Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 33

Full-Text Articles in Physical Sciences and Mathematics

A Computational Profile Of Invasive Lionfish In Belize: A New Insight On A Destructive Species, Joshua E. Balan Jan 2024

A Computational Profile Of Invasive Lionfish In Belize: A New Insight On A Destructive Species, Joshua E. Balan

The Journal of Purdue Undergraduate Research

Since their discovery in the region in 2009, invasive Indonesian-native lionfish have been taking over the Belize Barrier Reef. As a result, populations of local species have dwindled as they are either eaten or outcompeted by the invaders. This has led to devastating losses ecologically and economically; massive industries in the local nations, such as fisheries and tourism, have suffered greatly. Attempting to combat this, local organizations, from nonprofits to ecotourism companies, have been manually spear-hunting them on scuba dives to cull the population. One such company, Reef Conservation Institute (ReefCI), operating out of Tom Owens Caye outside of Placencia, …


Les Expositions Turnus, Une Page D’Histoire Transnationale Des Beaux-Arts En Suisse À La Fin Du Xixe Siècle. Et Comment Découvrir Les Humanités Numériques, Béatrice Joyeux-Prunel Dec 2023

Les Expositions Turnus, Une Page D’Histoire Transnationale Des Beaux-Arts En Suisse À La Fin Du Xixe Siècle. Et Comment Découvrir Les Humanités Numériques, Béatrice Joyeux-Prunel

Artl@s Bulletin

Cet article présente le travail de la classe d’introduction aux humanités numériques de l’Université de Genève sur les expositions Turnus en Suisse à partir des années 1840. Près de 50 catalogues ont été retranscrits, décrits et structurés à l’aide de scripts Python, puis géolocalisés. Les données ont été ajoutées à BasArt, le répertoire mondial de catalogues d’expositions d’Artl@s (https://artlas.huma-num.fr/map). Elles permettent de mieux comprendre les premières années de ces expositions et leurs dynamiques locales, fédérales et internationales. Le Turnus fut une plaque tournante pour les artistes suisses, voire un tremplin vers le marché européen de l’art.


Geospatial Data Integration Middleware For Exploratory Analytics Addressing Regional Natural Resource Grand Challenges In The Us Mountain West, Shannon Albeke, Nicholas Case, Samantha Ewers, Jeffrey Hamerlinck, William Kirkpatrick, Jerod Merkle, Luke Todd Oct 2023

Geospatial Data Integration Middleware For Exploratory Analytics Addressing Regional Natural Resource Grand Challenges In The Us Mountain West, Shannon Albeke, Nicholas Case, Samantha Ewers, Jeffrey Hamerlinck, William Kirkpatrick, Jerod Merkle, Luke Todd

I-GUIDE Forum

This paper describes CyberGIS-based research and development aimed at improving geospatial data integration and visual analytics to better understand the impact of regional climate change on water availability in the U.S. Rocky Mountains. Two Web computing applications are presented. DEVISE - Derived Environmental Variability Indices Spatial Extractor, streamlines utilization of environmental data for better-informed wildlife decisions by biologists and game managers. The WY-Adapt platform aims to enhance predictive understanding of climate change impacts on water availability through two modules: “Current Conditions” and “Future Scenarios”. It integrates high-resolution models of the biophysical environment and human interactions, providing a robust framework for …


Reducing Uncertainty In Sea-Level Rise Prediction: A Spatial-Variability-Aware Approach, Subhankar Ghosh, Shuai An, Arun Sharma, Jayant Gupta, Shashi Shekhar, Aneesh Subramanian Oct 2023

Reducing Uncertainty In Sea-Level Rise Prediction: A Spatial-Variability-Aware Approach, Subhankar Ghosh, Shuai An, Arun Sharma, Jayant Gupta, Shashi Shekhar, Aneesh Subramanian

I-GUIDE Forum

Given multi-model ensemble climate projections, the goal is to accurately and reliably predict future sea-level rise while lowering the uncertainty. This problem is important because sea-level rise affects millions of people in coastal communities and beyond due to climate change's impacts on polar ice sheets and the ocean. This problem is challenging due to spatial variability and unknowns such as possible tipping points (e.g., collapse of Greenland or West Antarctic ice-shelf), climate feedback loops (e.g., clouds, permafrost thawing), future policy decisions, and human actions. Most existing climate modeling approaches use the same set of weights globally, during either regression or …


Redefining Research In Nanotechnology Simulations: A New Approach To Data Caching And Analysis, Darin Tsai, Alan Zhang, Aloysius Rebeiro Nov 2022

Redefining Research In Nanotechnology Simulations: A New Approach To Data Caching And Analysis, Darin Tsai, Alan Zhang, Aloysius Rebeiro

The Journal of Purdue Undergraduate Research

No abstract provided.


