Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

Computer

Institution
Publication Year
Publication
Publication Type

Articles 1 - 30 of 77

Full-Text Articles in Physical Sciences and Mathematics

Relative Comparison Of Modern Computing To Computer Technology Of Ages, Iwasan D. Kejawa Dr., Hailly Rubio Ms. Dec 2023

Relative Comparison Of Modern Computing To Computer Technology Of Ages, Iwasan D. Kejawa Dr., Hailly Rubio Ms.

School of Computing: Faculty Publications

Abstract

Abstract

Are there differences and similarities between the computer technology of today and yesterdays. Research had shown that there had been tremendous improvements from the computers of ages (traditional Computers) as we enter the 21st century. Both the physicality and the functionalities of computers have changed but some remain the same. The memory capacity and functions have changed, but all are still based on the old concepts of yesteryears.



Culture In Computing: The Importance Of Developing Gender-Inclusive Software, Creighton France May 2023

Culture In Computing: The Importance Of Developing Gender-Inclusive Software, Creighton France

Computer Science and Computer Engineering Undergraduate Honors Theses

The field of computing as we know it today exists because of the contributions of numerous female mathematicians, computer scientists, and programmers. While working with hardware was viewed as “a man’s job” during the mid-20th century, computing and programming was viewed as a noble and high-paying field for women to occupy. However, as time has progressed, the U.S. has seen a decrease in the number of women pursuing computer science. The idea that computing is a masculine discipline is common in the U.S. today for reasons such as male-centered marketing of electronics and gadgets, an inaccurate representation of what it …


Chicken Keypoint Estimation, Rohit Kala May 2023

Chicken Keypoint Estimation, Rohit Kala

Computer Science and Computer Engineering Undergraduate Honors Theses

Poultry is an important food source across the world. To facilitate the growth of the global population, we must also improve methods to oversee poultry with new and emerging technologies to improve the efficiency of poultry farms as well as the welfare of the birds. The technology we explore is Deep Learning methods and Computer Vision to help automate chicken monitoring using technologies such as Mask R-CNN to detect the posture of the chicken from an RGB camera. We use Meta Research's Detectron 2 to implement the Mask R-CNN model to train on our dataset created on videos of chickens …


Dfhic: A Dilated Full Convolution Model To Enhance The Resolution Of Hi-C Data, Bin Wang, Kun Liu, Yaohang Li, Jianxin Wang Jan 2023

Dfhic: A Dilated Full Convolution Model To Enhance The Resolution Of Hi-C Data, Bin Wang, Kun Liu, Yaohang Li, Jianxin Wang

Computer Science Faculty Publications

Motivation: Hi-C technology has been the most widely used chromosome conformation capture(3C) experiment that measures the frequency of all paired interactions in the entire genome, which is a powerful tool for studying the 3D structure of the genome. The fineness of the constructed genome structure depends on the resolution of Hi-C data. However, due to the fact that high-resolution Hi-C data require deep sequencing and thus high experimental cost, most available Hi-C data are in low-resolution. Hence, it is essential to enhance the quality of Hi-C data by developing the effective computational methods.

Results: In this work, we propose …


Artificial Intelligence In The Medical Field: Medical Review Sentiment Analysis, Nicholas Podlesak Dec 2022

Artificial Intelligence In The Medical Field: Medical Review Sentiment Analysis, Nicholas Podlesak

Honors Capstones

In this research project, natural language processing techniques’ ability to accurately classify medical text was measured to reinforce the relevance of artificial intelligence in the medical field. Sentiment analyses (analyses to determine whether the text was positive or negative) were performed on the prescription drug reviews in an open-source dataset using four different models: lexical, a neural network, a support vector machine, and a logistic regression model. Each model’s effectiveness was gauged by its ability to correctly classify unlabeled drug reviews (i.e., a percentage representing accuracy). The machine learning models were able to accurately classify the text, while the lexical …


The Effect Of Using The Gamification Strategy On Academic Achievement And Motivation Towards Learning Problem-Solving Skills In Computer And Information Technology Course Among Tenth Grade Female Students, Mazyunah Almutairi, Prof. Ahmad Almassaad Feb 2022

The Effect Of Using The Gamification Strategy On Academic Achievement And Motivation Towards Learning Problem-Solving Skills In Computer And Information Technology Course Among Tenth Grade Female Students, Mazyunah Almutairi, Prof. Ahmad Almassaad

