Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Brigham Young University (21)
- Edith Cowan University (4)
- East Tennessee State University (3)
- University of Nebraska - Lincoln (3)
- Utah State University (3)
-
- California Polytechnic State University, San Luis Obispo (2)
- Old Dominion University (2)
- Roger Williams University (2)
- Union College (2)
- University of Arkansas, Fayetteville (2)
- University of Kentucky (2)
- University of Montana (2)
- Western Kentucky University (2)
- Andrews University (1)
- Bard College (1)
- Bowling Green State University (1)
- Cedarville University (1)
- China Simulation Federation (1)
- City University of New York (CUNY) (1)
- Clemson University (1)
- Colby College (1)
- Embry-Riddle Aeronautical University (1)
- Gettysburg College (1)
- Liberty University (1)
- Lindenwood University (1)
- Missouri University of Science and Technology (1)
- Northern Illinois University (1)
- Ouachita Baptist University (1)
- Technological University Dublin (1)
- The University of Akron (1)
- Publication Year
- Publication
-
- Theses and Dissertations (22)
- All Graduate Theses and Dissertations, Spring 1920 to Summer 2023 (3)
- Honors Theses (3)
- Computer Science and Computer Engineering Undergraduate Honors Theses (2)
- Electronic Theses and Dissertations (2)
-
- Graduate Student Theses, Dissertations, & Professional Papers (2)
- Law Library Newsletters/Blog (2)
- Mahurin Honors College Capstone Experience/Thesis Projects (2)
- Research outputs pre 2011 (2)
- All Theses (1)
- Articles (1)
- Australian Digital Forensics Conference (1)
- Australian Information Security Management Conference (1)
- Browse all Theses and Dissertations (1)
- Collaborative Agent Design (CAD) Research Center (1)
- Computer Science Faculty Publications (1)
- Computer Science Faculty Research & Creative Works (1)
- Computer Science and Software Engineering (1)
- Conference papers (1)
- Department of Computer Science and Engineering: Dissertations, Theses, and Student Research (1)
- Dissertations and Theses (1)
- Electrical & Computer Engineering Faculty Publications (1)
- Faculty Publications (1)
- Honors Capstones (1)
- Honors Projects (1)
- International Journal for Research in Education (1)
- Journal of System Simulation (1)
- Larner College of Medicine Fourth Year Advanced Integration Teaching/Scholarly Projects (1)
- Management Faculty Publications (1)
- Master's Theses (1)
- Publication Type
Articles 1 - 30 of 77
Full-Text Articles in Physical Sciences and Mathematics
Relative Comparison Of Modern Computing To Computer Technology Of Ages, Iwasan D. Kejawa Dr., Hailly Rubio Ms.
Relative Comparison Of Modern Computing To Computer Technology Of Ages, Iwasan D. Kejawa Dr., Hailly Rubio Ms.
School of Computing: Faculty Publications
Abstract
Abstract
Are there differences and similarities between the computer technology of today and yesterdays. Research had shown that there had been tremendous improvements from the computers of ages (traditional Computers) as we enter the 21st century. Both the physicality and the functionalities of computers have changed but some remain the same. The memory capacity and functions have changed, but all are still based on the old concepts of yesteryears.
