Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

PDF

Computers

Discipline
Institution
Publication Year
Publication
Publication Type

Articles 1 - 30 of 74

Full-Text Articles in Physical Sciences and Mathematics

Computer Recording Of The Variation In Intake Of Supplements Provided To Grazing Cattler, R M. Tait, L J. Fisher Aug 2024

Computer Recording Of The Variation In Intake Of Supplements Provided To Grazing Cattler, R M. Tait, L J. Fisher

IGC Proceedings (1993-2023)

A computer system has been developed to record the consumption of' supplements provided free choice to grazing cattle. The system is based on electronic animal identification and one or more weatherproof electronic scales located in simple feed stations connected by telephone cable to a computer at a distance of up to 1 km. The software program identifies and records individual animals, • time and duration of visits, and the quantity of supplement consumed. The system has been tested in the field using 40 kg molasses-based feed blocks with up to 20 steers per feed station in paddocks of approximately 4 …


Modelling As Tool For Grassland Science Progress, N G. Seligman Aug 2024

Modelling As Tool For Grassland Science Progress, N G. Seligman

IGC Proceedings (1993-2023)

Simulation modeling in grassland science has a history of more than 20 years. To dnle it has been distinguished more by its continuing and expanding development than by its success in advancing grassland science and practice. This possibly reflects the phenomenal increase in computer technology compared with the much more modest progress in grassland science. Models have nevertheless been the vehicle for identifiable contributions to grassland theory and there are an increasing number of successful applications in management and policy situations. Expectations for future contributions are more realistic today than in the heady early years, but despite much disillusion, the …


Decision Support System In The Transfer Of Grassland Technology, J W. Stuth, W T. Hamilton, J C. Conner, D P. Sheehy Aug 2024

Decision Support System In The Transfer Of Grassland Technology, J W. Stuth, W T. Hamilton, J C. Conner, D P. Sheehy

IGC Proceedings (1993-2023)

A world-wide demand for sustainable development of our grazinglands has placed an unprecedented urgency to determine mechanisms to develop and transfer technology that meets the needs of individual landholders and overarching values of society. Unfortunately, advances in science and technology have outstripped our ability lo organise information into a usable form using traditional institutions. The emergence of computer technology with high power/ cost ratios has accelerated interest in computerised decision support systems (DSS) over the past 10 years. These systems assist resource managers in dealing with complex planning problems by allowing exploration of alternatives and selection of appropriate technology. If …


Networking Advisory Groups And Electronic Media To Transfer Information On Forage Management, J J. Mullahey, R M. Muchovej, K U. Hill Jun 2024

Networking Advisory Groups And Electronic Media To Transfer Information On Forage Management, J J. Mullahey, R M. Muchovej, K U. Hill

IGC Proceedings (1993-2023)

The objective of this paper is to discuss a coordinated multi-county extension program in forages through the involvement of a beef/ forage advisory committee and technology transfer or information dissemination using electronic media.


Computer-Aided Craniofacial Superimposition Validation Study: The Identification Of The Leaders And Participants Of The Polish-Lithuanian January Uprising (1863–1864), Rubén Martos, Rosario Guerra, Fernando Navarro, Michela Peruch, Kevin Neuwirth, Andrea Valsecchi, Rimantas Jankauskas, Oscar Ibáñez Jan 2024

Computer-Aided Craniofacial Superimposition Validation Study: The Identification Of The Leaders And Participants Of The Polish-Lithuanian January Uprising (1863–1864), Rubén Martos, Rosario Guerra, Fernando Navarro, Michela Peruch, Kevin Neuwirth, Andrea Valsecchi, Rimantas Jankauskas, Oscar Ibáñez

Student and Faculty Publications

In 2017, a series of human remains corresponding to the executed leaders of the "January Uprising" of 1863-1864 were uncovered at the Upper Castle of Vilnius (Lithuania). During the archeological excavations, 14 inhumation pits with the human remains of 21 individuals were found at the site. The subsequent identification process was carried out, including the analysis and cross-comparison of post-mortem data obtained in situ and in the lab with ante-mortem data obtained from historical archives. In parallel, three anthropologists with diverse backgrounds in craniofacial identification and two students without previous experience attempted to identify 11 of these 21 individuals using …


A Survey Of Using Machine Learning In Iot Security And The Challenges Faced By Researchers, Khawlah M. Harahsheh, Chung-Hao Chen Jan 2023

A Survey Of Using Machine Learning In Iot Security And The Challenges Faced By Researchers, Khawlah M. Harahsheh, Chung-Hao Chen

