science Faculty Publications

Wireless Sensor Networks (WSNs) had been applied in Internet of Things (IoT) and in Industry 4.0. Since a WSN system contains multiple wireless sensor nodes, it is necessary to develop a low-power and multiband wireless communication system that satisfies the specifications of the Federal Communications Commission (FCC) and the Certification European (CE). In a WSN system, many devices are of very small size and can be slipped into a Universal Serial Bus (USB), which is capable of connecting to wireless systems and networks, as well as transferring data. These devices are widely known as USB dongles. This paper develops a …


Elf3 Is An Antagonist Of Oncogenic-Signalling-Induced Expression Of Emt-Tf Zeb1, D Liu, Y Skomorovska, J Song, E Bowler, R Harris, R Ravasz, S Bai, Marzieh Ayati, K Tamai, Mehmet Koyuturk Jan 2019

Elf3 Is An Antagonist Of Oncogenic-Signalling-Induced Expression Of Emt-Tf Zeb1, D Liu, Y Skomorovska, J Song, E Bowler, R Harris, R Ravasz, S Bai, Marzieh Ayati, K Tamai, Mehmet Koyuturk

Computer Science Faculty Publications and Presentations

Background: Epithelial-to-mesenchymal transition (EMT) is a key step in the transformation of epithelial cells into migratory and invasive tumour cells. Intricate positive and negative regulatory processes regulate EMT. Many oncogenic signalling pathways can induce EMT, but the specific mechanisms of how this occurs, and how this process is controlled are not fully understood.

Methods: RNA-Seq analysis, computational analysis of protein networks and large-scale cancer genomics datasets were used to identify ELF3 as a negative regulator of the expression of EMT markers. Western blotting coupled to siRNA as well as analysis of tumour/normal colorectal cancer panels was used to …


Anomaly Detection In Bacnet/Ip Managed Building Automation Systems, Matthew Peacock Jan 2019

Anomaly Detection In Bacnet/Ip Managed Building Automation Systems, Matthew Peacock

Theses: Doctorates and Masters

Building Automation Systems (BAS) are a collection of devices and software which manage the operation of building services. The BAS market is expected to be a $19.25 billion USD industry by 2023, as a core feature of both the Internet of Things and Smart City technologies. However, securing these systems from cyber security threats is an emerging research area. Since initial deployment, BAS have evolved from isolated standalone networks to heterogeneous, interconnected networks allowing external connectivity through the Internet. The most prominent BAS protocol is BACnet/IP, which is estimated to hold 54.6% of world market share. BACnet/IP security features are …


Squared Distance Matrix Of A Weighted Tree, Ravindra B. Bapat Jan 2019

Squared Distance Matrix Of A Weighted Tree, Ravindra B. Bapat

Journal Articles

Let T be a tree with vertex set f1;: :: ; ng such that each edge is assigned a nonzero weight. The squared distance matrix of T; denoted by is the n n matrix with (i; j)-element d(i; j)2; where d(i; j) is the sum of the weights of the edges on the (ij)-path. We obtain a formula for the determinant of A formula for 1 is also obtained, under certain conditions. The results generalize known formulas for the unweighted case.


Transdimensional Transformation Based Markov Chain Monte Carlo, Moumita Das, Sourabh Bhattacharya Jan 2019

Transdimensional Transformation Based Markov Chain Monte Carlo, Moumita Das, Sourabh Bhattacharya

Journal Articles

Variable dimensional problems, where not only the parameters, but also the number of parameters are random variables, pose serious challenge to Bayesians. Although in principle the Reversible Jump Markov Chain Monte Carlo (RJMCMC) methodology is a response to such challenges, the dimension-hopping strategies need not be always convenient for practical implementation, particularly because efficient “move-types” having reasonable acceptance rates are often difficult to devise. In this article, we propose and develop a novel and general dimension-hopping MCMC methodology that can update all the parameters as well as the number of parameters simultaneously using simple deterministic transformations of some low-dimensional (often …


From The Editors, Herbert J. Mattord, Michael E. Whitman Jan 2019

From The Editors, Herbert J. Mattord, Michael E. Whitman

Journal of Cybersecurity Education, Research and Practice

A message from the editors.