Culture In Computing: The Importance Of Developing Gender-Inclusive Software, Creighton France
Culture In Computing: The Importance Of Developing Gender-Inclusive Software, Creighton France
Computer Science and Computer Engineering Undergraduate Honors Theses
The field of computing as we know it today exists because of the contributions of numerous female mathematicians, computer scientists, and programmers. While working with hardware was viewed as “a man’s job” during the mid-20th century, computing and programming was viewed as a noble and high-paying field for women to occupy. However, as time has progressed, the U.S. has seen a decrease in the number of women pursuing computer science. The idea that computing is a masculine discipline is common in the U.S. today for reasons such as male-centered marketing of electronics and gadgets, an inaccurate representation of what it …
Chicken Keypoint Estimation, Rohit Kala
Chicken Keypoint Estimation, Rohit Kala
Computer Science and Computer Engineering Undergraduate Honors Theses
Poultry is an important food source across the world. To facilitate the growth of the global population, we must also improve methods to oversee poultry with new and emerging technologies to improve the efficiency of poultry farms as well as the welfare of the birds. The technology we explore is Deep Learning methods and Computer Vision to help automate chicken monitoring using technologies such as Mask R-CNN to detect the posture of the chicken from an RGB camera. We use Meta Research's Detectron 2 to implement the Mask R-CNN model to train on our dataset created on videos of chickens …
Dfhic: A Dilated Full Convolution Model To Enhance The Resolution Of Hi-C Data, Bin Wang, Kun Liu, Yaohang Li, Jianxin Wang
Dfhic: A Dilated Full Convolution Model To Enhance The Resolution Of Hi-C Data, Bin Wang, Kun Liu, Yaohang Li, Jianxin Wang
Computer Science Faculty Publications
Motivation: Hi-C technology has been the most widely used chromosome conformation capture(3C) experiment that measures the frequency of all paired interactions in the entire genome, which is a powerful tool for studying the 3D structure of the genome. The fineness of the constructed genome structure depends on the resolution of Hi-C data. However, due to the fact that high-resolution Hi-C data require deep sequencing and thus high experimental cost, most available Hi-C data are in low-resolution. Hence, it is essential to enhance the quality of Hi-C data by developing the effective computational methods.
Results: In this work, we propose …
Artificial Intelligence In The Medical Field: Medical Review Sentiment Analysis, Nicholas Podlesak
Artificial Intelligence In The Medical Field: Medical Review Sentiment Analysis, Nicholas Podlesak
Honors Capstones
In this research project, natural language processing techniques’ ability to accurately classify medical text was measured to reinforce the relevance of artificial intelligence in the medical field. Sentiment analyses (analyses to determine whether the text was positive or negative) were performed on the prescription drug reviews in an open-source dataset using four different models: lexical, a neural network, a support vector machine, and a logistic regression model. Each model’s effectiveness was gauged by its ability to correctly classify unlabeled drug reviews (i.e., a percentage representing accuracy). The machine learning models were able to accurately classify the text, while the lexical …
The Effect Of Using The Gamification Strategy On Academic Achievement And Motivation Towards Learning Problem-Solving Skills In Computer And Information Technology Course Among Tenth Grade Female Students, Mazyunah Almutairi, Prof. Ahmad Almassaad
The Effect Of Using The Gamification Strategy On Academic Achievement And Motivation Towards Learning Problem-Solving Skills In Computer And Information Technology Course Among Tenth Grade Female Students, Mazyunah Almutairi, Prof. Ahmad Almassaad
International Journal for Research in Education
Abstract
This study aimed to identify the effect of using the gamification strategy on academic achievement and motivation towards learning problem-solving skills in computer and information technology course. A quasi-experimental method was adopted. The study population included tenth-grade female students in Al-Badi’ah schools in Riyadh. The sample consisted of 54 students divided into two equal groups: control group and experimental group. The study tools comprised an achievement test and the motivation scale. The results showed that there were statistically significant differences between the two groups in the academic achievement test in favor of the experimental group, with a large effect …
Awegnn: Auto-Parametrized Weighted Element-Specific Graph Neural Networks For Molecules., Timothy Szocinski, Duc Duy Nguyen, Guo-Wei Wei
Awegnn: Auto-Parametrized Weighted Element-Specific Graph Neural Networks For Molecules., Timothy Szocinski, Duc Duy Nguyen, Guo-Wei Wei
Mathematics Faculty Publications
While automated feature extraction has had tremendous success in many deep learning algorithms for image analysis and natural language processing, it does not work well for data involving complex internal structures, such as molecules. Data representations via advanced mathematics, including algebraic topology, differential geometry, and graph theory, have demonstrated superiority in a variety of biomolecular applications, however, their performance is often dependent on manual parametrization. This work introduces the auto-parametrized weighted element-specific graph neural network, dubbed AweGNN, to overcome the obstacle of this tedious parametrization process while also being a suitable technique for automated feature extraction on these internally complex …
Iot Garden Frost Alarm, Andrew James
Iot Garden Frost Alarm, Andrew James
Honors Theses
Home gardeners are faced with yearly challenges due to spring frosts harming young plants. This is frequently mitigated by covering crops with frost blankets, but only on nights when a frost is predicted. In areas with less predictable climate, an unexpected frost can kill vulnerable plants, reducing the amount of food produced. A system is proposed and designed here to use internet of things (IoT) technology to enable a small weather station in the home garden to report current climate data and predict frosts, then alert the gardener in time for them to cover their plants.
