Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Old Dominion University

Computer Sciences

2020

Keyword
Publication
Publication Type

Articles 1 - 30 of 82

Full-Text Articles in Physical Sciences and Mathematics

Fundamentals Of Human-Centric Artificial Intelligence (A.I.): Comparative Analysis Of Europe And The U. S. Landscape, Torré A. Williams Dec 2020

Fundamentals Of Human-Centric Artificial Intelligence (A.I.): Comparative Analysis Of Europe And The U. S. Landscape, Torré A. Williams

Cybersecurity Undergraduate Research Showcase

This research is a comparative analysis of human-centric Artificial Intelligence (A.I.) in Europe and the U.S. This research establishes fundamentals that are critical to what makes A.I. human-centric. This research contains eight phases: 1) Lawful A.I.; 2) Robust A.I.; 3) Ethical A.I.; 4) Human-centric A.I.; 5) Current State of A.I.; 6) A.I. in Europe; 7) A.I. in the U.S.; 9) Importance of Human-centric A.I. This research shows that there are still ongoing changes with having a human-centric A.I. and why it is very important to society. This research is the beginning of the making of a successful and reliable human-centric …


Enhanced Traffic Incident Analysis With Advanced Machine Learning Algorithms, Zhenyu Wang Dec 2020

Enhanced Traffic Incident Analysis With Advanced Machine Learning Algorithms, Zhenyu Wang

Computational Modeling & Simulation Engineering Theses & Dissertations

Traffic incident analysis is a crucial task in traffic management centers (TMCs) that typically manage many highways with limited staff and resources. An effective automatic incident analysis approach that can report abnormal events timely and accurately will benefit TMCs in optimizing the use of limited incident response and management resources. During the past decades, significant efforts have been made by researchers towards the development of data-driven approaches for incident analysis. Nevertheless, many developed approaches have shown limited success in the field. This is largely attributed to the long detection time (i.e., waiting for overwhelmed upstream detection stations; meanwhile, downstream stations …


Parallelization Of The Advancing Front Local Reconnection Mesh Generation Software Using A Pseudo-Constrained Parallel Data Refinement Method, Kevin Mark Garner Jr. Dec 2020

Parallelization Of The Advancing Front Local Reconnection Mesh Generation Software Using A Pseudo-Constrained Parallel Data Refinement Method, Kevin Mark Garner Jr.

Computer Science Theses & Dissertations

Preliminary results of a long-term project entailing the parallelization of an industrial strength sequential mesh generator, called Advancing Front Local Reconnection (AFLR), are presented. AFLR has been under development for the last 25 years at the NSF/ERC center at Mississippi State University. The parallel procedure that is presented is called Pseudo-constrained (PsC) Parallel Data Refinement (PDR) and consists of the following steps: (i) use an octree data-decomposition scheme to divide the original geometry into subdomains (octree leaves), (ii) refine each subdomain with the proper adjustments of its neighbors using the given refinement code, and (iii) combine all subdomain data into …


The Effects Of Security Framing, Time Pressure, And Brand Familiarity On Risky Mobile Application Downloads, Cody Parker Dec 2020

The Effects Of Security Framing, Time Pressure, And Brand Familiarity On Risky Mobile Application Downloads, Cody Parker

Psychology Theses & Dissertations

The current study examined the effects of security system framing, time pressure, and brand familiarity on mobile application download behaviors, with an emphasis on risk taking. According to the Prospect Theory, people tend to engage in irrational decision making, and make qualitatively different decisions when information is framed in terms of gains and losses (i.e., the framing effect). Past research has used this framing effect to guide the design of a risk display for mobile applications (apps), with the purpose of communicating the potential risks and minimizing insecure app selections. Time pressure has been shown to influence the framing effect …


Mementomap: A Web Archive Profiling Framework For Efficient Memento Routing, Sawood Alam Dec 2020

Mementomap: A Web Archive Profiling Framework For Efficient Memento Routing, Sawood Alam

Computer Science Theses & Dissertations

With the proliferation of public web archives, it is becoming more important to better profile their contents, both to understand their immense holdings as well as to support routing of requests in Memento aggregators. A memento is a past version of a web page and a Memento aggregator is a tool or service that aggregates mementos from many different web archives. To save resources, the Memento aggregator should only poll the archives that are likely to have a copy of the requested Uniform Resource Identifier (URI). Using the Crawler Index (CDX), we generate profiles of the archives that summarize their …


