Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Wright State University (15)
- City University of New York (CUNY) (11)
- Southern Methodist University (9)
- University of Denver (5)
- The College of Wooster (4)
-
- Bard College (3)
- Southwestern Oklahoma State University (2)
- Butler University (1)
- Elizabethtown College (1)
- Grand Valley State University (1)
- Technological University Dublin (1)
- The University of Akron (1)
- The University of Maine (1)
- University of Mary Washington (1)
- University of Massachusetts Amherst (1)
- University of Nebraska - Lincoln (1)
- Virginia Community College System (1)
- Western Washington University (1)
- Publication
-
- Browse all Theses and Dissertations (15)
- Open Educational Resources (11)
- Computer Science and Engineering Theses and Dissertations (7)
- Electronic Theses and Dissertations (6)
- Senior Independent Study Theses (4)
-
- Senior Projects Spring 2020 (2)
- Student Research (2)
- Civil and Environmental Engineering Theses and Dissertations (1)
- Computer Science Articles (1)
- Conference papers (1)
- Department of Computer Science and Engineering: Dissertations, Theses, and Student Research (1)
- Doctoral Dissertations (1)
- Inquiry: The Journal of the Virginia Community Colleges (1)
- Mathematics Theses and Dissertations (1)
- McNair Scholars Manuscripts (1)
- Senior Projects Fall 2020 (1)
- Summer Scholarship, Creative Arts and Research Projects (SCARP) (1)
- Undergraduate Honors Thesis Collection (1)
- WWU Honors College Senior Projects (1)
- Williams Honors College, Honors Research Projects (1)
- Publication Type
- File Type
Articles 1 - 30 of 60
Full-Text Articles in Physical Sciences and Mathematics
Analysis Of Github Pull Requests, Canon Ellis
Analysis Of Github Pull Requests, Canon Ellis
Computer Science and Engineering Theses and Dissertations
The popularity of the software repository site GitHub has created a rise in the Pull Based Development Models' use. An essential portion of pull-based development is the creation of Pull Requests. Pull Requests often have to be reviewed by an individual to be approved and accepted into the Master branch of a software repository. The reviewing process can often be time-consuming and introduce a relatively high level of lost development time. This paper examines thousands of pull requests to understand the most valuable metadata of pull requests. We then introduce metrics in comparing the metadata of pull requests to understand …
Deep Neural Network Based Student Response Modeling With Uncertainty, Multimodality And Attention, Xinyi Ding
Deep Neural Network Based Student Response Modeling With Uncertainty, Multimodality And Attention, Xinyi Ding
Computer Science and Engineering Theses and Dissertations
In this thesis, I investigate deep neural network based student response modeling, more specifically Knowledge Tracing (KT). Knowledge Tracing allows Intelligent Tutoring Systems to infer which topics or skills a student has mastered, thus adjusting curriculum accordingly. Deep neural network based knowledge tracing models like Deep Knowledge Tracing (DKT) and Dynamic Key-Value Memory Network (DKVMN) have achieved significant improvements compared with conventional probabilistic models. There are mainly two goals in this thesis: 1) To have a better understanding of existing deep neural network based models and their predictions through visualization and through incorporating uncertainties. 2) To improve the performance of …
Analyzing Performance, Energy Consumption, And Reliability Of Mobile Applications, Osama Barack
Analyzing Performance, Energy Consumption, And Reliability Of Mobile Applications, Osama Barack
Computer Science and Engineering Theses and Dissertations
Mobile applications have become a high priority for software developers. Researchers and practitioners are working toward improving and optimizing the energy efficiency and performance of mobile applications due to the capacity limitation of mobile device processors and batteries. In addition, mobile applications have become popular among end-users, developers have introduced a wide range of features that increase the complexity of application code.
To improve and enhance the maintainability, extensibility, and understandability of application code, refactoring techniques were introduced. However, implementing such techniques to mobile applications affects energy efficiency and performance. To evaluate and categorize software implementation and optimization efficiency, several …
Multigrid For The Nonlinear Power Flow Equations, Enrique Pereira Batista
Multigrid For The Nonlinear Power Flow Equations, Enrique Pereira Batista
Mathematics Theses and Dissertations
The continuously changing structure of power systems and the inclusion of renewable
energy sources are leading to changes in the dynamics of modern power grid,
which have brought renewed attention to the solution of the AC power flow equations.