International Journal for Research in Education

Abstract

This study aimed to identify the effect of using the gamification strategy on academic achievement and motivation towards learning problem-solving skills in computer and information technology course. A quasi-experimental method was adopted. The study population included tenth-grade female students in Al-Badi’ah schools in Riyadh. The sample consisted of 54 students divided into two equal groups: control group and experimental group. The study tools comprised an achievement test and the motivation scale. The results showed that there were statistically significant differences between the two groups in the academic achievement test in favor of the experimental group, with a large effect …


Awegnn: Auto-Parametrized Weighted Element-Specific Graph Neural Networks For Molecules., Timothy Szocinski, Duc Duy Nguyen, Guo-Wei Wei Jul 2021

Awegnn: Auto-Parametrized Weighted Element-Specific Graph Neural Networks For Molecules., Timothy Szocinski, Duc Duy Nguyen, Guo-Wei Wei

Mathematics Faculty Publications

While automated feature extraction has had tremendous success in many deep learning algorithms for image analysis and natural language processing, it does not work well for data involving complex internal structures, such as molecules. Data representations via advanced mathematics, including algebraic topology, differential geometry, and graph theory, have demonstrated superiority in a variety of biomolecular applications, however, their performance is often dependent on manual parametrization. This work introduces the auto-parametrized weighted element-specific graph neural network, dubbed AweGNN, to overcome the obstacle of this tedious parametrization process while also being a suitable technique for automated feature extraction on these internally complex …


Iot Garden Frost Alarm, Andrew James Jun 2021

Iot Garden Frost Alarm, Andrew James

Honors Theses

Home gardeners are faced with yearly challenges due to spring frosts harming young plants. This is frequently mitigated by covering crops with frost blankets, but only on nights when a frost is predicted. In areas with less predictable climate, an unexpected frost can kill vulnerable plants, reducing the amount of food produced. A system is proposed and designed here to use internet of things (IoT) technology to enable a small weather station in the home garden to report current climate data and predict frosts, then alert the gardener in time for them to cover their plants.

The system as designed …


Law Library Blog (January 2021): Legal Beagle's Blog Archive, Roger Williams University School Of Law Jan 2021

Law Library Blog (January 2021): Legal Beagle's Blog Archive, Roger Williams University School Of Law

Law Library Newsletters/Blog

No abstract provided.


Simulation Of Influence Of Lightning On Internal Electromagnetic Environment Of Computer, Gaihong Du, Yangmeng Tian, Caixia Wang, Hongwei Wang Jun 2020

Simulation Of Influence Of Lightning On Internal Electromagnetic Environment Of Computer, Gaihong Du, Yangmeng Tian, Caixia Wang, Hongwei Wang

Journal of System Simulation

Abstract: Through XFDTD software simulating strong lightning electromagnetic pulse of 50KV lightning electric field strength, rising edge about 50ns, and pulse width about 2000ns coupled with a desktop computer, the curves of the coupled electric field with time and the curves of the energy density with time at several typical locations in the chassis are obtained; the shielding effectiveness of different locations inside the computer is analyzed. Simulation results suggest that the electromagnetic field strength produced in the chassis has no damage to the computer node while coupling energy generated in the hole is large in comparison with the threshold …


Emotional Awareness During Bug Fixes – A Pilot Study, Jada O. Loro, Abigail L. Schneff, Sarah J. Oran, Bonita Sharif Apr 2020

Emotional Awareness During Bug Fixes – A Pilot Study, Jada O. Loro, Abigail L. Schneff, Sarah J. Oran, Bonita Sharif

Department of Computer Science and Engineering: Dissertations, Theses, and Student Research

This study examines the effects of a programmer's emotional awareness on progress while fixing bugs. The goal of the study is to capitalize on emotional awareness to ultimately increase progress made during software development. This process could result in improved software maintenance.


V-Slam And Sensor Fusion For Ground Robots, Ejup Hoxha Jan 2020

V-Slam And Sensor Fusion For Ground Robots, Ejup Hoxha

Dissertations and Theses

In underground, underwater and indoor environments, a robot has to rely solely on its on-board sensors to sense and understand its surroundings. This is the main reason why SLAM gained the popularity it has today. In recent years, we have seen excellent improvement on accuracy of localization using cameras and combinations of different sensors, especially camera-IMU (VIO) fusion. Incorporating more sensors leads to improvement of accuracy,but also robustness of SLAM. However, while testing SLAM in our ground robots, we have seen a decrease in performance quality when using the same algorithms on flying vehicles.We have an additional sensor for ground …