The system as designed …
Law Library Blog (January 2021): Legal Beagle's Blog Archive, Roger Williams University School Of Law
Law Library Blog (January 2021): Legal Beagle's Blog Archive, Roger Williams University School Of Law
Law Library Newsletters/Blog
No abstract provided.
Simulation Of Influence Of Lightning On Internal Electromagnetic Environment Of Computer, Gaihong Du, Yangmeng Tian, Caixia Wang, Hongwei Wang
Simulation Of Influence Of Lightning On Internal Electromagnetic Environment Of Computer, Gaihong Du, Yangmeng Tian, Caixia Wang, Hongwei Wang
Journal of System Simulation
Abstract: Through XFDTD software simulating strong lightning electromagnetic pulse of 50KV lightning electric field strength, rising edge about 50ns, and pulse width about 2000ns coupled with a desktop computer, the curves of the coupled electric field with time and the curves of the energy density with time at several typical locations in the chassis are obtained; the shielding effectiveness of different locations inside the computer is analyzed. Simulation results suggest that the electromagnetic field strength produced in the chassis has no damage to the computer node while coupling energy generated in the hole is large in comparison with the threshold …
Emotional Awareness During Bug Fixes – A Pilot Study, Jada O. Loro, Abigail L. Schneff, Sarah J. Oran, Bonita Sharif
Emotional Awareness During Bug Fixes – A Pilot Study, Jada O. Loro, Abigail L. Schneff, Sarah J. Oran, Bonita Sharif
Department of Computer Science and Engineering: Dissertations, Theses, and Student Research
This study examines the effects of a programmer's emotional awareness on progress while fixing bugs. The goal of the study is to capitalize on emotional awareness to ultimately increase progress made during software development. This process could result in improved software maintenance.
V-Slam And Sensor Fusion For Ground Robots, Ejup Hoxha
V-Slam And Sensor Fusion For Ground Robots, Ejup Hoxha
Dissertations and Theses
In underground, underwater and indoor environments, a robot has to rely solely on its on-board sensors to sense and understand its surroundings. This is the main reason why SLAM gained the popularity it has today. In recent years, we have seen excellent improvement on accuracy of localization using cameras and combinations of different sensors, especially camera-IMU (VIO) fusion. Incorporating more sensors leads to improvement of accuracy,but also robustness of SLAM. However, while testing SLAM in our ground robots, we have seen a decrease in performance quality when using the same algorithms on flying vehicles.We have an additional sensor for ground …
Model-Based Machine Learning To Identify Clinical Relevance In A High-Resolution Simulation Of Sepsis And Trauma, Zachary H. Silberman Md, Robert Chase Cockrell Phd, Gary An Md
Model-Based Machine Learning To Identify Clinical Relevance In A High-Resolution Simulation Of Sepsis And Trauma, Zachary H. Silberman Md, Robert Chase Cockrell Phd, Gary An Md
Larner College of Medicine Fourth Year Advanced Integration Teaching/Scholarly Projects
Introduction: Sepsis is a devastating, costly, and complicated disease. It represents the summation of varied host immune responses in a clinical and physiological diagnosis. Despite extensive research, there is no current mediator-directed therapy, nor a biomarker panel able to categorize disease severity or reliably predict outcome. Although still distant from direct clinical translation, dynamic computational and mathematical models of acute systemic inflammation and sepsis are being developed. Although computationally intensive to run and calibrate, agent-based models (ABMs) are one type of model well suited for this. New analytical methods to efficiently extract knowledge from ABMs are needed. Specifically, machine-learning …
Law Library Blog (August 2019): Legal Beagle's Blog Archive, Roger Williams University School Of Law
Law Library Blog (August 2019): Legal Beagle's Blog Archive, Roger Williams University School Of Law
Law Library Newsletters/Blog
No abstract provided.