An Empirical Study On The Impact Of Deep Parameters On Mobile App Energy Usage, Qiang Xu, James C. Davis, Y Charlie Hu, Abhilash Jindal Jan 2022

An Empirical Study On The Impact Of Deep Parameters On Mobile App Energy Usage, Qiang Xu, James C. Davis, Y Charlie Hu, Abhilash Jindal

Department of Electrical and Computer Engineering Faculty Publications

Improving software performance through configuration parameter tuning is a common activity during software maintenance. Beyond traditional performance metrics like latency, mobile app developers are interested in reducing app energy usage. Some mobile apps have centralized locations for parameter tuning, similar to databases and operating systems, but it is common for mobile apps to have hundreds of parameters scattered around the source code. The correlation between these "deep" parameters and app energy usage is unclear. Researchers have studied the energy effects of deep parameters in specific modules, but we lack a systematic understanding of the energy impact of mobile deep parameters. …


Data Curation Workshop: Tips And Tools For Today, Matthew M. Benzing Oct 2019

Data Curation Workshop: Tips And Tools For Today, Matthew M. Benzing

Charleston Library Conference

The current state of research data is like a disorganized photo collection: a mix of formats scattered across different media without a lot of authority control. That is changing as the need to make data available to researchers across the world is becoming recognized. Researchers know that their data needs to be maintained and made accessible, but often they do not have the time or the inclination to get involved in all of the details. This provides an excellent opportunity for librarians. Data curation is the process of preparing data to be made available in a repository with the goal …


Predict The Failure Of Hydraulic Pumps By Different Machine Learning Algorithms, Yifei Zhou, Monika Ivantysynova, Nathan Keller Aug 2018

Predict The Failure Of Hydraulic Pumps By Different Machine Learning Algorithms, Yifei Zhou, Monika Ivantysynova, Nathan Keller

The Summer Undergraduate Research Fellowship (SURF) Symposium

Pump failure is a general concerned problem in the hydraulic field. Once happening, it will cause a huge property loss and even the life loss. The common methods to prevent the occurrence of pump failure is by preventative maintenance and breakdown maintenance, however, both of them have significant drawbacks. This research focuses on the axial piston pump and provides a new solution by the prognostic of pump failure using the classification of machine learning. Different kinds of sensors (temperature, acceleration and etc.) were installed into a good condition pump and three different kinds of damaged pumps to measure 10 of …


Sort Vs. Hash Join On Knights Landing Architecture, Victor L. Pan, Felix Lin Aug 2018

Sort Vs. Hash Join On Knights Landing Architecture, Victor L. Pan, Felix Lin

The Summer Undergraduate Research Fellowship (SURF) Symposium

With the increasing amount of information stored, there is a need for efficient database algorithms. One of the most important database operations is “join”. This involves combining columns from two tables and grouping common values in the same row in order to minimize redundant data. The two main algorithms used are hash join and sort merge join. Hash join builds a hash table to allow for faster searching. Sort merge join first sorts the two tables to make it more efficient when comparing values. There has been a lot of debate over which approach is superior. At first, hash join …


Expected Length Of The Longest Chain In Linear Hashing, Pongthip Srivarangkul, Hemanta K. Maji Aug 2018

Expected Length Of The Longest Chain In Linear Hashing, Pongthip Srivarangkul, Hemanta K. Maji

The Summer Undergraduate Research Fellowship (SURF) Symposium

Hash table with chaining is a data structure that chains objects with identical hash values together with an entry or a memory address. It works by calculating a hash value from an input then placing the input in the hash table entry. When we place two inputs in the same entry, they chain together in a linear linked list. We are interested in the expected length of the longest chain in linear hashing and methods to reduce the length because the worst-case look-up time is directly proportional to it.

