Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Other

Series

Computer Sciences

Institution
Keyword
Publication Year
Publication

Articles 31 - 60 of 92

Full-Text Articles in Physical Sciences and Mathematics

Collections In Scala, Raffi T. Khatchadourian Oct 2020

Collections In Scala, Raffi T. Khatchadourian

Open Educational Resources

No abstract provided.


Csci 49380/79526: Fundamentals Of Reactive Programming - Assignment 4, Raffi T. Khatchadourian Oct 2020

Csci 49380/79526: Fundamentals Of Reactive Programming - Assignment 4, Raffi T. Khatchadourian

Open Educational Resources

No abstract provided.


Csci 49380/79526: Fundamentals Of Reactive Programming - Assignment 3, Raffi T. Khatchadourian Oct 2020

Csci 49380/79526: Fundamentals Of Reactive Programming - Assignment 3, Raffi T. Khatchadourian

Open Educational Resources

No abstract provided.


Csci 49380/79526: Fundamentals Of Reactive Programming- Assignment 1, Raffi T. Khatchadourian Oct 2020

Csci 49380/79526: Fundamentals Of Reactive Programming- Assignment 1, Raffi T. Khatchadourian

Open Educational Resources

No abstract provided.


Csci 49380/79526: Fundamentals Of Reactive Programming- Syllabus, Raffi T. Khatchadourian Oct 2020

Csci 49380/79526: Fundamentals Of Reactive Programming- Syllabus, Raffi T. Khatchadourian

Open Educational Resources

No abstract provided.


Csci 49380/79526: Fundamentals Of Reactive Programming - Assignment 2, Raffi T. Khatchadourian Oct 2020

Csci 49380/79526: Fundamentals Of Reactive Programming - Assignment 2, Raffi T. Khatchadourian

Open Educational Resources

No abstract provided.


Inheritance Details In Scala, Raffi T. Khatchadourian Sep 2020

Inheritance Details In Scala, Raffi T. Khatchadourian

Open Educational Resources

No abstract provided.


An Empirical Study Of Refactorings And Technical Debt In Machine Learning Systems, Yiming Tang, Raffi T. Khatchadourian, Mehdi Bagherzadeh, Rhia Singh, Ajani Stewart, Anita Raja Aug 2020

An Empirical Study Of Refactorings And Technical Debt In Machine Learning Systems, Yiming Tang, Raffi T. Khatchadourian, Mehdi Bagherzadeh, Rhia Singh, Ajani Stewart, Anita Raja

Publications and Research

Machine Learning (ML), including Deep Learning (DL), systems, i.e., those with ML capabilities, are pervasive in today's data-driven society. Such systems are complex; they are comprised of ML models and many subsystems that support learning processes. As with other complex systems, ML systems are prone to classic technical debt issues, especially when such systems are long-lived, but they also exhibit debt specific to these systems. Unfortunately, there is a gap of knowledge in how ML systems actually evolve and are maintained. In this paper, we fill this gap by studying refactorings, i.e., source-to-source semantics-preserving program transformations, performed in real-world, open-source …


Geometry Aided Sonification, Michael Tecce Jul 2020

Geometry Aided Sonification, Michael Tecce

Computer Science Summer Fellows

Sonification is the process of deriving an audio representation of a time series which conveys important information about that time series. Otology and vision science have established that humans process audio information more quickly than visual information, and sonification can convey data to the visually impaired. In our work, we implement pipelines using Python/Numpy, and we handle both ordinary 1D time series and multivariate time series. For 1D time series, we find that using data to modulate the pitch or timing of preselected sounds (such as sine waves) simply and effectively captures repeating patterns and anomalies/outliers within the data. To …


An Empirical Study On The Use And Misuse Of Java 8 Streams, Raffi T. Khatchadourian, Yiming Tang, Mehdi Bagherzadeh, Baishakhi Ray Apr 2020

An Empirical Study On The Use And Misuse Of Java 8 Streams, Raffi T. Khatchadourian, Yiming Tang, Mehdi Bagherzadeh, Baishakhi Ray

Publications and Research

Streaming APIs allow for big data processing of native data structures by providing MapReduce-like operations over these structures. However, unlike traditional big data systems, these data structures typically reside in shared memory accessed by multiple cores. Although popular, this emerging hybrid paradigm opens the door to possibly detrimental behavior, such as thread contention and bugs related to non-execution and non-determinism. This study explores the use and misuse of a popular streaming API, namely, Java 8 Streams. The focus is on how developers decide whether or not to run these operations sequentially or in parallel and bugs both specific and tangential …


