Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

PDF

Wright State University

2019

Discipline
Keyword
Publication
Publication Type

Articles 31 - 57 of 57

Full-Text Articles in Physical Sciences and Mathematics

Determination Of Benzotriazole And Analog Compounds By Liquid Chromatography-Mass Spectrometry In Surface Runoff Water Samples From Wilmington Air Park, Jessica A. Wiese Jan 2019

Determination Of Benzotriazole And Analog Compounds By Liquid Chromatography-Mass Spectrometry In Surface Runoff Water Samples From Wilmington Air Park, Jessica A. Wiese

Browse all Theses and Dissertations

Benzotriazole (BTri) and its analog compounds are widely used in aircraft de-icing and anti-icing solutions, however their high solubility in water and resistance to biodegradation results in only their partial removal in wastewater treatment, and therefore makes them potential contaminants in watershed systems. The Wilmington Air Park in Wilmington, Ohio currently has two surface-runoff lagoons to pre-treat water containing these de-icing compounds before releasing it into nearby streams. Because the Wilmington Air Park has recently made an agreement with a major online retailer to lease over two dozen planes and open a package-sorting facility beginning in late 2019, the goal …


Lead In Tap Water Of Public Schools Near Dayton, Ohio, Baylee Stark Jan 2019

Lead In Tap Water Of Public Schools Near Dayton, Ohio, Baylee Stark

Browse all Theses and Dissertations

Lead (Pb) is a human-health concern, especially with regard to exposures of children. Lead contaminated drinking water is a primary route of exposure for children; however, water sampling for Pb is voluntary in schools with a public water supply. This study examined Pb in tap water from public schools around Dayton, OH. Schools were selected to span a range of ages (construction year) and community socioeconomic status. Of the 28 schools contacted, seven responded "affirmatively" to sampling, two responded "negatively", and 19 did not respond. None of the schools that were sampled had Pb concentrations exceeding the U.S. EPA guidelines …


Design And Development Of An Immersive Simulation For Social Determinants Of Health Training, Lahari Surapaneni Jan 2019

Design And Development Of An Immersive Simulation For Social Determinants Of Health Training, Lahari Surapaneni

Browse all Theses and Dissertations

This thesis research project focuses on design and development of an immersion simulation-based training tool that help raise the social determinants of health (SDOH) awareness among the health care providers. Compared to existing classroom lecture and/or role-play based SDOH education approach, our immersion-simulation based approach provides an easy access and highly realistic experience to such training curriculum at anytime and anywhere with an Internet connection. Such an interactive and immersive exposure is critical to raise SDOH awareness and maintain long-lasting empathy towards actual patients in practice, and thus help providers to be better prepared when encountering with those patients. Particularly, …


Leveraging Blockchain To Mitigate The Risk Of Counterfeit Microelectronics In Its Supply Chain, Aman Ali Pogaku Jan 2019

Leveraging Blockchain To Mitigate The Risk Of Counterfeit Microelectronics In Its Supply Chain, Aman Ali Pogaku

Browse all Theses and Dissertations

System on Chip (SoC) is the backbone component of the electronics industry nowadays. ASIC and FPGA-based SoCs are the two most popular methods of manufacturing SoCs. However, both ASIC and FPGA industries are plagued with risks of counterfeits due to the limitations in Security, Accountability, Complexity, and Governance of their supply chain management. As a result, the current practices of these microelectronics supply chain suffer from performance and efficiency bottlenecks. In this research, we are incorporating blockchain technology into the FPGA and ASIC microelectronic supply chain to help mitigate the risk of counterfeit microelectronics through a secure and decentralized solution …


Implication Of Inorganic Nitrogen And Phosphorous Species As A Cause Of A Harmful Algal Bloom Event In Caesar Creek Lake, Ohio And Its Tributaries, Baxter Jeffrey Foskuhl Jan 2019

Implication Of Inorganic Nitrogen And Phosphorous Species As A Cause Of A Harmful Algal Bloom Event In Caesar Creek Lake, Ohio And Its Tributaries, Baxter Jeffrey Foskuhl

Browse all Theses and Dissertations

Agricultural runoff poses a threat to the Wilmington, Ohio municipal water supply and its source waters. A harmful algal bloom (HAB) was documented in June 2019 in Caesar Creek Lake, Waynesville, Ohio. This study seeks to establish baseline nutrient concentrations in Caesar Creek Lake (Warren County, Ohio) and its tributaries, and to identify potential non-point sources of excess nitrogen and phosphorous that contributed to the HAB event. In collaboration with the Wilmington Water Department, dissolved inorganic nitrogen DIN-[N] (sum of NH3-[N], NH4+-[N], NO2--[N], NO3--[N] concentrations), dissolved phosphorous DP-[P], particulate phosphorous PP-[P], total phosphorous TP-[P] (total sum of DP-[P] and PP-[P] …