Electrical & Computer Engineering Faculty Publications

The Internet of Things (IoT) has become more popular in the last 15 years as it has significantly improved and gained control in multiple fields. We are nowadays surrounded by billions of IoT devices that directly integrate with our lives, some of them are at the center of our homes, and others control sensitive data such as military fields, healthcare, and datacenters, among others. This popularity makes factories and companies compete to produce and develop many types of those devices without caring about how secure they are. On the other hand, IoT is considered a good insecure environment for cyber …


Moving Toward Personalized Law, Cary Coglianese Mar 2022

Moving Toward Personalized Law, Cary Coglianese

All Faculty Scholarship

Rules operate as a tool of governance by making generalizations, thereby cutting down on government officials’ need to make individual determinations. But because they are generalizations, rules can result in inefficient or perverse outcomes due to their over- and under-inclusiveness. With the aid of advances in machine-learning algorithms, however, it is becoming increasingly possible to imagine governments shifting away from a predominant reliance on general rules and instead moving toward increased reliance on precise individual determinations—or on “personalized law,” to use the term Omri Ben-Shahar and Ariel Porat use in the title of their 2021 book. Among the various technological, …


Post-Quantum Secure Identity-Based Encryption Scheme Using Random Integer Lattices For Iot-Enabled Ai Applications, Dharminder Dharminder, Ashok Kumar Das, Sourav Saha, Basudeb Bera, Athanasios V. Vasilakos Jan 2022

Post-Quantum Secure Identity-Based Encryption Scheme Using Random Integer Lattices For Iot-Enabled Ai Applications, Dharminder Dharminder, Ashok Kumar Das, Sourav Saha, Basudeb Bera, Athanasios V. Vasilakos

VMASC Publications

Identity-based encryption is an important cryptographic system that is employed to ensure confidentiality of a message in communication. This article presents a provably secure identity based encryption based on post quantum security assumption. The security of the proposed encryption is based on the hard problem, namely Learning with Errors on integer lattices. This construction is anonymous and produces pseudo random ciphers. Both public-key size and ciphertext-size have been reduced in the proposed encryption as compared to those for other relevant schemes without compromising the security. Next, we incorporate the constructed identity based encryption (IBE) for Internet of Things (IoT) applications, …


Regulating New Tech: Problems, Pathways, And People, Cary Coglianese Dec 2021

Regulating New Tech: Problems, Pathways, And People, Cary Coglianese

All Faculty Scholarship

New technologies bring with them many promises, but also a series of new problems. Even though these problems are new, they are not unlike the types of problems that regulators have long addressed in other contexts. The lessons from regulation in the past can thus guide regulatory efforts today. Regulators must focus on understanding the problems they seek to address and the causal pathways that lead to these problems. Then they must undertake efforts to shape the behavior of those in industry so that private sector managers focus on their technologies’ problems and take actions to interrupt the causal pathways. …


A Zenith Z-100 Emulator, Joseph Matta May 2021

A Zenith Z-100 Emulator, Joseph Matta

Master’s Theses and Projects

The Zenith Z-100 computer was released by the Zenith Data Systems Corporation in 1982 as a competitor to the IBM PC. There are no known complete software emulations of the system. A Z-100 emulator is considered to be complete if it runs all functions of its monitor ROM BIOS program and is able to boot and run its two operating systems. One reason previous emulation attempts are not complete is that they ineffectively implement the floppy disk controller, preventing a proper transfer of the operating system from disk into memory. This project is an attempt to write a complete emulation …


A Novel Efficient Quantum Random Access Memory, Mohammed Zidan, Abdel-Haleem Abdel-Aty, Ashraf Khalil, Mahmoud Abdel-Aty, Hichem Eleuch Jan 2021

A Novel Efficient Quantum Random Access Memory, Mohammed Zidan, Abdel-Haleem Abdel-Aty, Ashraf Khalil, Mahmoud Abdel-Aty, Hichem Eleuch

All Works

Owing to the significant progress in manufacturing desktop quantum computers, the quest to achieve efficient quantum random access memory (QRAM) became inevitable. In this paper, we propose a novel efficient random access memory for quantum computers. The proposed QRAM has a fixed structure and can be used efficiently to store both known and unknown classical/quantum data. The storage capacity of the proposed QRAM is more efficient than that of the classical RAMs and can be used to store both classical and quantum information. Furthermore, the proposed model can access an arbitrary location in O(1) compared with other state-of-the-art models.


