Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

2020

Computer Science

Institution
Publication
Publication Type
File Type

Articles 31 - 60 of 60

Full-Text Articles in Physical Sciences and Mathematics

Improving Pain Management In Patients With Sickle Cell Disease Using Machine Learning Techniques, Fan Yang Jan 2020

Improving Pain Management In Patients With Sickle Cell Disease Using Machine Learning Techniques, Fan Yang

Browse all Theses and Dissertations

Sickle cell disease (SCD) is an inherited red blood cell disorder that can cause a multitude of complications throughout a patient's life. Pain is the most common complication and a significant cause of morbidity. Since pain is a highly subjective experience, both medical providers and patients express difficulty in determining ideal treatment and management strategies for pain. Therefore, the development of objective pain assessment and pain forecasting methods is critical to pain management in SCD. On the other hand, the rapidly increasing use of mobile health (mHealth) technology and wearable devices gives the ability to build a remote health intervention …


Computer Vision Gesture Recognition For Rock Paper Scissors, Nicholas Hunter Jan 2020

Computer Vision Gesture Recognition For Rock Paper Scissors, Nicholas Hunter

Senior Independent Study Theses

This project implements a human versus computer game of rock-paper-scissors using machine learning and computer vision. Player’s hand gestures are detected using single images with the YOLOv3 object detection system. This provides a generalized detection method which can recognize player moves without the need for a special background or lighting setup. Additionally, past moves are examined in context to predict the most probable next move of the system’s opponent. In this way, the system achieves higher win rates against human opponents than by using a purely random strategy.


Managing Inventory: A Study Of Databases And Database Management Systems, Jemal M. Jemal Jan 2020

Managing Inventory: A Study Of Databases And Database Management Systems, Jemal M. Jemal

Senior Independent Study Theses

Databases play an important role in the storage and manipulation of data. Databases and database management systems allow for fast and efficient data querying that has recently become increasingly important in most companies and organizations. This paper introduces a few of the different types of database management systems that are in widespread use today. It introduces some important terminology related to databases and database management systems. This paper also briefly discusses web user interfaces, highlighting important user interface design principles. Finally, an inventory management system is implemented for a local stationery store and is integrated with a web application to …


A Cool Brisk Walk Through Discrete Mathematics, Stephen Davies Jan 2020

A Cool Brisk Walk Through Discrete Mathematics, Stephen Davies

Computer Science Articles

A Cool Brisk Walk Through Discrete Mathematics - and its companion site "allthemath" - are completely-and-forever-free-and-open-source educational materials dedicated to the mathematics that budding computer science practitioners actually need to know. They feature the fun and addictive teaching of award-winning lecturer Dr. Stephen Davies of the University of Mary Washington in Fredericksburg, Virginia!


Testing And Improving An Optimization-Based Digital Colorblindness Corrective Filter, Zachary Kenneth Mcintyre Jan 2020

Testing And Improving An Optimization-Based Digital Colorblindness Corrective Filter, Zachary Kenneth Mcintyre

Senior Projects Fall 2020

Computers often communicate essential information via color which is lost to colorblind users. In order to address this information loss, designers and computer scientists have created a variety of different correction methods to improve computer accessibility. One such method was created by Luke Jefferson and Richard Harvey in their 2006 paper, “Accommodating Color Blind Computer Users” which consists of a difference histogram, differences of key colors, optimization and interpolation to adjust images for specific types of congenital colorblindness. I have recreated their algorithm as well as their original test images. I then conducted extensive tests on challenging images to examine …


The Spiral Model For Generative Harmony, Jackson Guy Spargur Jan 2020

The Spiral Model For Generative Harmony, Jackson Guy Spargur

Senior Projects Spring 2020

Generative music is a broad and well-explored field, in which researchers have attempted various approaches at creating algorithmic models for the creation of music. Researchers may attempt to model the composition of melody, or of musical phrase structure, or, as is the focus of this paper, the harmonization of multiple voices. I use as the core of my model Elaine Chew’s “Spiral Array”, outlined in her 2000 thesis “Towards a Mathematical Model Of Tonality”. Chew’s applications for this model were all analytical, gaining insights about human-composed pieces of music by running them through her model. My project is comprised of …


Extracting Information From Subroutines Using Static Analysis Semantics, Luke A. Burnett Jan 2020

Extracting Information From Subroutines Using Static Analysis Semantics, Luke A. Burnett

Browse all Theses and Dissertations

Understanding how a system component can interact with other services can take an immeasurable amount of time. Reverse engineering embedded and large systems can rely on understanding how components interact with one another. This process is time consuming and can sometimes be generalized through certain behavior.We will be explaining two such complicated systems and highlighting similarities between them. We will show that through static analysis you can capture compiler behavior and apply it to the understanding of a function, reducing the total time required to understand a component of whichever system you are learning.