In Vitro Uptake And Biodistribution Of Silver Nanoparticles In Vero 76 Cells, Miriam A. Crane Jan 2019

In Vitro Uptake And Biodistribution Of Silver Nanoparticles In Vero 76 Cells, Miriam A. Crane

Browse all Theses and Dissertations

The number of consumer products containing nanomaterials over the last eight years has increased over two-fold. Silver is one of the most commonly used materials in consumer goods nanoparticle fabrication.1 Thus, the uptake and biodistribution of silver nanoparticles (AgNPs) within mammalian cells can provide insight into their possible toxicological effects. In this study, starch-capped AgNPs of an average diameter of 9 ± 5 nm were synthesized via a bottom-up method, and characterized by Raman spectroscopy, transmission electron microscopy (TEM), inductively couple plasma optical emission spectroscopy (ICP-OES), and absorption spectroscopy. Vero 76 cells were incubated with 0.0, 0.1, 1.0, and 3.0 …


Data-Driven And Knowledge-Based Strategies For Realizing Crowd Wisdom On Social Media, Shreyansh Bhatt Jan 2019

Data-Driven And Knowledge-Based Strategies For Realizing Crowd Wisdom On Social Media, Shreyansh Bhatt

Browse all Theses and Dissertations

The wisdom of the crowd is a well-known example of collective intelligence wherein an aggregated judgment of a group of individuals is superior to that of an individual. The aggregated judgment is surprisingly accurate for predicting the outcome of a range of tasks from geopolitical forecasting to the stock price prediction. Recent research has shown that participants' previous performance data contributes to the identification of a subset of participants that can collectively predict an accurate outcome. In the absence of such performance data, researchers have explored the role of human-perceived diversity, i.e., whether a human considers a crowd as a …


Transmission Electron Microscopy Analysis Of Silicon-Doped Beta-Gallium Oxide Films Grown By Pulsed Laser Deposition, Cynthia Thomason Bowers Jan 2019

Transmission Electron Microscopy Analysis Of Silicon-Doped Beta-Gallium Oxide Films Grown By Pulsed Laser Deposition, Cynthia Thomason Bowers

Browse all Theses and Dissertations

Due to the large band gap of β-Ga2O3 and recent improvements toward high quality native substrates and the ability to shallow dope epitaxial β-Ga2O3 it is an attractive material for applications in power electronic devices. Such devices require advances in the areas of thin film growth and carrier concentration control to deliver high mobility films appropriate for the device structures. Transmission electron microscopy (TEM) analysis can provide information concerning doping, crystal structure, and internal strain which will be valuable to assess the role of defects and impurities on the transport properties for feedback to optimize the bulk and epitaxial growth …


Conditional Dilated Attention Tracking Model - C-Datm, Tyler Clayton Highlander Jan 2019

Conditional Dilated Attention Tracking Model - C-Datm, Tyler Clayton Highlander

Browse all Theses and Dissertations

Current commercial tracking systems do not process images fast enough to perform target-tracking in real- time. State-of-the-art methods use entire scenes to locate objects frame-by-frame and are commonly computationally expensive because they use image convolutions. Alternatively, attention mechanisms track more efficiently by mimicking human optical cognitive interaction to only process small portions of an image. Thus, in this work we use an attention-based approach to create a model called C-DATM (Conditional Dilated Attention tracking Model) that learns to compare target features in a sequence of image-frames using dilated convolutions. The C-DATM is tested using the Modified National Institute of Standards …


Leveraging Schema Information For Improved Knowledge Graph Navigation, Rama Someswar Chittella Jan 2019

Leveraging Schema Information For Improved Knowledge Graph Navigation, Rama Someswar Chittella

Browse all Theses and Dissertations

Over the years, the semantic web has emerged as a new generation of the world wide web featuring advanced technologies and research contributions. It has revolutionized the usage of information by allowing users to capture and publish machine-understandable data and expedite methods such as ontologies to perform the same. These ontologies help in the formal representation of a specified domain and foster comprehensive machine understanding. Although, the engineering of ontologies and usage of logic have been an integral part of the web semantics, new areas of research such as the semantic web search, linking and usage of open data on …