A Compiler Target Model For Line Associative Registers, Paul S. Eberhart
A Compiler Target Model For Line Associative Registers, Paul S. Eberhart
Theses and Dissertations--Electrical and Computer Engineering
LARs (Line Associative Registers) are very wide tagged registers, used for both register-wide SWAR (SIMD Within a Register )operations and scalar operations on arbitrary fields. LARs include a large data field, type tags, source addresses, and a dirty bit, which allow them to not only replace both caches and registers in the conventional memory hierarchy, but improve on both their functions. This thesis details a LAR-based architecture, and describes the design of a compiler which can generate code for a LAR-based design. In particular, type conversion, alignment, and register allocation are discussed in detail.
A Dual State Hierarchical Ensemble Kalman Filter Algorithm, William J. Cook, Jesse Johnson, Marko Maneta, Doug Brinkerhoff
A Dual State Hierarchical Ensemble Kalman Filter Algorithm, William J. Cook, Jesse Johnson, Marko Maneta, Doug Brinkerhoff
Graduate Student Theses, Dissertations, & Professional Papers
Dynamic models that simulate processes across large geographic locations, such as hydrologic models, are often informed by empirical parameters that are distributed across a geographical area and segmented by geological features such as watersheds. These parameters may be referred to as spatially distributed parameters. Spatially distributed parameters are frequently spatially correlated and any techniques utilized in their calibration ideally incorporate existing spatial hierarchical relationships into their structure. In this paper, a parameter estimation method based on the Dual State Ensemble Kalman Filter called the Dual State Hierarchical Ensemble Kalman Filter (DSHEnKF) is presented. This modified filter is innovative in that …
Code4her Spring 2018, Rebeccah Knoop
Code4her Spring 2018, Rebeccah Knoop
Honors Projects
CODE4her is a mentorship program with a goal of sparking interest in computer science organized by the BGSU Women in Computing (BGWIC) student organization. Participation is open to middle school girls (grades 5-8), and participants are paired with BGWIC members who serve as mentors.
Malware For Macintosh, Nathan C. Shinabarger, Josiah E. Bills, Richard W. Lively, Noah S. Shinabarger
Malware For Macintosh, Nathan C. Shinabarger, Josiah E. Bills, Richard W. Lively, Noah S. Shinabarger
The Research and Scholarship Symposium (2013-2019)
Technology is a cornerstone of modern society. Unfortunately, it seems that every new piece of technology is accompanied by five computer-security breaches elsewhere. Most people associate hacks with Windows computers. This is a problem because Apple computers, and other non-Windows systems, are also extremely vulnerable to attacks and risk being compromised. Dolos is a piece of malware we developed intended to exploit the macOS Sierra operating system. It provides a framework for running exploits and comes built in with certain control and data exfiltration capabilities. Dolos also helps destroy the misconception of "the impenetrable Macintosh computer" by showing that Apple …
The Poem Will Resemble You: A Human-Computer Collaboration, Zoe M. Morgan-Weinman
The Poem Will Resemble You: A Human-Computer Collaboration, Zoe M. Morgan-Weinman
Senior Projects Spring 2018
Senior Project submitted to The Division of Languages and Literature of Bard College.
Quantifying Effects Of Using Thermally Thin Fuel Approximations On Modelling Fire Propagation In Woody Fuels, David Blasen, Jesse Johnson, William Jolly, Russell Parsons
Quantifying Effects Of Using Thermally Thin Fuel Approximations On Modelling Fire Propagation In Woody Fuels, David Blasen, Jesse Johnson, William Jolly, Russell Parsons
Graduate Student Theses, Dissertations, & Professional Papers
In this paper, we quantify the effects of the thermally thin fuel approximations commonly made in numerical models that eliminate temperature gradients within a heated object. This assumption is known to affect the modeled ignition and burn behavior, but there is little research on its impact, particularly in larger fuels or in numerical models including moisture and chemical decomposition of fuels.