In particular, development of fast and robust solvers for the power flow problem
continues to be actively investigated. A novel multigrid technique for coarse-graining
dynamic power grid models has been developed recently. This technique uses an
algebraic multigrid (AMG) coarsening strategy applied to the weighted
graph Laplacian that arises from the power network's topology for the construction
of coarse-grain approximations to …
Algorithms For Massive, Expensive, Or Otherwise Inconvenient Graphs, David Tench
Algorithms For Massive, Expensive, Or Otherwise Inconvenient Graphs, David Tench
Doctoral Dissertations
A long-standing assumption common in algorithm design is that any part of the input is accessible at any time for unit cost. However, as we work with increasingly large data sets, or as we build smaller devices, we must revisit this assumption. In this thesis, I present some of my work on graph algorithms designed for circumstances where traditional assumptions about inputs do not apply.
1. Classical graph algorithms require direct access to the input graph and this is not feasible when the graph is too large to fit in memory. For computation on massive graphs we consider the dynamic …
Packet Delivery: An Investigation Of Educational Video Games For Computer Science Education, Robert Lafferty
Packet Delivery: An Investigation Of Educational Video Games For Computer Science Education, Robert Lafferty
Department of Computer Science and Engineering: Dissertations, Theses, and Student Research
The field of educational video games has rapidly grown since the 1970s, mostly producing video games to teach core education concepts such as mathematics, natural science, and English. Recently, various research groups have developed educational games to address elective topics such as finance and health. Educational video games often target grade school audiences and rarely target high school students, college students, or adults. Computer science topics are not a common theme among educational video games; the games that address Computer Science topics teach computer fundamentals, such as typing or basic programming, to young audiences.
Packet Delivery, an educational video …
Connecting Swosu To The Open Science Grid, Arianna Martin, Jeremy Evert
Connecting Swosu To The Open Science Grid, Arianna Martin, Jeremy Evert
Student Research
No abstract provided.
Systems And Network Administration - Introduction, Jimmy Richford, Nyc Tech-In-Residence Corps
Systems And Network Administration - Introduction, Jimmy Richford, Nyc Tech-In-Residence Corps
Open Educational Resources
Lecture for CISC 4311: Systems and Network Administration (Fall 2020)
Cisc 4331 – Systems And Network Administration - Week 5, Jimmy Richford, Nyc Tech-In-Residence Corps
Cisc 4331 – Systems And Network Administration - Week 5, Jimmy Richford, Nyc Tech-In-Residence Corps
Open Educational Resources
Lecture 5 for CISC 4331 - Systems and Network Administration
Cisc 4331 – Systems And Network Administration - Week 3, Jimmy Richford, Nyc Tech-In-Residence Corps
Cisc 4331 – Systems And Network Administration - Week 3, Jimmy Richford, Nyc Tech-In-Residence Corps
Open Educational Resources
Lecture 3 for CISC 4331: Systems and Network Administration
Cisc 4331 – Systems And Network Administration Week 6, Jimmy Richford, Nyc Tech-In-Residence Corps
Cisc 4331 – Systems And Network Administration Week 6, Jimmy Richford, Nyc Tech-In-Residence Corps
Open Educational Resources
Lecture 6 for CISC 4331 - Systems and Network Administration
Cisc 4331 – Systems And Network Administration - Week 4, Jimmy Richford, Nyc Tech-In-Residence Corps
Cisc 4331 – Systems And Network Administration - Week 4, Jimmy Richford, Nyc Tech-In-Residence Corps
Open Educational Resources
Lecture 4 for CISC 4331 - Systems and Network Administration
Cisc 4331 – Systems And Network Administration - Week 2, Jimmy Richford, Nyc Tech-In-Residence Corps
Cisc 4331 – Systems And Network Administration - Week 2, Jimmy Richford, Nyc Tech-In-Residence Corps
Open Educational Resources
Lecture 2 for CISC 4331: Systems and Network Administration
Lecture - Csci 275: Linux Systems Administration And Security, Moe Hassan, Nyc Tech-In-Residence Corps
Lecture - Csci 275: Linux Systems Administration And Security, Moe Hassan, Nyc Tech-In-Residence Corps
Open Educational Resources
Lecture for CSCI 275: Linux Systems Administration and Security
Characterizing The Behavior Of Mutated Proteins With Emcap: The Energy Minimization Curve Analysis Pipeline, Matthew Lee, Bodi Van Roy, Filip Jagodzinski
Characterizing The Behavior Of Mutated Proteins With Emcap: The Energy Minimization Curve Analysis Pipeline, Matthew Lee, Bodi Van Roy, Filip Jagodzinski
WWU Honors College Senior Projects
Studies of protein mutants in wet laboratory experiments are expensive and time consuming. Computational experiments that simulate the motions of protein with amino acid substitutions can complement wet lab experiments for studying the effects of mutations. In this work we present a computational pipeline that performs exhaustive single-point amino acid substitutions in silico. We perform energy minimization as part of molecular dynamics (MD) of our generated mutant proteins, and the wild type, and log the energy potentials for each step of the simulations. We motivate several metrics that rely on the energy minimization curves of the wild type and mutant, …
Chapter 4 Report: Strings And Hexadecimals: Explained And Explored, Reed Kessler, Jeremy Evert
Chapter 4 Report: Strings And Hexadecimals: Explained And Explored, Reed Kessler, Jeremy Evert
Student Research
What I learned from doing all three of these problems is the use of string statements, along with a better understanding of hexadecimals and their uses.