Detecting Malicious Behavior In Openwrt With Qemu Tracing, Jeremy Porter Jan 2019

Detecting Malicious Behavior In Openwrt With Qemu Tracing, Jeremy Porter

Browse all Theses and Dissertations

In recent years embedded devices have become more ubiquitous than ever before and are expected to continue this trend. Embedded devices typically have a singular or more focused purpose, a smaller footprint, and often interact with the physical world. Some examples include routers, wearable heart rate monitors, and thermometers. These devices are excellent at providing real time data or completing a specific task quickly, but they lack many features that make security issues more obvious. Generally, Embedded devices are not easily secured. Malware or rootkits in the firmware of an embedded system are difficult to detect because embedded devices do …


Efficient Numerical Methods For Chemotaxis And Plasma Modulation Instability Studies, Truong B. Nguyen Jan 2019

Efficient Numerical Methods For Chemotaxis And Plasma Modulation Instability Studies, Truong B. Nguyen

Browse all Theses and Dissertations

In this thesis, we develop efficient numerical solvers for nonlinear systems of partial differential equations (PDEs). These systems of PDEs concern two different sets of physical problems. The first set includes chemotaxis models such as Keller-Segel models and cancer cell invasion models. Solutions of these models are observed to experience the blow-up phenomenon or the development of sharp and spiky features. Therefore, efficient and accurate numerical techniques must be employed in order to capture the solutions' behaviors. For this research, we design efficient solvers for these systems in the one and two spatial dimensions. In particular, we plan to apply …


Virtual Reality And Analysis Framework For Studying Different Layout Designs, Madison Glines Jan 2019

Virtual Reality And Analysis Framework For Studying Different Layout Designs, Madison Glines

Browse all Theses and Dissertations

This thesis describes the tools for studying different design prototypes. The goal was to develop effective tools to study these designs using a data-driven approach. “Proof of concept” experiments were conducted, in which participants were allowed to interact with a virtual environment depicting different designs as data pertaining to their virtual location and orientation was recorded for later analysis. The designs included “flat” store racks, as opposed to racks with more varied shapes, as well as “curved” racks. Focus of the design studies was to assist in identifying optimal locations for different product types. The automated data collection mechanisms required …


Llvm-Ir Based Decompilation, Ilsoo Jeon Jan 2019

Llvm-Ir Based Decompilation, Ilsoo Jeon

Browse all Theses and Dissertations

Decompilation is a process of transforming an executable program into a source-like high-level language code, which plays an important role in malware analysis, and vulnerability detection. In this thesis, we design and implement the middle end of a decompiler framework, focusing on Low Level Language properties reduction using the optimization techniques, propagation and elimination. An open-source software tool, dagger, is used to translate binary code to LLVM (Low Level Virtual Machine) Intermediate Representation code. We perform data flow analysis and control flow analysis on the LLVM format code to generate high-level code using a Functional Programming Langauge (FPL), Haskell. The …


Anticipation In Dynamic Environments: Deciding What To Monitor, Zohreh A. Dannenhauer Jan 2019

Anticipation In Dynamic Environments: Deciding What To Monitor, Zohreh A. Dannenhauer

Browse all Theses and Dissertations

In dynamic environments, external changes may occur that may affect planning decisions and goal choices. We claim that an intelligent agent should actively watch for what can go wrong and anticipate changes in the environment that allows the changing of its plan or changing of a given goal. In this thesis, we focus on the relationship between perception, act, interpretation, and planning. We claim that these components are not independent and need to interact with each other to help the agent succeed in achieving its goals and plans. If newly encountered world information affects the plan, the agent adapts to …


Software Implementations And Applications Of Elliptic Curve Cryptography, Kirill Kultinov Jan 2019

Software Implementations And Applications Of Elliptic Curve Cryptography, Kirill Kultinov

Browse all Theses and Dissertations

Elliptic Curve Cryptography (ECC) is a public-key cryptography system. Elliptic Curve Cryptography (ECC) can achieve the same level of security as the public-key cryptography system, RSA, with a much smaller key size. It is a promising public key cryptography system with regard to time efficiency and resource utilization. This thesis focuses on the software implementations of ECC over finite field GF(p) with two distinct implementations of the Big Integer classes using character arrays, and bit sets in C++ programming language. Our implementation works on the ECC curves of the form y^2 = x^3 + ax + b (mod p). The …