Internet Of Things (Iot): Cybersecurity Risks In Healthcare, Ruhi Patel Dec 2020

Internet Of Things (Iot): Cybersecurity Risks In Healthcare, Ruhi Patel

Cybersecurity Undergraduate Research Showcase

The rapid growth and investment in the Internet of Things (IoT) has significantly impacted how individuals and industries operate. The Internet of Things (IoT) refers to a network of physical, technology-embedded objects that communicate, detect, and interact with their external environment or internal state (Hung, 2017). According to Tankovska (2020), IoT devices are estimated to reach 21.5 billion units by 2025. This technological boom is leading various industrial sectors to notice a quick increase in cybersecurity risks and threats. One industrial sector has been particularly vulnerable to numerous cyber threats across the globe: healthcare. Oliver Noble (2020), a data encryption …


Autonomous Vehicles And The Ethical Tension Between Occupant And Non-Occupant Safety, Jason Borenstein, Joseph Herkert, Keith Miller Nov 2020

Autonomous Vehicles And The Ethical Tension Between Occupant And Non-Occupant Safety, Jason Borenstein, Joseph Herkert, Keith Miller

The Journal of Sociotechnical Critique

Given that the creation and deployment of autonomous vehicles is likely to continue, it is important to explore the ethical responsibilities of designers, manufacturers, operators, and regulators of the technology. We specifically focus on the ethical responsibilities surrounding autonomous vehicles that these stakeholders have to protect the safety of non-occupants, meaning individuals who are around the vehicles while they are operating. The term “non-occupants” includes, but is not limited to, pedestrians and cyclists. We are particularly interested in how to assign moral responsibility for the safety of non-occupants when autonomous vehicles are deployed in a complex, land-based transportation system.


Deepfrag-K: A Fragment-Based Deep Learning Approach For Protein Fold Recognition, Wessam Elhefnawy, Min Li, Jianxin Wang, Yaohang Li Nov 2020

Deepfrag-K: A Fragment-Based Deep Learning Approach For Protein Fold Recognition, Wessam Elhefnawy, Min Li, Jianxin Wang, Yaohang Li

Computer Science Faculty Publications

Background: One of the most essential problems in structural bioinformatics is protein fold recognition. In this paper, we design a novel deep learning architecture, so-called DeepFrag-k, which identifies fold discriminative features at fragment level to improve the accuracy of protein fold recognition. DeepFrag-k is composed of two stages: the first stage employs a multi-modal Deep Belief Network (DBN) to predict the potential structural fragments given a sequence, represented as a fragment vector, and then the second stage uses a deep convolutional neural network (CNN) to classify the fragment vector into the corresponding fold.

Results: Our results show that DeepFrag-k yields …


Agent-Based Modelling Of Values: The Case Of Value Sensitive Design For Refugee Logistics, Christine Boshuijzen-Van Burken, Ross J. Gore, Frank Dignum, Lamber Royakkers, Phillip Wozny, F. Leron Shults Oct 2020

Agent-Based Modelling Of Values: The Case Of Value Sensitive Design For Refugee Logistics, Christine Boshuijzen-Van Burken, Ross J. Gore, Frank Dignum, Lamber Royakkers, Phillip Wozny, F. Leron Shults

VMASC Publications

We have used value sensitive design as a method to develop an agent-based model of values in humanitarian logistics for refugees. Schwartz’s theory of universal values is implemented in the model in such a way that agents can make value trade-offs, which are operationalized into a measure of refugee wellbeing and a measure of public opinion about how the refugee logistics is being handled. By trying out different ‘value scenarios’, stakeholders who are responsible for, or involved in refugee logistics can have insights into the effects of various value choices. The model is visualized and made usable as a platform …


Gaining Insight Into Solar Photovoltaic Power Generation Forecasting Utilizing Explainable Artificial Intelligence Tools, Murat Kuzlu, Umit Cali, Vinayak Sharma, Özgür Güler Oct 2020

Gaining Insight Into Solar Photovoltaic Power Generation Forecasting Utilizing Explainable Artificial Intelligence Tools, Murat Kuzlu, Umit Cali, Vinayak Sharma, Özgür Güler

Engineering Technology Faculty Publications

Over the last two decades, Artificial Intelligence (AI) approaches have been applied to various applications of the smart grid, such as demand response, predictive maintenance, and load forecasting. However, AI is still considered to be a ‘‘black-box’’ due to its lack of explainability and transparency, especially for something like solar photovoltaic (PV) forecasts that involves many parameters. Explainable Artificial Intelligence (XAI) has become an emerging research field in the smart grid domain since it addresses this gap and helps understand why the AI system made a forecast decision. This article presents several use cases of solar PV energy forecasting using …


A Survey On Securing Personally Identifiable Information On Smartphones, Dar’Rell Pope, Yen-Hung (Frank) Hu, Mary Ann Hoppa Oct 2020

A Survey On Securing Personally Identifiable Information On Smartphones, Dar’Rell Pope, Yen-Hung (Frank) Hu, Mary Ann Hoppa