Tag: Automated Image Captioning, Nathan Funckes
Tag: Automated Image Captioning, Nathan Funckes
McNair Scholars Manuscripts
Many websites remain non-ADA compliant, containing images which lack accompanying textual descriptions. This leaves sight-impaired individuals unable to fully enjoy the rich wonders of the web. To address this inequity, our research aims to create an autonomous system capable of generating semantically accurate descriptions of images. This problem involves two tasks: recognizing an image and linguistically describing it. Our solution uses state-of-the-art deep learning: employing a convolutional neural network that "learns" to understand images and extracts their salient features, and a recurrent neural network that learns to generate structured, coherent sentences. These two networks are merged to create a single …
A Modeling Framework For Urban Growth Prediction Using Remote Sensing And Video Prediction Technologies: A Time-Dependent Convolutional Encoder-Decoder Architecture, Ahmed Hassan Jaad
A Modeling Framework For Urban Growth Prediction Using Remote Sensing And Video Prediction Technologies: A Time-Dependent Convolutional Encoder-Decoder Architecture, Ahmed Hassan Jaad
Civil and Environmental Engineering Theses and Dissertations
Studying the growth pattern of cities/urban areas has received considerable attention during the past few decades. The goal is to identify directions and locations of potential growth, assess infrastructure and public service requirements, and ensure the integration of the new developments with the existing city structure. This dissertation presents a novel model for urban growth prediction using a novel machine learning model. The model treats successive historical satellite images of the urban area under consideration as a video for which future frames are predicted. A time-dependent convolutional encoder-decoder architecture is adopted. The model considers as an input a satellite image …
Cognition And Context-Aware Computing: Towards A Situation-Aware System With A Case Study In Aviation, Justin C. Wilson
Cognition And Context-Aware Computing: Towards A Situation-Aware System With A Case Study In Aviation, Justin C. Wilson
Computer Science and Engineering Theses and Dissertations
In aviation, flight instructors seek to comprehend the intent and awareness of their students. With this awareness, derived from in-flight observation and post-flight examination, a human instructor can infer the internal contexts of their student aviators as they perform. It is this understanding that is fundamental for evaluating student development. Further, a well-understood construct for describing the state of knowledge about a dynamic environment is known as situational awareness (SA). Often pilot error is associated with SA [80], and it is fundamental to flight safety and mission execution. If these contexts can be automatically inferred, instructors and students can more …
Preparing Students For Digital Era Careers, Melissa Stange
Preparing Students For Digital Era Careers, Melissa Stange
Inquiry: The Journal of the Virginia Community Colleges
This paper will discuss why technical skills alone will not be enough for students to have successful careers in the digital age. Much of their success will hinge on critical soft skills, such as adaptability, inner strength, holistic thinking, and a collaborative spirit. Examples will be provided for inclusion with a computer science program, but in a way that is easily adaptable to other disciplines.
Anta: Accelerated Network Traffic Analytics., Matthew Grohotolski, Connor Dileo
Anta: Accelerated Network Traffic Analytics., Matthew Grohotolski, Connor Dileo
Summer Scholarship, Creative Arts and Research Projects (SCARP)
Implementing traditional machine learning models and neural networks has become trivial in detecting malicious network traffic and has sparked interest in many researchers investigating this field. Standard implementations include using the baseline models in packages such as sklearn, tensorflow, and keras. In this paper we seek to advance the field of network detection and produce results which will have great benefits in terms of speed and performance of these models. We take advantage of Intel’s DAAL and OpenVINO packages as they are the two best performance enhancing methods which are publicly available today. Furthermore, comparisons will be made to determine …
The Prom Problem: Fair And Privacy-Enhanced Matchmaking With Identity Linked Wishes, Dwight Horne
The Prom Problem: Fair And Privacy-Enhanced Matchmaking With Identity Linked Wishes, Dwight Horne
Computer Science and Engineering Theses and Dissertations
In the Prom Problem (TPP), Alice wishes to attend a school dance with Bob and needs a risk-free, privacy preserving way to find out whether Bob shares that same wish. If not, no one should know that she inquired about it, not even Bob. TPP represents a special class of matchmaking challenges, augmenting the properties of privacy-enhanced matchmaking, further requiring fairness and support for identity linked wishes (ILW) – wishes involving specific identities that are only valid if all involved parties have those same wishes.