We begin by comparing modeled to observed ignition times and burn rates. To constrain variability in the material properties of wood and focus on variability caused by fuels assumed to be thermally thin, we conduct experiments using thermogravimetric analysis …
Evaluating Student Perceptions And Learning Outcomes: Differences Between Sla-Able And Non-Sla-Able Introductory Programming Courses, Christina M. Frederick, Matthew B. Pierce, Andrew Griggs, Lulu Sun
Evaluating Student Perceptions And Learning Outcomes: Differences Between Sla-Able And Non-Sla-Able Introductory Programming Courses, Christina M. Frederick, Matthew B. Pierce, Andrew Griggs, Lulu Sun
Publications
Engineering, computer science and subsequently knowledge of programming language is an increasingly vital skill in today’s workforce. First year engineering students are introduced to programming in addition to rigorous course loads in their first year. Second Language Acquisition (SLA) has been applied to programming course content delivery and has shown promise as an effective means of better educating new students. Results will be presented from a NSF funded study conducted over the past two years. SLA was applied to an introductory engineering course that teaches basic programming skills in a Blended learning environment (SLA-aBLe). This study examined four semesters worth …
Improving Gamification By Leveraging Endogenous Value, Brennan Laurence Smith
Improving Gamification By Leveraging Endogenous Value, Brennan Laurence Smith
Theses and Dissertations
"Gamification" is the application of game design principles to non-game contexts, such as education, personal fitness, etc. Gamification's intent is to incentivize unpalatable tasks. Current gamification efforts in the industry use some features traditionally associated with games, but fail to use game design principles as defined by the games industry. One such principle is endogenous rewards for task completion. We propose that endogenous rewards will increase the efficacy of gamification by increasing user engagement and retention. To demonstrate, we create a gamification framework where the rewards for completing real-life tasks are items with high endogenous value in the game, incentivizing …
Electrodynamical Modeling For Light Transport Simulation, Michael G. Saunders
Electrodynamical Modeling For Light Transport Simulation, Michael G. Saunders
Undergraduate Honors Theses
Modernity in the computer graphics community is characterized by a burgeoning interest in physically based rendering techniques. That is to say that mathematical reasoning from first principles is widely preferred to ad hoc, approximate reasoning in blind pursuit of photorealism. Thereby, the purpose of our research is to investigate the efficacy of explicit electrodynamical modeling by means of the generalized Jones vector given by Azzam [1] and the generalized Jones matrix given by Ortega-Quijano & Arce-Diego [2] in the context of stochastic light transport simulation for computer graphics. To augment the status quo path tracing framework with such a modeling …
The Proceedings Of 15th Australian Information Security Management Conference, 5-6 December, 2017, Edith Cowan University, Perth, Australia, Craig Valli (Ed.)
The Proceedings Of 15th Australian Information Security Management Conference, 5-6 December, 2017, Edith Cowan University, Perth, Australia, Craig Valli (Ed.)