Finding Data Races In Software Binaries With Symbolic Execution, Nathan D. Jackson Jan 2020

Finding Data Races In Software Binaries With Symbolic Execution, Nathan D. Jackson

Browse all Theses and Dissertations

Modern software applications frequently make use of multithreading to utilize hardware resources better and promote application responsiveness. In these applications, threads share the program state, and synchronization mechanisms ensure proper ordering of accesses to the program state. When a developer fails to implement synchronization mechanisms, data races may occur. Finding data races in an automated way is an already challenging problem, but often impractical without source code or understanding how to execute the program under analysis. In this thesis, we propose a solution for finding data races on software binaries and present our prototype implementation BINRELAY. Our solution makes use …


Hierarchical Anomaly Detection For Time Series Data, Ryan E. Sperl Jan 2020

Hierarchical Anomaly Detection For Time Series Data, Ryan E. Sperl

Browse all Theses and Dissertations

With the rise of Big Data and the Internet of Things, there is an increasing availability of large volumes of real-time streaming data. Unusual occurrences in the underlying system will be reflected in these streams, but any human analysis will quickly become out of date. There is a need for automatic analysis of streaming data capable of identifying these anomalous behaviors as they occur, to give ample time to react. In order to handle many high-velocity data streams, detectors must minimize the processing requirements per value. In this thesis, we have developed a novel anomaly detection method which makes use …


Automated Change Detection In Privacy Policies, Andrick Adhikari Jan 2020

Automated Change Detection In Privacy Policies, Andrick Adhikari

Electronic Theses and Dissertations

Privacy policies notify Internet users about the privacy practices of websites, mobile apps, and other products and services. However, users rarely read them and struggle to understand their contents. Also, the entities that provide these policies are sometimes unmotivated to make them comprehensible. Due to the complicated nature of these documents, it gets even harder for users to understand and take note of any changes of interest or concern when these policies are changed or revised.

With recent development of machine learning and natural language processing, tools that can automatically annotate sentences of policies have been developed. These annotations can …


Using Natural Language Processing To Categorize Fictional Literature In An Unsupervised Manner, Dalton J. Crutchfield Jan 2020

Using Natural Language Processing To Categorize Fictional Literature In An Unsupervised Manner, Dalton J. Crutchfield

Electronic Theses and Dissertations

When following a plot in a story, categorization is something that humans do without even thinking; whether this is simple classification like “This is science fiction” or more complex trope recognition like recognizing a Chekhov's gun or a rags to riches storyline, humans group stories with other similar stories. Research has been done to categorize basic plots and acknowledge common story tropes on the literary side, however, there is not a formula or set way to determine these plots in a story line automatically. This paper explores multiple natural language processing techniques in an attempt to automatically compare and cluster …


Certification-Driven Testing Of Safety-Critical Systems, Aiman S. Gannous Jan 2020

Certification-Driven Testing Of Safety-Critical Systems, Aiman S. Gannous

Electronic Theses and Dissertations

Safety-critical systems are those systems that when they fail they could cause loss of life or significant physical damages. Since software now is an essential component of these types of systems, failures caused by software faults could come from flaws in the software development life-cycle. As a result, challenges unfold in two directions. First, in verifying that the software will not put the system in an unsafe state, and identifying external failures and mitigate them properly. Second, in providing sufficient evidence for an efficient safety certification process. In this study, we propose an approach for testing safety-critical systems called Model-Combinatorial …


Renewable Energy Integration In Distribution System With Artificial Intelligence, Yi Gu Jan 2020

Renewable Energy Integration In Distribution System With Artificial Intelligence, Yi Gu

Electronic Theses and Dissertations

With the increasing attention of renewable energy development in distribution power system, artificial intelligence (AI) can play an indispensiable role. In this thesis, a series of artificial intelligence based methods are studied and implemented to further enhance the performance of power system operation and control.