The linear hash function used to calculate hash value is defined …


Predicting Locations Of Pollution Sources Using Convolutional Neural Networks, Yiheng Chi, Nickolas D. Winovich, Guang Lin Aug 2017

Predicting Locations Of Pollution Sources Using Convolutional Neural Networks, Yiheng Chi, Nickolas D. Winovich, Guang Lin

The Summer Undergraduate Research Fellowship (SURF) Symposium

Pollution is a severe problem today, and the main challenge in water and air pollution controls and eliminations is detecting and locating pollution sources. This research project aims to predict the locations of pollution sources given diffusion information of pollution in the form of array or image data. These predictions are done using machine learning. The relations between time, location, and pollution concentration are first formulated as pollution diffusion equations, which are partial differential equations (PDEs), and then deep convolutional neural networks are built and trained to solve these PDEs. The convolutional neural networks consist of convolutional layers, reLU layers …


Unsupervised Learning Framework For Large-Scale Flight Data Analysis Of Cockpit Human Machine Interaction Issues, Abhishek B. Vaidya Apr 2016

Unsupervised Learning Framework For Large-Scale Flight Data Analysis Of Cockpit Human Machine Interaction Issues, Abhishek B. Vaidya

Open Access Theses

As the level of automation within an aircraft increases, the interactions between the pilot and autopilot play a crucial role in its proper operation. Issues with human machine interactions (HMI) have been cited as one of the main causes behind many aviation accidents. Due to the complexity of such interactions, it is challenging to identify all possible situations and develop the necessary contingencies. In this thesis, we propose a data-driven analysis tool to identify potential HMI issues in large-scale Flight Operational Quality Assurance (FOQA) dataset. The proposed tool is developed using a multi-level clustering framework, where a set of basic …


Developing Probability Maps For Locating And Scouting Unprotected Areas Of Gravel Hill Prairies On Rodman Soils Along The Wabash River Valley Near Lafayette, Indiana, Ryan W.R. Schroeder Mar 2016

Developing Probability Maps For Locating And Scouting Unprotected Areas Of Gravel Hill Prairies On Rodman Soils Along The Wabash River Valley Near Lafayette, Indiana, Ryan W.R. Schroeder

Engagement & Service-Learning Summit

No abstract provided.


Web-Based Fragment Library, Junjie Wang, Lyudmila Slipchenko Aug 2015

Web-Based Fragment Library, Junjie Wang, Lyudmila Slipchenko

The Summer Undergraduate Research Fellowship (SURF) Symposium

A new polarized force field BioEFP for modeling process in biology is far superior in accuracy to the common classical force fields. One of the main shortcomings of BioEFP is that the parameters are not readily available, thus it will take a lot of time to be calculated.

Developing an online repository of pre-computed fragment parameters and a similarity algorithm will allow ascribing each fragment of a biological macromolecule to a pre-defined fragment.

This study incorporates three parts to create the online repository. First, the visual design for the website using the Hypertext Markup Language and the Cascading Style Sheets …


Online Simulations For Conceptual Understanding Of Thermoelectric Devices, Maria De Rosario Uribe Oct 2014

Online Simulations For Conceptual Understanding Of Thermoelectric Devices, Maria De Rosario Uribe

Open Access Theses

Computer simulations have been extensively used with educational purposes. However, the successful implementation in order to improve learning has been a matter of debate in research in education. The purpose of this case study is to analyze how a set of computer simulations can improve student understanding of thermoelectric devices. The study was developed in a learning context characterized by the advanced degree of difficulty of the topics treated, the high academic level of education of the students, and the online nature of the learning environment. As part of the course, students were provided with instructional materials that guided the …


The Indiana Cybersecurity Services Center (Incsc): A Cost-Benefit Analysis For K-12 Schools, Hans Christian Vargas Silva Oct 2014

The Indiana Cybersecurity Services Center (Incsc): A Cost-Benefit Analysis For K-12 Schools, Hans Christian Vargas Silva

Open Access Theses

The aim of this thesis is to determine if there are greater benefits than costs associated in the participation of public K-12 school corporations in the Indiana Cybersecurity Services Center (INCSC). This thesis is an ex-antecost-benefit analysis policy assessment of the INCSC. The study consisted of a sample of 6 school corporations from which 5 were classified as small and 1 was large. Three methods were considered for data collection; however conducting interviews was the most effective method due to the interaction with IT personnel from each organization in order to analyze current costs related to 4 areas of …


Reconstructing A Large-Scale Attribute-Based Social Network, Weijia Luo, Mario Ventresca Aug 2014

Reconstructing A Large-Scale Attribute-Based Social Network, Weijia Luo, Mario Ventresca

The Summer Undergraduate Research Fellowship (SURF) Symposium

An epidemic occurs when a disease rapidly infects substantially more people than expected compared to past experience of similar diseases. If an epidemic is not contained, it could turn into a pandemic, which will cause a worldwide crisis. Therefore, it is critical to determine and implement epidemic policies that are promising and effective within a short period of time. In this paper, we will develop tools that will allow us to recreate large-scale real-world social networks. Using such networks will enable us to simulate disease spread and determine critical personal and social factors that will be the key to containing …


Systems For Delivering Electric Vehicle Data Analytics, Vamshi Krishna Bolly Jul 2014