Processor Modules For The Classroom Development Of Physical Computers, Lakshmi Ongolu Dec 2020

Processor Modules For The Classroom Development Of Physical Computers, Lakshmi Ongolu

Master’s Theses and Projects

Processors are present in almost all the electronic components available in the market now. As they perform trillions of operations per second and are complex internally. This project is to build building modules for students, who will be able to develop their own processor. The main idea is that this will help students to experience the detailed workflow of a processor and focus on design and development instead of spending time on wiring and soldering. Different components such as Program Counter, Instruction Register, Memory, Multiplexer, Adder and transceivers are designed and printed as individual modules on printed circuit boards (PCB’s). …


“Sorry I Didn’T Hear You.” The Ethics Of Voice Computing And Ai In High Risk Mental Health Populations, Fazal Khan, Christopher Villongco Jan 2020

“Sorry I Didn’T Hear You.” The Ethics Of Voice Computing And Ai In High Risk Mental Health Populations, Fazal Khan, Christopher Villongco

Scholarly Works

This article examines the ethical and policy implications of using voice computing and artificial intelligence to screen for mental health conditions in low income and minority populations. Mental health is unequally distributed among these groups, which is further exacerbated by increased barriers to psychiatric care. Advancements in voice computing and artificial intelligence promise increased screening and more sensitive diagnostic assessments. Machine learning algorithms have the capacity to identify vocal features that can screen those with depression. However, in order to screen for mental health pathology, computer algorithms must first be able to account for the fundamental differences in vocal characteristics …


Single Image Reflection Removal Beyond Linearity, Qiang Wen, Yinjie Tan, Jing Qin, Wenxi Liu, Guoqiang Han, Shengfeng He Jun 2019

Single Image Reflection Removal Beyond Linearity, Qiang Wen, Yinjie Tan, Jing Qin, Wenxi Liu, Guoqiang Han, Shengfeng He

Research Collection School Of Computing and Information Systems

Due to the lack of paired data, the training of image reflection removal relies heavily on synthesizing reflection images. However, existing methods model reflection as a linear combination model, which cannot fully simulate the real-world scenarios. In this paper, we inject non-linearity into reflection removal from two aspects. First, instead of synthesizing reflection with a fixed combination factor or kernel, we propose to synthesize reflection images by predicting a non-linear alpha blending mask. This enables a free combination of different blurry kernels, leading to a controllable and diverse reflection synthesis. Second, we design a cascaded network for reflection removal with …


Outreach In Archaeology With Agent-Based Modeling: Part 3 Of 3, Stefani Crabtree, Kathryn Harris, Benjamin Davies, Iza Romanowska May 2019

Outreach In Archaeology With Agent-Based Modeling: Part 3 Of 3, Stefani Crabtree, Kathryn Harris, Benjamin Davies, Iza Romanowska

Environment and Society Faculty Publications

A major challenge facing archaeologists is communicating our research to the public. Thankfully, new computational tools have enabled the testing and visualization of complex ideas in an easily packageable format. In this article we illustrate not only how agent-based modeling provides a platform for communicating complex ideas, but also how these game-like computer models can be explored and manipulated by members of the public therefore increasing their engagement in archaeological explanations. We suggest that these new digital tools serve as an excellent aid for education on the importance of archaeological sites and artifacts. To illustrate the above we walk the …


Covertnet: Circumventing Web Surveillance Using Covert Channels, Will C. Burghard Jan 2019

Covertnet: Circumventing Web Surveillance Using Covert Channels, Will C. Burghard

Senior Projects Fall 2019

Senior Project submitted to The Division of Science, Mathematics and Computing of Bard College.


Transfer Learning For Detecting Unknown Network Attacks, Juan Zhao, Sachin Shetty, Jan Wei Pan, Charles Kamhoua, Kevin Kwiat Jan 2019

Transfer Learning For Detecting Unknown Network Attacks, Juan Zhao, Sachin Shetty, Jan Wei Pan, Charles Kamhoua, Kevin Kwiat

VMASC Publications

Network attacks are serious concerns in today’s increasingly interconnected society. Recent studies have applied conventional machine learning to network attack detection by learning the patterns of the network behaviors and training a classification model. These models usually require large labeled datasets; however, the rapid pace and unpredictability of cyber attacks make this labeling impossible in real time. To address these problems, we proposed utilizing transfer learning for detecting new and unseen attacks by transferring the knowledge of the known attacks. In our previous work, we have proposed a transfer learning-enabled framework and approach, called HeTL, which can find the common …