Investigating The Impact Of Publicly Announced Information Security Breaches On Corporate Risk Factor Disclosure Tendencies, Sandra J. Cereola, Joanna Dynowska Jan 2019

Investigating The Impact Of Publicly Announced Information Security Breaches On Corporate Risk Factor Disclosure Tendencies, Sandra J. Cereola, Joanna Dynowska

Journal of Cybersecurity Education, Research and Practice

As the reported number of data breaches increase and senators push for more disclosure regulation, the SEC staff issued a guidance in 2011 on disclosure obligations relating to cybersecurity risks and incidents. More recently, on February 26, 2018 the SEC Commission issued interpretive guidance to help assist public companies prepare disclosures regarding cybersecurity risks and incidents. As reported incidents of cybersecurity breaches occur, investors are concerned about the risks associated with these incidents and the impact they may have on financial performance. Although the SEC staff guidance warns public companies to make timely disclosure, recognizing the threat that cybercrime poses …


Sit Back, Relax, And Tell Me All Your Secrets, Sarah Kirk, Daniel Foreman, Cody Lee, Shannon W. Beasley Jan 2019

Sit Back, Relax, And Tell Me All Your Secrets, Sarah Kirk, Daniel Foreman, Cody Lee, Shannon W. Beasley

Journal of Cybersecurity Education, Research and Practice

The goal of this research is to describe an active learning opportunity that was conducted as a community service offering through our Center for Cybersecurity Education and Applied Research (CCEAR). As a secondary goal, the participants sought to gain real world experience by applying techniques and concepts studied in security classes. A local insurance company tasked the CCEAR with assembling a team of students to conduct penetration testing (including social engineering exploits) against company personnel. The endeavor allowed the insurance company to obtain information that would assess the effectiveness of employee training with regard to preventing the divulgence of sensitive …


Research On Efficiency And Security For Emerging Distributed Applications, Zijiang Hao Jan 2019

Research On Efficiency And Security For Emerging Distributed Applications, Zijiang Hao

Dissertations, Theses, and Masters Projects

Distributed computing has never stopped its advancement since the early years of computer systems. In recent years, edge computing has emerged as an extension of cloud computing. The main idea of edge computing is to provide hardware resources in proximity to the end devices, thereby offering low network latency and high network bandwidth. However, as an emerging distributed computing paradigm, edge computing currently lacks effective system support. To this end, this dissertation studies the ways of building system support for edge computing. We first study how to support the existing, non-edge-computing applications in edge computing environments. This research leads to …


Call For Abstracts - Resrb 2019, July 8-9, Wrocław, Poland, Wojciech M. Budzianowski Dec 2018

Call For Abstracts - Resrb 2019, July 8-9, Wrocław, Poland, Wojciech M. Budzianowski

Wojciech Budzianowski

No abstract provided.


Automatic Program Rewriting In Non-Ground Answer Set Programs, Nicholas Hippen, Yuliya Lierler Dec 2018

Automatic Program Rewriting In Non-Ground Answer Set Programs, Nicholas Hippen, Yuliya Lierler

Yuliya Lierler

Answer set programming is a popular constraint programming paradigm that has seen wide use across various industry applications. However, logic programs under answer set semantics often require careful design and nontrivial expertise from a programmer to obtain satisfactory solving times. In order to reduce this burden on a software engineer we propose an automated rewriting technique for non-ground logic programs that we implement in a system Projector. We conduct rigorous experimental analysis, which shows that applying system Projector to a logic program can improve its performance, even after significant human-performed optimizations.


Strong Equivalence And Program's Structure In Arguing Essential Equivalence Between First-Order Logic Programs, Yuliya Lierler Dec 2018

Strong Equivalence And Program's Structure In Arguing Essential Equivalence Between First-Order Logic Programs, Yuliya Lierler

Yuliya Lierler

Answer set programming  is a prominent declarative programming paradigm used in formulating combinatorial search problems and implementing distinct knowledge representation formalisms. It is common that several related and yet substantially different answer set programs exist for a given problem. Sometimes these encodings may display significantly different performance. Uncovering precise formal links between these programs is often important and yet far from trivial. This paper claims the correctness   of a number of interesting program rewritings. Notably, they  assume  programs with variables and  such important language features as choice, disjunction, and aggregates. We showcase the utility of some considered rewritings  by using …


Identification And Parasocial Relationships With Characters From Star Wars: The Force Awakens., Alice E. Hall Dec 2018

Identification And Parasocial Relationships With Characters From Star Wars: The Force Awakens., Alice E. Hall

Alice Hall

This study investigated identification and parasocial relationships (PSRs) with media characters by examining viewers’ responses to the movie Star Wars: The Force Awakens through an online survey of 113 audience members who saw the film in a theater within a month of its release. Participants reported stronger PSR and identification with the more familiar characters from the first trilogy than with the new characters introduced in the film, although the association with identification was limited to older participants. Star Wars fanship was associated with identification and PSR for old and new characters. Familiarity with the earlier films was associated with …