Systems For Delivering Electric Vehicle Data Analytics, Vamshi Krishna Bolly

Open Access Theses

n the recent times, advances in scientific research related to electric vehicles led to generation of large amounts of data. This data is majorly logger data collected from various sensors in the vehicle. It is predominantly unstructured and non-relational in nature, also called Big Data. Analysis of such data needs a high performance information technology infrastructure that provides superior computational efficiency and storage capacity. It should be scalable to accommodate the growing data and ensure its security over a network. This research proposes an architecture built over Hadoop to effectively support distributed data management over a network for real-time data …


A Model-Based Approach To System-Of-Systems Engineering Via The Systems Modeling Language, Kevin Hughes Bonanne Jul 2014

A Model-Based Approach To System-Of-Systems Engineering Via The Systems Modeling Language, Kevin Hughes Bonanne

Open Access Theses

In the field of Systems Engineering, a movement is underway to capture the aspects of a system in a centralized model format instead of various documents. This is the basis of Model Based Systems Engineering (MBSE). In order to better formalize this change, the Systems Modeling Language (SysML) was developed to characterize an ontology for MBSE. Despite the growth of both MBSE practices and SysML tools, they have yet to be rigorously analyzed as to their applicability to the field of System-of-Systems (SoS). This thesis applies SysML to a methodology for System-of-Systems Engineering (SoSE) known as the Wave Model, which …


The Use Of Business Intelligence Techniques In Supply Chain Performance, Jue Gu Jul 2014

The Use Of Business Intelligence Techniques In Supply Chain Performance, Jue Gu

Open Access Theses

Who likes data? Businesses are always loyal data followers. Companies analyze various forms of data to maintain businesses and identify their current performance in different areas so they can find business opportunities to improve and obtain more market share in advance (Qrunfleh & Tarafdar, 2012). When Big Data comes to businesses, companies who can take advantage of data the best tend to regularly get more business and customers (Waller & Fawcett, 2013). Collecting, analyzing, and demonstrating data could be essential to a single business, a company's supply chain performance and its sustainability. As an intelligent data processing product in terms …


A Quantitative Framework Of Skill Evaluation Of It Workforce, O Hyun Hwang Jul 2014

A Quantitative Framework Of Skill Evaluation Of It Workforce, O Hyun Hwang

Open Access Theses

Every employee has different abilities as well as experience, leading to different results in terms of skills and job performance. In order to improve employee IT skills, organizations should evaluate their employees' skills to understand the current levels of skills and knowledge and to figure out areas where skills are currently lacking.

This study used a different approach than other existing methods to evaluate the IT skills of employees. The research used quantitative empirical data that represents the work experience of employees based on their task history and job positions. The suggested method defines the relationship between IT skills and …


Reliability Guided Resource Allocation For Large-Scale Supercomputing Systems, Shruti Umamaheshwaran Apr 2014

Reliability Guided Resource Allocation For Large-Scale Supercomputing Systems, Shruti Umamaheshwaran

Open Access Theses

In high performance computing systems, parallel applications request a large number of resources for long time periods. In this scenario, if a resource fails during the application runtime, it would cause all applications using this resource to fail. The probability of application failure is tied to the inherent reliability of resources used by the application. Our investigation of high performance computing systems operating in the field has revealed a significant difference in the measured operational reliability of individual computing nodes. By adding awareness of the individual system nodes' reliability to the scheduler along with the predicted reliability needs of parallel …


A Farm Management Information System With Task-Specific, Collaborative Mobile Apps And Cloud Storage Services, Jonathan Tyler Welte Apr 2014

A Farm Management Information System With Task-Specific, Collaborative Mobile Apps And Cloud Storage Services, Jonathan Tyler Welte

Open Access Theses

Modern production agriculture is beginning to advance beyond deterministic, scheduled operations between relatively few people to larger scale, information-driven efficiency in order to respond to the challenges of field variability and meet the needs of a growing population. Since no two farms are the same with respect to information and management structure, a specialized farm management information system (FMIS) which is tailored to the realities on the ground of individual farms is likely to be more effective than generalized FMIS available today.