Due to the large volume of heterogeneous data provided by both the customer and the grid side, a big data visualization platform is built to feature out the hidden useful knowledge for smart grid (SG) operation, control and situation awareness. An open source cluster calculation framework with Apache Spark is used to discover big data …


Real-Time Detection Of Demand Manipulation Attacks On A Power Grid, Srinidhi Madabhushi Jan 2020

Real-Time Detection Of Demand Manipulation Attacks On A Power Grid, Srinidhi Madabhushi

Electronic Theses and Dissertations

An increased usage in IoT devices across the globe has posed a threat to the power grid. When an attacker has access to multiple IoT devices within the same geographical location, they can possibly disrupt the power grid by regulating a botnet of high-wattage IoT devices. Based on the time and situation of the attack, an adversary needs access to a fixed number of IoT devices to synchronously switch on/off all of them, resulting in an imbalance between the supply and demand. When the frequency of the power generators drops below a threshold value, it can lead to the generators …


Remembering The City: An Augmented Reality Reconstruction Of Memory, Power, And Identity In Ho Chi Minh City Through Cartography & Architecture, Thuy Dinh Jan 2020

Remembering The City: An Augmented Reality Reconstruction Of Memory, Power, And Identity In Ho Chi Minh City Through Cartography & Architecture, Thuy Dinh

Senior Independent Study Theses

Cartography and architecture are official channels that facilitate remembrance in Ho Chi Minh City. Maps and buildings serve as sites for actors of memory to manipulate the city's narratives and shape its collective identity. Power enables the production of space and knowledge through sites of memory. The ruling regimes of Ho Chi Minh City have leveraged control over the natural environment and the local population to create new forms of materials that propagate their ideologies and ideals for the city. Alterations to the natural and built environments in the city legitimize the authorities' official narratives for its history and future …


From Rural To Urban: Understanding America Through The Census, R. Owen Hartman Jan 2020

From Rural To Urban: Understanding America Through The Census, R. Owen Hartman

Senior Projects Spring 2020

The first ever Senior Project to combine Historical Studies and Computer Science. Examining United States Census data from 1870 to 1930, "From Rural to Urban" explores the changes in American life that occurred during the industrial revolution at the turn of the 20th century.


The Knapsack Subproblem Of The Algorithm To Compute The Erdos-Selfridge Function, Brianna Sorenson Jan 2020

The Knapsack Subproblem Of The Algorithm To Compute The Erdos-Selfridge Function, Brianna Sorenson

Undergraduate Honors Thesis Collection

This thesis summarizes the methodology of a new algorithm to compute the Erdos-Selfridge function which uses a wheel sieve, shows that a knapsack algorithm can be used to minimize the work needed to compute these values by selecting a subset of rings for use in the wheel, and compares the results of several different knapsack algorithms in this particular scenario.


Cheat Detection Using Machine Learning Within Counter-Strike: Global Offensive, Harry Dunham Jan 2020

Cheat Detection Using Machine Learning Within Counter-Strike: Global Offensive, Harry Dunham

Senior Independent Study Theses

Deep learning is becoming a steadfast means of solving complex problems that do not have a single concrete or simple solution. One complex problem that fits this description and that has also begun to appear at the forefront of society is cheating, specifically within video games. Therefore, this paper presents a means of developing a deep learning framework that successfully identifies cheaters within the video game CounterStrike: Global Offensive. This approach yields predictive accuracy metrics that range between 80-90% depending on the exact neural network architecture that is employed. This approach is easily scalable and applicable to all types of …


Predicting Subjective Sleep Quality Using Objective Measurements In Older Adults, Reza Sadeghi Jan 2020

Predicting Subjective Sleep Quality Using Objective Measurements In Older Adults, Reza Sadeghi

Browse all Theses and Dissertations

Humans spend almost a third of their lives asleep. Sleep has a pivotal effect on job performance, memory, fatigue recovery, and both mental and physical health. Sleep quality (SQ) is a subjective experience and reported via patients’ self-reports. Predicting subjective SQ based on objective measurements can enhance diagnosis and treatment of SQ defects, especially in older adults who are subject to poor SQ. In this dissertation, we assessed enhancement of subjective SQ prediction using an easy-to-use E4 wearable device, machine learning techniques and identifying disease-specific risk factors of abnormal SQ in older adults. First, we designed a clinical decision support …