The Horne-Nair (HN) protocol was proposed as a solution to TPP along with a …
Automating Cyber Analytics, Matthew Zaber
Automating Cyber Analytics, Matthew Zaber
Computer Science and Engineering Theses and Dissertations
Model based security metrics are a growing area of cyber security research concerned with measuring the risk exposure of an information system. These metrics are typically studied in isolation, with the formulation of the test itself being the primary finding in publications. As a result, there is a flood of metric specifications available in the literature but a corresponding dearth of analyses verifying results for a given metric calculation under different conditions or comparing the efficacy of one measurement technique over another. The motivation of this thesis is to create a systematic methodology for model based security metric development, analysis, …
First-Year Computer Science Students: Pathways And Perceptions In Introductory Computer Science Courses, Christina A. Leblanc
First-Year Computer Science Students: Pathways And Perceptions In Introductory Computer Science Courses, Christina A. Leblanc
Electronic Theses and Dissertations
This study examined student perceptions and experiences of an introductory Computer Science course at the University of Maine; COS 125: Introduction to Problem Solving Using Computer Programs. It also explored the pathways that students pursue after taking COS 125, depending on their success in the course, and their motivation to persist. Through characterizing student populations and their performance in their first semester in the Computer Science program, they can be placed into one of three categories that explain their path; a “continuer” (passed COS 125 and decided to stay in the major), a “persister” (did not pass COS 125 and …
Heuristics For Sparsest Cut Approximations In Network Flow Applications, Fernando Vilas
Heuristics For Sparsest Cut Approximations In Network Flow Applications, Fernando Vilas
Computer Science and Engineering Theses and Dissertations
The Maximum Concurrent Flow Problem (MCFP) is a polynomially bounded problem that has been used over the years in a variety of applications. Sometimes it is used to attempt to find the Sparsest Cut, an NP-hard problem, and other times to find communities in Social Network Analysis (SNA) in its hierarchical formulation, the HMCFP. Though it is polynomially bounded, the MCFP quickly grows in space utilization, rendering it useful on only small problems. When it was defined, only a few hundred nodes could be solved, where a few decades later, graphs of one to two thousand nodes can still be …
Csci 49378: Introduction To Distributed System And Cloudcomputing: Syllabus, Bonan Liu, Nyc Tech-In-Residence Corps
Csci 49378: Introduction To Distributed System And Cloudcomputing: Syllabus, Bonan Liu, Nyc Tech-In-Residence Corps
Open Educational Resources
Syllabus: for CSCI 49378: Introduction to Distributed Systems and Cloud Computing (Spring 2020)
Cis 4400 Data Warehousing - Lecture 2, Royce Kok, B Madhusudan, Nyc Tech-In-Residence Corps
Cis 4400 Data Warehousing - Lecture 2, Royce Kok, B Madhusudan, Nyc Tech-In-Residence Corps
Open Educational Resources
Lecture 2 for CIS 4400: Data Warehousing (Spring 2020)
Topics In Artifical Intelligence, Hunter Mcnichols, Nyc Tech-In-Residence Corps
Topics In Artifical Intelligence, Hunter Mcnichols, Nyc Tech-In-Residence Corps
Open Educational Resources
Syllabus for the course "CSC 59974: Special Topics in Artificial Intelligence" delivered at the City College of New York in Spring 2020 by Hunter McNichols as part of the Tech-in-Residence Corps program.
Cis 356-Zi81: Intermediate-Level Topics In Computer Applications (Spring 2020), Fahad Choudhury, Nyc Tech-In-Residence Corps
Cis 356-Zi81: Intermediate-Level Topics In Computer Applications (Spring 2020), Fahad Choudhury, Nyc Tech-In-Residence Corps
Open Educational Resources
Syllabus for CIS 356-ZI81: Intermediate-Level Topics in Computer Applications (Spring 2020)
Incorporating Digital Ethics Throughout The Software Development Process, Michael Collins, Damian Gordon, Anna Becevel, William O'Mahony
Incorporating Digital Ethics Throughout The Software Development Process, Michael Collins, Damian Gordon, Anna Becevel, William O'Mahony
Conference papers
The media is reporting scandals associated with computer companies with increasing regularity; whether it is the misuse of user data, breach of privacy concerns, the use of biased artificial intelligence, or the problems of automated vehicles. Because of these complex issues, there is a growing need to equip computer science students with a deep appreciation of ethics, and to ensure that in the future they will develop computer systems that are ethically-based. One particularly useful strand of their education to incorporate ethics into is when teaching them about the formal approaches to developing computer systems.
There are a number of …