Data For The Review Of Gamified Fitness Tracker Apps, Aatish Neupane, Derek Hansen, Anud Sharma, Jerry Alan Fails Jan 2020

Data For The Review Of Gamified Fitness Tracker Apps, Aatish Neupane, Derek Hansen, Anud Sharma, Jerry Alan Fails

ScholarsArchive Data

This is a supplemental dataset to a paper that reviews 103 gamified fitness tracker apps and analyzes the presence and usage of various game elements. This dataset contains the list of those apps that were reviewed. It also contains the coding that represents the presence of difference game elements.


Data Set For An Empirical Analysis Of Search Engines’ Response To Web Search Queries Associated With The Classroom Setting, Oghenemaro Anuyah, Ashlee Milton, Michael Green, Maria Soledad Pera Nov 2019

Data Set For An Empirical Analysis Of Search Engines’ Response To Web Search Queries Associated With The Classroom Setting, Oghenemaro Anuyah, Ashlee Milton, Michael Green, Maria Soledad Pera

Computer Science Faculty Scripts and Data

This archive contains queries that capture information in different search contexts. The first file includes those written by children between the 3rd - 6th grade levels, while performing search tasks. We collected and archived this data between the April 2017 -- December 2018, based on Boise State University's IRB approval. We also include simulated queries we extracted from children's reviews. Additional columns in this dataset are children's grade levels, the query source, and the query type (i.e., if it is a keyword, phrase, or question query). The other files are comprised of queries that are meant to lead to the …


Python Practice Assignments For Computer Science I, Hyrum Carroll, Hillary Fleenor Oct 2019

Python Practice Assignments For Computer Science I, Hyrum Carroll, Hillary Fleenor

Computer Science and Information Technology Ancillary Materials

This set of practice assignments for Computer Science 1 were created under a Round Twelve Mini-Grant for Ancillary Materials Creation and Revision.

The assignments use the Python coding language and the repl.it coding platform and cover the following topics:

  • Modules;
  • Functions;
  • Selections;
  • Loops;
  • Strings;
  • Lists;
  • Files;
  • Dictionaries.


Internet Of Things (Open Course), Rebecca Rutherfoord, Susan Vandeven, Guangzhi Zheng, Hossain Shahriar, Xin Tian Oct 2019

Internet Of Things (Open Course), Rebecca Rutherfoord, Susan Vandeven, Guangzhi Zheng, Hossain Shahriar, Xin Tian

Computer Science and Information Technology Ancillary Materials

This open course for Internet of Things was created through a Round 13 Affordable Materials Grant.


Ethical Hacking For Effective Defense (Modules, Labs, And Lectures), Hossain Shahriar Jul 2019

Ethical Hacking For Effective Defense (Modules, Labs, And Lectures), Hossain Shahriar

Computer Science and Information Technology Ancillary Materials

Summer 2019 Update: Through a Round Twelve ALG Mini-Grant for Ancillary Materials Creation and Revision, five new modules have been added to this collection:

  • Enumeration with Sparta
  • Enumeration with Inguma
  • Hacking Web Servers with Dirbuster
  • Hacking Web Servers with Skipfish
  • Hacking Wireless and IoT with Bluehydra

The following set of materials is used in the Textbook Transformation Grants implementation of Ethical Hacking for Effective Defense:

https://oer.galileo.usg.edu/compsci-collections/8/

Topics include:

  • TCP/IP Level Attacks
  • Port Scanning
  • DDoS
  • Footprinting and Social Engineering
  • Enumeration
  • Programming for Security Professionals
  • Operating System Vulnerabilities
  • Embedded System Security
  • Hacking Web Servers
  • Hacking Wireless Networks
  • Cryptography
  • Protecting Networks with …


Mapping In The Humanities: Gis Lessons For Poets, Historians, And Scientists, Emily W. Fairey May 2019

Mapping In The Humanities: Gis Lessons For Poets, Historians, And Scientists, Emily W. Fairey