Vegetation Sensitivity During The Mid-Holocene Warming In Western Ohio, Kristin Kopera Jan 2019

Vegetation Sensitivity During The Mid-Holocene Warming In Western Ohio, Kristin Kopera

Browse all Theses and Dissertations

There has been a growing interest in prairie reconstruction in western Ohio, yet there are few recent academic sources supporting the claim that prairies appeared in western Ohio during the mid-Holocene. The hypsithermal was the warmest and driest part of the Holocene and occurred from 8,000-4,000 years ago in the Midwest. During the hypsithermal, the Prairie Peninsula appeared from Minnesota to eastern Ohio. If prairie did appear in Ohio, it occurred during the mid-Holocene hypsithermal. The goal of this study was to determine if western Ohio experienced a prairie period during the hypsithermal using pollen as a proxy for past …


Investigating An Apparent Structural High In Seismic Data In North Terre Haute, Indiana, Through First-Arrival Traveltime Tomography And Gravity Analysis, Daniel Grant Koehl Jan 2019

Investigating An Apparent Structural High In Seismic Data In North Terre Haute, Indiana, Through First-Arrival Traveltime Tomography And Gravity Analysis, Daniel Grant Koehl

Browse all Theses and Dissertations

This study focuses on northern Terre Haute, Indiana, where seven 2D seismic reflection time sections were collected by CountryMark and donated to Wright State University. Geologically, the area is on the eastern margin of the Illinois Basin. Two of these seismic lines display significant relief along a continuous, high-amplitude horizon approximately 180 milliseconds in two-way traveltime depth. This horizon was previously interpreted by CountryMark to be a Silurian reef core of the type common in this region of the Illinois Basin; however, other seismic lines within the data set display no relief. Furthermore, borehole logs within the area show no …


Rules With Right Hand Existential Or Disjunction With Rowltab, Sri Jitendra Satpathy Jan 2019

Rules With Right Hand Existential Or Disjunction With Rowltab, Sri Jitendra Satpathy

Browse all Theses and Dissertations

One hotly debated research topic is, “What is the best approach for modeling ontologies?”. In the earlier stages of modeling ontologies, researchers have favored the usage of description logic to capture knowledge. One such choice is the Web Ontology Language (OWL) that is based on description logic. Many tools were designed around this principle and are still widely being used to model and explore ontologies. However, not all users find description logic to be intuitive, at least not without an extensive background in formal logics. Due to this, researchers have tried to explore other ways that will enable such users …


Scalable Clustering For Immune Repertoire Sequence Analysis, Prem Bhusal Jan 2019

Scalable Clustering For Immune Repertoire Sequence Analysis, Prem Bhusal

Browse all Theses and Dissertations

The development of the next-generation sequencing technology has enabled systems immunology researchers to conduct detailed immune repertoire analysis at the molecule level. Large sequence datasets (e.g., millions of sequences) are being collected to comprehensively understand how the immune system of a patient evolves over different stages of disease development. A recent study has shown that the hierarchical clustering (HC) algorithm gives the best results for B-cell clones analysis - an important type of immune repertoire sequencing (IR-Seq) analysis. However, due to the inherent complexity, the classical hierarchical clustering algorithm does not scale well to large sequence datasets. Surprisingly, no algorithms …


Paradoxical Behavior In Groundwater Levels In Response To Precipitation Events, Alexandra Shelters Jan 2019

Paradoxical Behavior In Groundwater Levels In Response To Precipitation Events, Alexandra Shelters

Browse all Theses and Dissertations

Groundwater levels are expected to fluctuate with precipitation, rising when precipitation increases and falling when it decreases. However, observations often show that groundwater levels rise in months when precipitation has decreased from the previous month, or alternately, falls in months when precipitation has increased from the previous month. Such paradoxical behavior is documented in a 30-year record for a monitoring well in southwestern Ohio. This record was analyzed to evaluate the hypothesis that mass balance controls the change in groundwater level such that changes cannot be predicted solely from monthly changes in precipitation. Though precipitation may vary from one month …


Abusive And Hate Speech Tweets Detection With Text Generation, Abhishek Nalamothu Jan 2019

Abusive And Hate Speech Tweets Detection With Text Generation, Abhishek Nalamothu

Browse all Theses and Dissertations

According to a Pew Research study, 41% of Americans have personally experienced online harassment and two-thirds of Americans have witnessed harassment in 2017. Hence, online harassment detection is vital for securing and sustaining the popularity and viability of online social networks. Machine learning techniques play a crucial role in automatic harassment detection. One of the challenges of using supervised approaches is training data imbalance. Existing text generation techniques can help augment the training data, but they are still inadequate and ineffective. This research explores the role of domain-specific knowledge to complement the limited training data available for training a text …