Australian Information Security Management Conference
Conference Foreword
The annual Security Congress, run by the Security Research Institute at Edith Cowan University, includes the Australian Information Security and Management Conference. Now in its fifteenth year, the conference remains popular for its diverse content and mixture of technical research and discussion papers. The area of information security and management continues to be varied, as is reflected by the wide variety of subject matter covered by the papers this year. The papers cover topics from vulnerabilities in “Internet of Things” protocols through to improvements in biometric identification algorithms and surveillance camera weaknesses. The conference has drawn interest and …
Towards Building A Computer-Aided Accreditation System, Emmanuel Alejandro Santillana Fayett
Towards Building A Computer-Aided Accreditation System, Emmanuel Alejandro Santillana Fayett
Theses and Dissertations
Accreditation is a big subject. What is accreditation? Why should it matter to us? How many types of accreditation can an institution have? Is the government involved? What issues are present? How can we improve the accreditation process? All these questions will be covered in this paper. In addition, I will build towards a software that will apply the most important points in this paper, like applying the mission, objectives, and outcomes expected from the students in the form of a syllabus. This will help the faculty with the accreditation process and will help the students know what is expected …
The Digital Incunabula: Rock • Paper • Pixels, Patrick Aievoli
The Digital Incunabula: Rock • Paper • Pixels, Patrick Aievoli
Zea E-Books Collection
“The Digital Incunabula is Patrick Aievoli’s personal sonnet through media, interaction and communication design. He carefully crafts each evolutionary step into ripples that are supported by his own storied professional and academic experiences. It’s full of facts, terms and historical information which makes it perfect for anyone looking to flat out learn!” ● James Pannafino, Professor, Millersville University & Interaction Design
“This is a serious work that will find a broad community of readers. The depth and breadth of Aievoli’s experience in the publication industry give his voice and ideas credibility in the extreme. This book will inspire deep reflection.” …
What It Is To Be Conscious: Exploring The Plasibility Of Consciousness In Deep Learning Computers, Peter Davis
What It Is To Be Conscious: Exploring The Plasibility Of Consciousness In Deep Learning Computers, Peter Davis
Honors Theses
As artificial intelligence and robotics progress further and faster every day, designing and building a conscious computer appears to be on the horizon. Recent technological advances have allowed engineers and computer scientists to create robots and computer programs that were previously impossible. The development of these highly sophisticated robots and AI programs has thus prompted the age-old question: can a computer be conscious? The answer relies on addressing two key sub-problems. The first is the nature of consciousness: what constitutes a system as conscious, or what properties does consciousness have? Secondly, does the physical make-up of the robot or computer …
Handling Human Hacking: Creating A Comprehensive Defensive Strategy Against Modern Social Engineering, Charles Snyder
Handling Human Hacking: Creating A Comprehensive Defensive Strategy Against Modern Social Engineering, Charles Snyder
Senior Honors Theses
Social engineering is one of the most devastating threats to any company or business. Rather than relying upon technical flaws in order to break into computer networks, social engineers utilize a suave personality in order to deceive individuals through clever conversation. These devious conversations frequently provide the attacker with sufficient information to compromise the company’s computer network. Unlike common technical attacks, social engineering attacks cannot be prevented by security tools and software. Instead of attacking a network directly, a social engineer exploits human psychology in order to coerce the victim to inadvertently divulge sensitive information. Further complicating the issue, the …
Eye-Tracktive: Measuring Attention To Body Parts When Judging Human Emotions, Cathy Ennis, Ludovic Hoyet, Carol O'Sullivan
Eye-Tracktive: Measuring Attention To Body Parts When Judging Human Emotions, Cathy Ennis, Ludovic Hoyet, Carol O'Sullivan
Conference papers
Virtual humans are often endowed with human-like characteristics to make them more appealing and engaging. Motion capture is a reliable way to represent natural motion on such characters, thereby allowing a wide range of animations to be automatically created and replicated. However, interpersonal differences in actors’ performances can be subtle and complex, yet have a strong effect on the human observer. Such effects can be very difficult to express quantitatively or indeed even qualitatively. We investigate two subjective human motion characteristics: attractiveness and distinctiveness. We conduct a perceptual experiment, where participants’ eye movements are tracked while they rate the motions …
Enhanced Child’S Play Lan Design, Nicholas B. Bordo
Enhanced Child’S Play Lan Design, Nicholas B. Bordo
Williams Honors College, Honors Research Projects
Child’s Play is a charity event hosted by the student chapter of the Association for Computing Machinery at the University of Akron. This event allows people to compete in various video game tournaments while simultaneously raising money for charity. In order to make this possible, a network is crucial. However, in previous years, the performance has been poor. The goal of this project is to implement a new network design which will offer more functionality and reliability than in previous years. This network will be able to operate completely inside of an existing network on a temporary basis. This design …