Feasibility Of Peltier Chips As Thermoelectric Generators On Heatsinks, Matthew Choquette, Dillon Ranstrom Dec 2018

Feasibility Of Peltier Chips As Thermoelectric Generators On Heatsinks, Matthew Choquette, Dillon Ranstrom

Augsburg Honors Review

As the demand of computer processing grows, the burden placed on CPUs will increase as well. Computing systems produce heat, which is attracted to a metal heatsink where it is dissipated out of the system by a fan. Liquid cooling can be more effective, but is more expensive and increases the risk of damaging leaks. Peltier chips, electronic components which transfer heat into electricity, can be used in an effort to reclaim and reuse some of this waste heat. This experiment tested twelve heatsinks of various designs to maximize the effect of the Peltier chip. Variations in designs of the …


Bot Or Not: Detecting Bots In Online Multiplayer Video Games Through User Input, Alexander Boutelle Apr 2018

Bot Or Not: Detecting Bots In Online Multiplayer Video Games Through User Input, Alexander Boutelle

Undergraduate Research Celebration 2018

No abstract provided.


The Big Revolution: Future Potential Of Blockchain Technology, Sweksha Poudel, Sushant Bhatta, Jeremy Evert Mar 2018

The Big Revolution: Future Potential Of Blockchain Technology, Sweksha Poudel, Sushant Bhatta, Jeremy Evert

Student Research

Blockchain is the continuation of humanity’s connection with technology. If we think back to a more ancient era, trade was done in a very informal manner. Often the result of one’s desire to get what they wanted was with violence. Society as a whole then started becoming more formalized and grew in complexity. Institutions like banks and governments established currency, policy, and regulation. Eventually, we had access to these same institutions on the internet and the list grew exponentially. Marketplaces like Amazon and eBay made trade much easier for the common man to use and it kept lowering uncertainties of …


Review Of Principles Of Computer Science, Ed. By Donald R. Franceschetti., Michael Knee Aug 2017

Review Of Principles Of Computer Science, Ed. By Donald R. Franceschetti., Michael Knee

University Libraries Faculty Scholarship

A review of "Principles of Computer Science" edited by Donald R. Franceschetti.


Hardware Design Theory (Using Raspberry Pi), Anthony Kelly, Thomas Blum Dr. May 2017

Hardware Design Theory (Using Raspberry Pi), Anthony Kelly, Thomas Blum Dr.

Undergraduate Research

The concept for this research proposal is focused on achieving three main objectives:

1) To understand the logic and design behind the Raspberry Pi (RbP) mini-computer model, including: all hardware components and their functions, the capabilities [and limits] of the RbP, and the circuit engineering for these components.

2) To be able to, using the Python high-level language, duplicate, manipulate, and create RbP projects ranging from basic user-input and response systems to the theories behind more intricate and complicated observatory sensors.

3) Simultaneously, in order to combine a mutual shared interest of History and to blend in work done within …


A Mini-History Of Computing, George K. Thiruvathukal Oct 2016

A Mini-History Of Computing, George K. Thiruvathukal

George K. Thiruvathukal

This book was produced by George K. Thiruvathukal for the American Institute of Physics to promote interest in the interdisciplinary publication, Computing in Science and Engineering. It accompanied a limited edition set of playing cards that is no longer available (except in PDF). This book features a set of 54 significant computers by era/category, including ancient calculating instruments, pre-electronic mechanical calculators and computers, electronic era computers, and modern computing (minicomputers, maniframes, personal computers, devices, and gaming consoles).


Some Contemporary Issues In Software Reliability., Vignesh Subrahmaniam Dr. Oct 2016

Some Contemporary Issues In Software Reliability., Vignesh Subrahmaniam Dr.

Doctoral Theses

No abstract provided.