This thesis presents the design of a FMIS using proven user-centered design principles. This approach resulted in the …


A Computer-Based Approach For Identifying Student Conceptual Change, Junchao Yan Apr 2014

A Computer-Based Approach For Identifying Student Conceptual Change, Junchao Yan

Open Access Theses

Misconceptions are commonly encountered in many areas of science and engineering where a to-be-learned concept conflicts with prior knowledge. Conceptual change is an approach for identifying and repairing the misconceptions. One of the ways to promote student conceptual change is providing students with ontological schema training. However, assessment of conceptual change relies on qualitative analysis of student responses. With the exponential growth of qualitative data in the form of graphical representations or written responses, the process of data analysis relying on human experts has become time-consuming and costly. This study took the advantages of natural language processing and machine learning …


A Sandbox Development For Demonstrating Bom Transmission In A Plm And Erp Integrated System, Zhen Zeng Apr 2014

A Sandbox Development For Demonstrating Bom Transmission In A Plm And Erp Integrated System, Zhen Zeng

Open Access Theses

Integrating Product Lifecycle Management (PLM) and Enterprise Resource Planning (ERP) in a company is important. Currently, many companies have difficulties on integrating PLM and ERP systems. This study developed a prototype (sandbox) of PLM and ERP integrated system for demonstrating BOM transmission in a PLM and ERP integrated system, describing key aspects of system integration and BOM transmission. This sandbox will facilitate users' knowledge on how to process transactions in a PLM and ERP integrated system. The BOM accuracy was examined by comparing BOM data in PLM system to BOM data in ERP system after implementing engineering changes. This study …


Improving Reuse In Software Development For The Life Sciences, Nicholas Vincent Iannotti Oct 2013

Improving Reuse In Software Development For The Life Sciences, Nicholas Vincent Iannotti

Open Access Dissertations

The last several years have seen unprecedented advancements in the application of technology to the life sciences, particularly in the area of data generation. Novel scientific insights are now often driven primarily by software development supporting new multidisciplinary and increasingly multifaceted data analysis. However, despite the availability of tools such as best practice frameworks, the current rate of software development is not able to keep up with the needs of scientists. This bottleneck in software development is largely due to code reuse generally not being applied in practice.

This dissertation presents Legwork, a class library of reuse-optimized design pattern implementations …


Information Measures For Statistical Orbit Determination, Alinda Kenyana Mashiku Jan 2013

Information Measures For Statistical Orbit Determination, Alinda Kenyana Mashiku

Open Access Dissertations

The current Situational Space Awareness (SSA) is faced with a huge task of tracking the increasing number of space objects. The tracking of space objects requires frequent and accurate monitoring for orbit maintenance and collision avoidance using methods for statistical orbit determination. Statistical orbit determination enables us to obtain estimates of the state and the statistical information of its region of uncertainty given by the probability density function (PDF). As even collision events with very low probability are important, accurate prediction of collisions require the representation of the full PDF of the random orbit state. Through representing the full PDF …


Analysis Of Android Update Packages As A Method To Load Forensic Utilities And Malicious Applications To An Android Device, Mark Lohrum Jan 2013

Analysis Of Android Update Packages As A Method To Load Forensic Utilities And Malicious Applications To An Android Device, Mark Lohrum

Open Access Theses

Android devices are extremely popular and are projected to stay popular. Both forensic tools and malware exist designed specifically for Android devices. The purpose of this study is to explore a new method of loading forensic tools and malware to Android devices. This new method is the update module, which is used to install updates to the operating system. This thesis proposed and completed research to test four different custom update packages on three different Android devices. Two of the update packages contain forensic utilities and the other two contain malicious tools. An update package collecting web history using the …


The Role Of Test Administrator And Error, Michael Edward Brockly Jan 2013

The Role Of Test Administrator And Error, Michael Edward Brockly

Open Access Theses

This study created a framework to quantify and mitigate the amount of error that test administrators introduced to a biometric system during data collection. Prior research has focused only on the subject and the errors they make when interacting with biometric systems, while ignoring the test administrator. This study used a longitudinal data collection, focusing on demographics in government identification forms such as driver's licenses, fingerprint metadata such a moisture and skin temperature, and face image compliance to an ISO best practice standard. Error was quantified from the first visit and baseline test administrator error rates were measured. Additional training, …


A Comparative Analysis Of Open Source Storage Area Networks With Esxi 5.1, Robert M. Trinkle Jan 2013

A Comparative Analysis Of Open Source Storage Area Networks With Esxi 5.1, Robert M. Trinkle

Open Access Theses

Storage Area Networks have increased in popularity with the advancement of virtualization technologies. SANs consist of a central repository of hard disks allowing multiple clients to access and share data over a computer network. In recent years, multiple commercial and open source SAN technologies have been introduced to the market. Unlike commercial products, the open source SAN technologies lack formal documentation and research making implementation best practices scarce. This research analyzed the performance of different SAN architectures and implementation strategies. In addition, this paper expands upon previous research by using current hardware and software technologies. The test results of prominent …