Design Of A Novel Wearable Ultrasound Vest For Autonomous Monitoring Of The Heart Using Machine Learning, Garrett G. Goodman Jan 2020

Design Of A Novel Wearable Ultrasound Vest For Autonomous Monitoring Of The Heart Using Machine Learning, Garrett G. Goodman

Browse all Theses and Dissertations

As the population of older individuals increases worldwide, the number of people with cardiovascular issues and diseases is also increasing. The rate at which individuals in the United States of America and worldwide that succumb to Cardiovascular Disease (CVD) is rising as well. Approximately 2,303 Americans die to some form of CVD per day according to the American Heart Association. Furthermore, the Center for Disease Control and Prevention states that 647,000 Americans die yearly due to some form of CVD, which equates to one person every 37 seconds. Finally, the World Health Organization reports that the number one cause of …


Stream Clustering And Visualization Of Geotagged Text Data For Crisis Management, Nathaniel C. Crossman Jan 2020

Stream Clustering And Visualization Of Geotagged Text Data For Crisis Management, Nathaniel C. Crossman

Browse all Theses and Dissertations

In the last decade, the advent of social media and microblogging services have inevitably changed our world. These services produce vast amounts of streaming data, and one of the most important ways of analyzing and discovering interesting trends in the streaming data is through clustering. In clustering streaming data, it is desirable to perform a single pass over incoming data, such that we do not need to process old data again, and the clustering model should evolve over time not to lose any important feature statistics of the data. In this research, we have developed a new clustering system that …


An Adversarial Framework For Deep 3d Target Template Generation, Walter E. Waldow Jan 2020

An Adversarial Framework For Deep 3d Target Template Generation, Walter E. Waldow

Browse all Theses and Dissertations

This paper presents a framework for the generation of 3D models. This is an important problem for many reasons. For example, 3D models are important for systems that are involved in target recognition. These systems use 3D models to train up accuracy on identifying real world object. Traditional means of gathering 3D models have limitations that the generation of 3D models can help overcome. The framework uses a novel generative adversarial network (GAN) that learns latent representations of two dimensional views of a model to bootstrap the network’s ability to learn to generate three dimensional objects. The novel architecture is …


Geoaware - A Simulation-Based Framework For Synthetic Trajectory Generation From Mobility Patterns, Jameson D. Morgan Jan 2020

Geoaware - A Simulation-Based Framework For Synthetic Trajectory Generation From Mobility Patterns, Jameson D. Morgan

Browse all Theses and Dissertations

Recent advances in location acquisition services have resulted in vast amounts of trajectory data; providing valuable insight into human mobility. The field of trajectory data mining has exploded as a result, with literature detailing algorithms for (pre)processing, map matching, pattern mining, and the like. Unfortunately, obtaining trajectory data for the design and evaluation of such algorithms is problematic due to privacy, ethical, dataset size, researcher access, and sampling frequency concerns. Synthetic trajectories provide a solution to such a problem as they are cheap to produce and are derived from a fully controllable generation procedure. Citing deficiencies in modern synthetic trajectory …


Topological Analysis Of Averaged Sentence Embeddings, Wesley J. Holmes Jan 2020

Topological Analysis Of Averaged Sentence Embeddings, Wesley J. Holmes

Browse all Theses and Dissertations

Sentence embeddings are frequently generated by using complex, pretrained models that were trained on a very general corpus of data. This thesis explores a potential alternative method for generating high-quality sentence embeddings for highly specialized corpora in an efficient manner. A framework for visualizing and analyzing sentence embeddings is developed to help assess the quality of sentence embeddings for a highly specialized corpus of documents related to the 2019 coronavirus epidemic. A Topological Data Analysis (TDA) technique is explored as an alternative method for grouping embeddings for document clustering and topic modeling tasks and is compared to a simple clustering …


Quantitative Susceptibility Mapping (Qsm) Reconstruction From Mri Phase Data, Sara Gharabaghi Jan 2020

Quantitative Susceptibility Mapping (Qsm) Reconstruction From Mri Phase Data, Sara Gharabaghi