The Web Based Monitoring Project At The Cms Experiment, Juan Antonio Lopez-Perez, Kaori Maeshima, William Badgett, Ulf Behrens, Irakli Chakaberia, Youngkwon Jo, Sho Maruyama, James Patrick, Valdas Rapsevicius, Aron Soha, Mantas Stankevicius, Balys Sulmanas, Sachiko Toda, Zongru Wan Oct 2016

The Web Based Monitoring Project At The Cms Experiment, Juan Antonio Lopez-Perez, Kaori Maeshima, William Badgett, Ulf Behrens, Irakli Chakaberia, Youngkwon Jo, Sho Maruyama, James Patrick, Valdas Rapsevicius, Aron Soha, Mantas Stankevicius, Balys Sulmanas, Sachiko Toda, Zongru Wan

Physics Faculty Research

The Compact Muon Solenoid is a large a complex general purpose experiment at the CERN Large Hadron Collider (LHC), built and maintained by many collaborators from around the world. Efficient operation of the detector requires widespread and timely access to a broad range of monitoring and status information. To the end the Web Based Monitoring (WBM) system was developed to present data to users located anywhere from many underlying heterogeneous sources, from real time messaging systems to relational databases. This system provides the power to combine and correlate data in both graphical and tabular formats of interest to the experimenters, …


Prosense, Johnny Favazza Ii, Casey Glasgow, Matt Epperson Jun 2016

Prosense, Johnny Favazza Ii, Casey Glasgow, Matt Epperson

Computer Engineering

This project aims to gather advanced data sets from MEMS sensors and GPS and deliver it to the user, who can capitalize on the data. The once negligible half-degree difference of your board barreling down a wave can be recorded from a gyro and exploited for the perfect turn. The exact speed dreaded by longboarders where speed wobbles turn into a road rash can be analysed and consequently avoided. Ascertaining the summit of your flight using combined GPS sensors from the ski ramp allows for the correct timing of tricks. When it comes to pursuing excellence in professional sports, amateur …


Quantum Computers Are Coming And Will Be Able To Solve Complex Aviation And Aerospace Problems, Nihad E. Daidzic Jun 2016

Quantum Computers Are Coming And Will Be Able To Solve Complex Aviation And Aerospace Problems, Nihad E. Daidzic

Aviation Department Publications

No abstract provided.


Teleradiology As A Foundation For An Enterprise-Wide Health Care Delivery System, John David N. Dionisio, Ricky K. Taira, Usha Sinha, David B. Johnson, Benjamin Y. Dai, Gregory H. Tashima, Stephen Blythe, Richard Johnson, Hooshang Kangarloo Aug 2015

Teleradiology As A Foundation For An Enterprise-Wide Health Care Delivery System, John David N. Dionisio, Ricky K. Taira, Usha Sinha, David B. Johnson, Benjamin Y. Dai, Gregory H. Tashima, Stephen Blythe, Richard Johnson, Hooshang Kangarloo

John David N. Dionisio

An effective, integrated telemedicine system has been developed that allows (a) teleconsultation between local primary health care providers (primary care physicians and general radiologists) and remote imaging subspecialists and (b) active patient participation related to his or her medical condition and patient education. The initial stage of system development was a traditional teleradiology consultation service between general radiologists and specialists; this established system was expanded to include primary care physicians and patients. The system was developed by using a well-defined process model, resulting in three integrated modules: a patient module, a primary health care provider module, and a specialist module. …


Integrated Multimedia Timeline Of Medical Images And Data For Thoracic Oncology Patients, Denise R. Aberle, John David N. Dionisio, Michael F. Mcnitt-Gray, Ricky K. Taira, Alfonso F. Cárdenas, Jonathan G. Goldin, Kathleen Brown, Robert A. Figlin, Wesley W. Chu Aug 2015

Integrated Multimedia Timeline Of Medical Images And Data For Thoracic Oncology Patients, Denise R. Aberle, John David N. Dionisio, Michael F. Mcnitt-Gray, Ricky K. Taira, Alfonso F. Cárdenas, Jonathan G. Goldin, Kathleen Brown, Robert A. Figlin, Wesley W. Chu

John David N. Dionisio

A prototype multimedia medical database has been developed to provide image and textual data for thoracic oncology patients undergoing treatment of advanced malignancies. The database integrates image data from the hospital pieture archiving and communication system with textual reports from the radiology information system, alphanumeric data contained in the hospital information system, and other electronic medical data. The database presents information in a timeline format and also contains visualization programs that permit the user to view and annotate radiographic measurements in tabular or graphic form. The database provides an efficient and intuitive display of the changing status of oncology patients. …


Slides: Ag Water Sharing: Legal Challenges And Considerations, Peter D. Nichols Jun 2015

Slides: Ag Water Sharing: Legal Challenges And Considerations, Peter D. Nichols

Innovations in Managing Western Water: New Approaches for Balancing Environmental, Social and Economic Outcomes (Martz Summer Conference, June 11-12)

Presenter: Peter D. Nichols, Esq., Partner, Berg, Hill, Greenleaf and Ruscitti, Boulder, CO

25 slides