Automated Vehicle Electronic Control Unit (Ecu) Sensor Location Using Feature-Vector Based Comparisons, Gregory S. Buthker Jan 2019

Automated Vehicle Electronic Control Unit (Ecu) Sensor Location Using Feature-Vector Based Comparisons, Gregory S. Buthker

Browse all Theses and Dissertations

In the growing world of cybersecurity, being able to map and analyze how software and hardware interact is key to understanding and protecting critical embedded systems like the Engine Control Unit (ECU). The aim of our research is to use our understanding of the ECU's control flow attained through manual analysis to automatically map and identify sensor functions found within the ECU. We seek to do this by generating unique sets of feature vectors for every function within the binary file of a car ECU, and then using those feature sets to locate functions within each binary similar to their …


Ammonium Cycling And Nitrifier Community Composition In Eutrophic Waters Affected By Cyanobacterial Harmful Algal Blooms, Justyna J. Hampel Jan 2019

Ammonium Cycling And Nitrifier Community Composition In Eutrophic Waters Affected By Cyanobacterial Harmful Algal Blooms, Justyna J. Hampel

Browse all Theses and Dissertations

Non-point source nitrogen (N) from agriculture is a main driver of eutrophication in aquatic systems, which often manifests as toxin producing cyanobacterial harmful algal blooms (cyanoHABs). Non-N2 fixing cyanobacteria, such as Microcystis, thrive on chemically reduced N forms (e.g., ammonium (NH4+) and urea) used as the main N form in fertilizer. NH4+ turnover rates are important components of the aquatic N cycle in eutrophic lakes affected by cyanoHABs. Regeneration of NH4+ can contribute to the internal cycling of NH4+, which can sustain cyanoHABs when external loads are low. Additionally, NH4+ uptake by cyanobacteria competes directly with nitrification, another important pathway …


Recognition Of Incomplete Objects Based On Synthesis Of Views Using A Geometric Based Local-Global Graphs, Michael Christopher Robbeloth Jan 2019

Recognition Of Incomplete Objects Based On Synthesis Of Views Using A Geometric Based Local-Global Graphs, Michael Christopher Robbeloth

Browse all Theses and Dissertations

The recognition of single objects is an old research field with many techniques and robust results. The probabilistic recognition of incomplete objects, however, remains an active field with challenging issues associated to shadows, illumination and other visual characteristics. With object incompleteness, we mean missing parts of a known object and not low-resolution images of that object. The employment of various single machine-learning methodologies for accurate classification of the incomplete objects did not provide a robust answer to the challenging problem. In this dissertation, we present a suite of high-level, model-based computer vision techniques encompassing both geometric and machine learning approaches …


Knowledge Graph Reasoning Over Unseen Rdf Data, Bhargavacharan Reddy Kaithi Jan 2019

Knowledge Graph Reasoning Over Unseen Rdf Data, Bhargavacharan Reddy Kaithi

Browse all Theses and Dissertations

In recent years, the research in deep learning and knowledge engineering has made a wide impact on the data and knowledge representations. The research in knowledge engineering has frequently focused on modeling the high level human cognitive abilities, such as reasoning, making inferences, and validation. Semantic Web Technologies and Deep Learning have an interest in creating intelligent artifacts. Deep learning is a set of machine learning algorithms that attempt to model data representations through many layers of non-linear transformations. Deep learning is in- creasingly employed to analyze various knowledge representations mentioned in Semantic Web and provides better results for Semantic …


Knowledge-Enabled Entity Extraction, Hussein S. Al-Olimat Jan 2019

Knowledge-Enabled Entity Extraction, Hussein S. Al-Olimat

Browse all Theses and Dissertations

Information Extraction (IE) techniques are developed to extract entities, relationships, and other detailed information from unstructured text. The majority of the methods in the literature focus on designing supervised machine learning techniques, which are not very practical due to the high cost of obtaining annotations and the difficulty in creating high quality (in terms of reliability and coverage) gold standard. Therefore, semi-supervised and distantly-supervised techniques are getting more traction lately to overcome some of the challenges, such as bootstrapping the learning quickly. This dissertation focuses on information extraction, and in particular entities, i.e., Named Entity Recognition (NER), from multiple domains, …