Open Educational Resources

User-friendly Geographic Information Systems (GIS) is the common thread of this collection of presentations, and activities with full lesson plans. The first section of the site contains an overview of cartography, the art of creating maps, and then looks at historical mapping platforms like Hypercities and Donald Rumsey Historical Mapping Project. In the next section Google Earth Desktop Pro is introduced, with lessons and activities on the basics of GE such as pins, paths, and kml files, as well as a more complex activity on "georeferencing" an historic map over Google Earth imagery. The final section deals with ARCGIS Online …


Data Visualization Assignments For Principles Of Information Technology Management (Csu), Jennifer Pitts Apr 2019

Data Visualization Assignments For Principles Of Information Technology Management (Csu), Jennifer Pitts

Computer Science and Information Technology Ancillary Materials

This set of ancillary materials for Principles of Information Technology Management was created under a Round Eleven Mini-Grant for Ancillary Materials Creation and Revision. The skills covered in these lessons, using the Tableau data visualization and analysis tool, include:

  • Instructor information for installing Tableau
  • Dashboard creation
  • Worksheet creation
  • Data segmentation and analysis
  • Geographic data visualization


Cs04all: Cryptography Module, Hunter R. Johnson Feb 2019

Cs04all: Cryptography Module, Hunter R. Johnson

Open Educational Resources

Cryptography module

This archive contains a series of lessons on cryptography suitable for use in a CS0 course. The only requirement is familiarity with Python, particularly dictionaries, lists, and file IO. It is also assumed that students know how to create stand-alone Python programs and interact with them through the terminal. Most of the work is done in Jupyter notebooks.

The material found in the notebooks is a combination of reading material, exercises, activities and assignments. Below are descriptions of each lesson or assignment and links to notebooks on Cocalc. The same files are available for batch download in this …


Cs04all: Command Line Python, Hunter R. Johnson Feb 2019

Cs04all: Command Line Python, Hunter R. Johnson

Open Educational Resources

Command Line Tutorial

Students are presented with information relating to stand alone Python programs, stdin, stdout, and command line arguments. This is a lab exercise. After completion students should be able to create executable Python programs which can accept input from stdin or command line arguments.

Please begin with the READ_ME file.

https://cocalc.com/share/bde99afd-76c8-493d-9608-db9019bcd346/171/stdin?viewer=share/

This OER material was produced as a result of the CS04ALL CUNY OER project


Cs04all: Machine Learning Module, Hunter R. Johnson Feb 2019

Cs04all: Machine Learning Module, Hunter R. Johnson

Open Educational Resources

These are materials that may be used in a CS0 course as a light introduction to machine learning.

The materials are mostly Jupyter notebooks which contain a combination of labwork and lecture notes. There are notebooks on Classification, An Introduction to Numpy, and An Introduction to Pandas.

There are also two assessments that could be assigned to students. One is an essay assignment in which students are asked to read and respond to an article on machine bias. The other is a lab-like exercise in which students use pandas and numpy to extract useful information about subway ridership in NYC. …


Cs04all: Natural Language Processing Project, Hunter R. Johnson Feb 2019

Cs04all: Natural Language Processing Project, Hunter R. Johnson

Open Educational Resources

In this archive there are two activities/assignments suitable for use in a CS0 or Intro course which uses Python.

In the first activity, students are asked to "fill in the code" in a series of short programs that compute a similarity metric (cosine similarity) for text documents. This involves string tokenization, and frequency counting using Python string methods and datatypes.

https://cocalc.com/share/bde99afd-76c8-493d-9608-db9019bcd346/171/Proj1?viewer=share/

In the second activity (taken directly from Think Python 2e) students use a pronunciation dictionary to solve a riddle involving homophones.

https://cocalc.com/share/bde99afd-76c8-493d-9608-db9019bcd346/171/Dicts2?viewer=share/

This OER material was produced as a result of the CS04ALL CUNY OER project


Cs04all: List Comprehensions, Hunter R. Johnson Feb 2019

Cs04all: List Comprehensions, Hunter R. Johnson

Open Educational Resources

List Comprehensions

This is a tutorial on list comprehensions in Python, suitable for use in an Intro or CS0 course. We also briefly mention set comprehensions and dictionary comprehensions.

https://cocalc.com/share/bde99afd-76c8-493d-9608-db9019bcd346/171/list_comprehensions?viewer=share/

This OER material was produced as a result of the CS04ALL CUNY OER project


Python String, Natalia Novak Jan 2019

Python String, Natalia Novak

Open Educational Resources

An introduction to Python strings and string formatting.