Model-Based Machine Learning To Identify Clinical Relevance In A High-Resolution Simulation Of Sepsis And Trauma, Zachary H. Silberman Md, Robert Chase Cockrell Phd, Gary An Md Jan 2020

Model-Based Machine Learning To Identify Clinical Relevance In A High-Resolution Simulation Of Sepsis And Trauma, Zachary H. Silberman Md, Robert Chase Cockrell Phd, Gary An Md

Larner College of Medicine Fourth Year Advanced Integration Teaching/Scholarly Projects

Introduction: Sepsis is a devastating, costly, and complicated disease. It represents the summation of varied host immune responses in a clinical and physiological diagnosis. Despite extensive research, there is no current mediator-directed therapy, nor a biomarker panel able to categorize disease severity or reliably predict outcome. Although still distant from direct clinical translation, dynamic computational and mathematical models of acute systemic inflammation and sepsis are being developed. Although computationally intensive to run and calibrate, agent-based models (ABMs) are one type of model well suited for this. New analytical methods to efficiently extract knowledge from ABMs are needed. Specifically, machine-learning …


Law Library Blog (August 2019): Legal Beagle's Blog Archive, Roger Williams University School Of Law Aug 2019

Law Library Blog (August 2019): Legal Beagle's Blog Archive, Roger Williams University School Of Law

Law Library Newsletters/Blog

No abstract provided.


A Compiler Target Model For Line Associative Registers, Paul S. Eberhart Jan 2019

A Compiler Target Model For Line Associative Registers, Paul S. Eberhart

Theses and Dissertations--Electrical and Computer Engineering

LARs (Line Associative Registers) are very wide tagged registers, used for both register-wide SWAR (SIMD Within a Register )operations and scalar operations on arbitrary fields. LARs include a large data field, type tags, source addresses, and a dirty bit, which allow them to not only replace both caches and registers in the conventional memory hierarchy, but improve on both their functions. This thesis details a LAR-based architecture, and describes the design of a compiler which can generate code for a LAR-based design. In particular, type conversion, alignment, and register allocation are discussed in detail.


A Dual State Hierarchical Ensemble Kalman Filter Algorithm, William J. Cook, Jesse Johnson, Marko Maneta, Doug Brinkerhoff Jan 2019

A Dual State Hierarchical Ensemble Kalman Filter Algorithm, William J. Cook, Jesse Johnson, Marko Maneta, Doug Brinkerhoff

Graduate Student Theses, Dissertations, & Professional Papers

Dynamic models that simulate processes across large geographic locations, such as hydrologic models, are often informed by empirical parameters that are distributed across a geographical area and segmented by geological features such as watersheds. These parameters may be referred to as spatially distributed parameters. Spatially distributed parameters are frequently spatially correlated and any techniques utilized in their calibration ideally incorporate existing spatial hierarchical relationships into their structure. In this paper, a parameter estimation method based on the Dual State Ensemble Kalman Filter called the Dual State Hierarchical Ensemble Kalman Filter (DSHEnKF) is presented. This modified filter is innovative in that …


Code4her Spring 2018, Rebeccah Knoop Apr 2018

Code4her Spring 2018, Rebeccah Knoop

Honors Projects

CODE4her is a mentorship program with a goal of sparking interest in computer science organized by the BGSU Women in Computing (BGWIC) student organization. Participation is open to middle school girls (grades 5-8), and participants are paired with BGWIC members who serve as mentors.


Malware For Macintosh, Nathan C. Shinabarger, Josiah E. Bills, Richard W. Lively, Noah S. Shinabarger Apr 2018

Malware For Macintosh, Nathan C. Shinabarger, Josiah E. Bills, Richard W. Lively, Noah S. Shinabarger

The Research and Scholarship Symposium (2013-2019)

Technology is a cornerstone of modern society. Unfortunately, it seems that every new piece of technology is accompanied by five computer-security breaches elsewhere. Most people associate hacks with Windows computers. This is a problem because Apple computers, and other non-Windows systems, are also extremely vulnerable to attacks and risk being compromised. Dolos is a piece of malware we developed intended to exploit the macOS Sierra operating system. It provides a framework for running exploits and comes built in with certain control and data exfiltration capabilities. Dolos also helps destroy the misconception of "the impenetrable Macintosh computer" by showing that Apple …


The Poem Will Resemble You: A Human-Computer Collaboration, Zoe M. Morgan-Weinman Jan 2018

The Poem Will Resemble You: A Human-Computer Collaboration, Zoe M. Morgan-Weinman

Senior Projects Spring 2018

Senior Project submitted to The Division of Languages and Literature of Bard College.