Browse all Theses and Dissertations

Quantitative susceptibility mapping (QSM) is a powerful technique that reveals changes in the underlying tissue susceptibility distribution. It can be used to measure the concentrations of iron and calcium in the brain both of which are linked with numerous neurodegenerative diseases. However, reconstructing the QSM image from the MRI phase data is an ill-posed inverse problem. Different methods have been proposed to overcome this difficulty. Still, the reconstructed QSM images suffer from streaking artifacts and underestimate the measured susceptibility of deep gray matter, veins, and other high susceptibility regions. This thesis proposes a structurally constrained Susceptibility Weighted Imaging and Mapping …


Enabling Static Program Analysis Using A Graph Database, Jialun Liu Jan 2020

Enabling Static Program Analysis Using A Graph Database, Jialun Liu

Browse all Theses and Dissertations

This thesis presents the design, the implementation, and the evaluation of a database-oriented static program analysis engine for the PHP programming language. This engine analyzes PHP programs by representing their semantics using a graph-based data structure, which will be subsequently stored into a graph database. Such scheme will fundamentally facilitate various program analysis tasks such as static taint analysis, visualization, and data mining. Specifically, these complex program analysis tasks can now be translated into built-in declarative graph database operations with rich features. Our engine fundamentally differs from other existing static program analysis systems that mainly leverage intermediate representation (IRs) to …


Development Of Real-Time Systems For Supporting Collaborations In Distributed Human And Machine Teams, Aishwarya Bositty Jan 2020

Development Of Real-Time Systems For Supporting Collaborations In Distributed Human And Machine Teams, Aishwarya Bositty

Browse all Theses and Dissertations

Real-time distributed systems constitute computing nodes that are connected by a network and coordinate with one another to accomplish a cooperative task, combining the responsiveness, fault-tolerance and geographic independence to support time-constrained collaborative applications, including distributed Human-Machine Teaming. In this thesis research the viability of real-time distributed collaborative technologies is demonstrated through the design, development and validation of prototype systems that support two human-machine teaming scenarios namely, ACE-IMS (Affirmation Cue based Interruption Management Systems) and ReadMI (Real-time Assessment of Dialogue in Motivational Interview). ACE-IMS demonstrates how a combination of AI capabilities and the cloud and mobile computing infrastructure can be …


Stream Clustering And Visualization Of Geotagged Text Data For Crisis Management, Nathaniel C. Crossman Jan 2020

Stream Clustering And Visualization Of Geotagged Text Data For Crisis Management, Nathaniel C. Crossman

Browse all Theses and Dissertations

In the last decade, the advent of social media and microblogging services have inevitably changed our world. These services produce vast amounts of streaming data, and one of the most important ways of analyzing and discovering interesting trends in the streaming data is through clustering. In clustering streaming data, it is desirable to perform a single pass over incoming data, such that we do not need to process old data again, and the clustering model should evolve over time not to lose any important feature statistics of the data. In this research, we have developed a new clustering system that …


Identifying Knowledge Gaps Using A Graph-Based Knowledge Representation, Daniel P. Schmidt Jan 2020

Identifying Knowledge Gaps Using A Graph-Based Knowledge Representation, Daniel P. Schmidt

Browse all Theses and Dissertations

Knowledge integration and knowledge bases are becoming more and more prevalent in the systems we use every day. When developing these knowledge bases, it is important to ensure the correctness of the information upon entry, as well as allow queries of all sorts; for this, understanding where the gaps in knowledge can arise is critical. This thesis proposes a descriptive taxonomy of knowledge gaps, along with a framework for automated detection and resolution of some of those gaps. Additionally, the effectiveness of this framework is evaluated in terms of successful responses to queries on a knowledge base constructed from a …


Telecommunications Database, Tristan Hess Jan 2020

Telecommunications Database, Tristan Hess

Williams Honors College, Honors Research Projects

The final goal of this project was to create a web application that is specifically tailored to make management of data for the Telecommunications department easier. The software that the department uses for phone service generates monthly reports that cannot be stored into their current database system. The Telecommunications Database project is a four-tier web application that was developed to store the monthly report information and alleviate the burden of manually searching through the reports for information. The web application implements basic database functionality for searching, inserting, updating, and deleting data contained in the monthly reports. Advanced searching functionality and …