Proposed lecture slides are supplied with in-class activity, homework assignment, and assessment.

No loops, no decision structures.

For CS0 students.

Part of the CUNY CS04All project.


Integrated Database System With Spatial Information For Disaster Risk Management, Ever Enrique Castillo Osorio, Bashir Hayat, Babar Shah, Francis Chow, Ki Il Kim Jan 2019

Integrated Database System With Spatial Information For Disaster Risk Management, Ever Enrique Castillo Osorio, Bashir Hayat, Babar Shah, Francis Chow, Ki Il Kim

All Works

© 2019 AECE. Despite availability of various image sources for specific areas, a new disaster management system is likely to be implemented by using only one of them. Thus, its applicability and extensibility are severely limited. In addition, real-time update for the disaster area is one of the crucial functions for search and rescue activities. To meet the aforementioned requirements, in this paper, we propose a new spatial data infrastructure by defining the methodological scheme for the raster information. The proposed system has four respective layers to reduce the management cost as well as provide a flexible architecture. In each …


Contextual Word Embeddings - Trained On English Wikipedia Corpora, Filip Klubicka, Alfredo Maldonado, Abhijit Mahalunkar, John D. Kelleher Jan 2019

Contextual Word Embeddings - Trained On English Wikipedia Corpora, Filip Klubicka, Alfredo Maldonado, Abhijit Mahalunkar, John D. Kelleher

Datasets

This archive contains a collection of computational models called word embeddings. These are vectors that contain numerical representations of words. These have been trained on real language sentences collected from the English Wikipedia. As such, they contain contextual (thematic) knowledge about words (rather than taxonomic).


Taxonomic Word Embeddings - Trained On English Wordnet Random Walk Pseudo-Corpora, Filip Klubicka, Alfredo Maldonado, Abhijit Mahalunkar, John D. Kelleher Jan 2019

Taxonomic Word Embeddings - Trained On English Wordnet Random Walk Pseudo-Corpora, Filip Klubicka, Alfredo Maldonado, Abhijit Mahalunkar, John D. Kelleher

Datasets

This archive contains a collection of computational models called word embeddings. These are vectors that contain numerical representations of words. They have been trained on pseudo-sentences generated artificially from a random walk over the English WordNet taxonomy, and thus reflect taxonomic knowledge about words (rather than contextual).


Python List, Natalia Novak Jan 2019

Python List, Natalia Novak

Open Educational Resources

A brief introduction to Python list.

No loops, no decision structures.

For CS0 students. Part of the CUNY CS04All project.


English Wikipedia Corpus Chunks, Filip Klubicka, Alfredo Maldonado, Abhijit Mahalunkar, John D. Kelleher Jan 2019

English Wikipedia Corpus Chunks, Filip Klubicka, Alfredo Maldonado, Abhijit Mahalunkar, John D. Kelleher

Datasets

This archive contains a collection of language corpora. These are text files that contain samples of text collected from English Wikipedia.


Web Technologies (Ggc), Shuting Xu, Shuhua Lai Jul 2018

Web Technologies (Ggc), Shuting Xu, Shuhua Lai

Computer Science and Information Technology Ancillary Materials

This complete set of course materials contains all files used for in-class activities and labs, a full set of lecture slides, project assignments, and a test bank. Topics covered include:

  • HTML Basics
  • CSS
  • Images
  • Page Layout
  • Tables
  • Forms
  • Multimedia
  • JavaScript

This course materials set was created under a Round Nine Textbook Transformation Grant.


Foundations Of Health Information Technology (Undergraduate) Course Materials, Chi Zhang Apr 2018

Foundations Of Health Information Technology (Undergraduate) Course Materials, Chi Zhang

Computer Science and Information Technology Ancillary Materials

This is a collection of all materials used in Health Information Technology by Dr. Chi Zhang at Kennesaw State University, including lecture slides, assignments, and assessments, including a question bank.

Topics covered include:

  • Clinical Financial Records
  • Evidence-Based Medicine
  • e-Prescribing
  • Patient Bedside Systems
  • Telemedicine
  • Health Information Networks
  • Cryptography
  • Accreditation
  • HIPAA Privacy and Security