Quantifying Effects Of Using Thermally Thin Fuel Approximations On Modelling Fire Propagation In Woody Fuels, David Blasen, Jesse Johnson, William Jolly, Russell Parsons Jan 2018

Quantifying Effects Of Using Thermally Thin Fuel Approximations On Modelling Fire Propagation In Woody Fuels, David Blasen, Jesse Johnson, William Jolly, Russell Parsons

Graduate Student Theses, Dissertations, & Professional Papers

In this paper, we quantify the effects of the thermally thin fuel approximations commonly made in numerical models that eliminate temperature gradients within a heated object. This assumption is known to affect the modeled ignition and burn behavior, but there is little research on its impact, particularly in larger fuels or in numerical models including moisture and chemical decomposition of fuels.

We begin by comparing modeled to observed ignition times and burn rates. To constrain variability in the material properties of wood and focus on variability caused by fuels assumed to be thermally thin, we conduct experiments using thermogravimetric analysis …


Evaluating Student Perceptions And Learning Outcomes: Differences Between Sla-Able And Non-Sla-Able Introductory Programming Courses, Christina M. Frederick, Matthew B. Pierce, Andrew Griggs, Lulu Sun Sep 2017

Evaluating Student Perceptions And Learning Outcomes: Differences Between Sla-Able And Non-Sla-Able Introductory Programming Courses, Christina M. Frederick, Matthew B. Pierce, Andrew Griggs, Lulu Sun

Publications

Engineering, computer science and subsequently knowledge of programming language is an increasingly vital skill in today’s workforce. First year engineering students are introduced to programming in addition to rigorous course loads in their first year. Second Language Acquisition (SLA) has been applied to programming course content delivery and has shown promise as an effective means of better educating new students. Results will be presented from a NSF funded study conducted over the past two years. SLA was applied to an introductory engineering course that teaches basic programming skills in a Blended learning environment (SLA-aBLe). This study examined four semesters worth …


Improving Gamification By Leveraging Endogenous Value, Brennan Laurence Smith Aug 2017

Improving Gamification By Leveraging Endogenous Value, Brennan Laurence Smith

Theses and Dissertations

"Gamification" is the application of game design principles to non-game contexts, such as education, personal fitness, etc. Gamification's intent is to incentivize unpalatable tasks. Current gamification efforts in the industry use some features traditionally associated with games, but fail to use game design principles as defined by the games industry. One such principle is endogenous rewards for task completion. We propose that endogenous rewards will increase the efficacy of gamification by increasing user engagement and retention. To demonstrate, we create a gamification framework where the rewards for completing real-life tasks are items with high endogenous value in the game, incentivizing …


Electrodynamical Modeling For Light Transport Simulation, Michael G. Saunders May 2017

Electrodynamical Modeling For Light Transport Simulation, Michael G. Saunders

Undergraduate Honors Theses

Modernity in the computer graphics community is characterized by a burgeoning interest in physically based rendering techniques. That is to say that mathematical reasoning from first principles is widely preferred to ad hoc, approximate reasoning in blind pursuit of photorealism. Thereby, the purpose of our research is to investigate the efficacy of explicit electrodynamical modeling by means of the generalized Jones vector given by Azzam [1] and the generalized Jones matrix given by Ortega-Quijano & Arce-Diego [2] in the context of stochastic light transport simulation for computer graphics. To augment the status quo path tracing framework with such a modeling …


The Proceedings Of 15th Australian Information Security Management Conference, 5-6 December, 2017, Edith Cowan University, Perth, Australia, Craig Valli (Ed.) Jan 2017

The Proceedings Of 15th Australian Information Security Management Conference, 5-6 December, 2017, Edith Cowan University, Perth, Australia, Craig Valli (Ed.)

Australian Information Security Management Conference

Conference Foreword

The annual Security Congress, run by the Security Research Institute at Edith Cowan University, includes the Australian Information Security and Management Conference. Now in its fifteenth year, the conference remains popular for its diverse content and mixture of technical research and discussion papers. The area of information security and management continues to be varied, as is reflected by the wide variety of subject matter covered by the papers this year. The papers cover topics from vulnerabilities in “Internet of Things” protocols through to improvements in biometric identification algorithms and surveillance camera weaknesses. The conference has drawn interest and …


Towards Building A Computer-Aided Accreditation System, Emmanuel Alejandro Santillana Fayett Aug 2016

Towards Building A Computer-Aided Accreditation System, Emmanuel Alejandro Santillana Fayett

Theses and Dissertations

Accreditation is a big subject. What is accreditation? Why should it matter to us? How many types of accreditation can an institution have? Is the government involved? What issues are present? How can we improve the accreditation process? All these questions will be covered in this paper. In addition, I will build towards a software that will apply the most important points in this paper, like applying the mission, objectives, and outcomes expected from the students in the form of a syllabus. This will help the faculty with the accreditation process and will help the students know what is expected …


The Digital Incunabula: Rock • Paper • Pixels, Patrick Aievoli Oct 2015

The Digital Incunabula: Rock • Paper • Pixels, Patrick Aievoli

Zea E-Books Collection

“The Digital Incunabula is Patrick Aievoli’s personal sonnet through media, interaction and communication design. He carefully crafts each evolutionary step into ripples that are supported by his own storied professional and academic experiences. It’s full of facts, terms and historical information which makes it perfect for anyone looking to flat out learn!” ● James Pannafino, Professor, Millersville University & Interaction Design

“This is a serious work that will find a broad community of readers. The depth and breadth of Aievoli’s experience in the publication industry give his voice and ideas credibility in the extreme. This book will inspire deep reflection.” …


What It Is To Be Conscious: Exploring The Plasibility Of Consciousness In Deep Learning Computers, Peter Davis Jun 2015

What It Is To Be Conscious: Exploring The Plasibility Of Consciousness In Deep Learning Computers, Peter Davis

Honors Theses

As artificial intelligence and robotics progress further and faster every day, designing and building a conscious computer appears to be on the horizon. Recent technological advances have allowed engineers and computer scientists to create robots and computer programs that were previously impossible. The development of these highly sophisticated robots and AI programs has thus prompted the age-old question: can a computer be conscious? The answer relies on addressing two key sub-problems. The first is the nature of consciousness: what constitutes a system as conscious, or what properties does consciousness have? Secondly, does the physical make-up of the robot or computer …


Handling Human Hacking: Creating A Comprehensive Defensive Strategy Against Modern Social Engineering, Charles Snyder Apr 2015

Handling Human Hacking: Creating A Comprehensive Defensive Strategy Against Modern Social Engineering, Charles Snyder

Senior Honors Theses

Social engineering is one of the most devastating threats to any company or business. Rather than relying upon technical flaws in order to break into computer networks, social engineers utilize a suave personality in order to deceive individuals through clever conversation. These devious conversations frequently provide the attacker with sufficient information to compromise the company’s computer network. Unlike common technical attacks, social engineering attacks cannot be prevented by security tools and software. Instead of attacking a network directly, a social engineer exploits human psychology in order to coerce the victim to inadvertently divulge sensitive information. Further complicating the issue, the …


Eye-Tracktive: Measuring Attention To Body Parts When Judging Human Emotions, Cathy Ennis, Ludovic Hoyet, Carol O'Sullivan Jan 2015

Eye-Tracktive: Measuring Attention To Body Parts When Judging Human Emotions, Cathy Ennis, Ludovic Hoyet, Carol O'Sullivan

Conference papers

Virtual humans are often endowed with human-like characteristics to make them more appealing and engaging. Motion capture is a reliable way to represent natural motion on such characters, thereby allowing a wide range of animations to be automatically created and replicated. However, interpersonal differences in actors’ performances can be subtle and complex, yet have a strong effect on the human observer. Such effects can be very difficult to express quantitatively or indeed even qualitatively. We investigate two subjective human motion characteristics: attractiveness and distinctiveness. We conduct a perceptual experiment, where participants’ eye movements are tracked while they rate the motions …


Enhanced Child’S Play Lan Design, Nicholas B. Bordo Jan 2015

Enhanced Child’S Play Lan Design, Nicholas B. Bordo

Williams Honors College, Honors Research Projects

Child’s Play is a charity event hosted by the student chapter of the Association for Computing Machinery at the University of Akron. This event allows people to compete in various video game tournaments while simultaneously raising money for charity. In order to make this possible, a network is crucial. However, in previous years, the performance has been poor. The goal of this project is to implement a new network design which will offer more functionality and reliability than in previous years. This network will be able to operate completely inside of an existing network on a temporary basis. This design …