Virginia Journal of Science

With an ever-increasing footprint, already topping 3 billion devices, smartphones have become a huge cybersecurity concern. The portability of smartphones makes them convenient for users to access and store personally identifiable information (PII); this also makes them a popular target for hackers. This survey shares practical insights derived from analyzing 16 real-life case studies that exemplify: the vulnerabilities that leave smartphones open to cybersecurity attacks; the mechanisms and attack vectors typically used to steal PII from smartphones; the potential impact of PII breaches upon all parties involved; and recommended defenses to help prevent future PII losses. The contribution of this …


The Hidden Advantage Among Digital Natives Within Bug Bounty Programs, James (Jimmy) Allah-Mensah Oct 2020

The Hidden Advantage Among Digital Natives Within Bug Bounty Programs, James (Jimmy) Allah-Mensah

Cybersecurity Undergraduate Research Showcase

Bug bounty programs are a great way for companies and organizations to help keep their systems and information secure; however, there are only a limited number of white hat hacking participant spots. With only so many seats available at the table, being able to determine the most qualified group of individuals is critical to the efficiency of the program at large. Digital natives, people born into the digital age, provide an instinctive approach when dealing with technology. On the other hand, digital immigrants, people who grew up before the digital age and had to adapt to new technology, evidently utilize …


Snitch Application: Addressing Cyber Trust In Future Living Spaces, Russell Moore Aug 2020

Snitch Application: Addressing Cyber Trust In Future Living Spaces, Russell Moore

Cybersecurity Undergraduate Research Showcase

The future of smart homes is filled with excitement and ample opportunity to live in an environment that features extraordinary convenience and energy efficiency. Devices such as Amazon Alexa and Roku Smart TV’s feature voice interaction options that provide the user with enhanced functionality. While voice-activated devices are accommodating, it is imperative to acknowledge how they work on the backend. The problem is that these devices collect and share a large amount of data from users who are oftentimes unaware that it’s even happening. The Snitch App is being developed in order to inform the user of what exactly is …


Deep Learning For Remote Sensing Image Processing, Yan Lu Aug 2020

Deep Learning For Remote Sensing Image Processing, Yan Lu

Computational Modeling & Simulation Engineering Theses & Dissertations

Remote sensing images have many applications such as ground object detection, environmental change monitoring, urban growth monitoring and natural disaster damage assessment. As of 2019, there were roughly 700 satellites listing “earth observation” as their primary application. Both spatial and temporal resolutions of satellite images have improved consistently in recent years and provided opportunities in resolving fine details on the Earth's surface. In the past decade, deep learning techniques have revolutionized many applications in the field of computer vision but have not fully been explored in remote sensing image processing. In this dissertation, several state-of-the-art deep learning models have been …


Towards Dynamic Vehicular Clouds, Aida Ghazizadeh Aug 2020

Towards Dynamic Vehicular Clouds, Aida Ghazizadeh

Computer Science Theses & Dissertations

Motivated by the success of the conventional cloud computing, Vehicular Clouds were introduced as a group of vehicles whose corporate computing, sensing, communication, and physical resources can be coordinated and dynamically allocated to authorized users. One of the attributes that set Vehicular Clouds apart from conventional clouds is resource volatility. As vehicles enter and leave the cloud, new computing resources become available while others depart, creating a volatile environment where the task of reasoning about fundamental performance metrics becomes very challenging. The goal of this thesis is to design an architecture and model for a dynamic Vehicular Cloud built on …


Bootstrapping Web Archive Collections From Micro-Collections In Social Media, Alexander C. Nwala Aug 2020

Bootstrapping Web Archive Collections From Micro-Collections In Social Media, Alexander C. Nwala

Computer Science Theses & Dissertations

In a Web plagued by disappearing resources, Web archive collections provide a valuable means of preserving Web resources important to the study of past events. These archived collections start with seed URIs (Uniform Resource Identifiers) hand-selected by curators. Curators produce high quality seeds by removing non-relevant URIs and adding URIs from credible and authoritative sources, but this ability comes at a cost: it is time consuming to collect these seeds. The result of this is a shortage of curators, a lack of Web archive collections for various important news events, and a need for an automatic system for generating seeds. …


Secure Mobile Computing By Using Convolutional And Capsule Deep Neural Networks, Rui Ning Aug 2020

Secure Mobile Computing By Using Convolutional And Capsule Deep Neural Networks, Rui Ning

Electrical & Computer Engineering Theses & Dissertations

Mobile devices are becoming smarter to satisfy modern user's increasing needs better, which is achieved by equipping divers of sensors and integrating the most cutting-edge Deep Learning (DL) techniques. As a sophisticated system, it is often vulnerable to multiple attacks (side-channel attacks, neural backdoor, etc.). This dissertation proposes solutions to maintain the cyber-hygiene of the DL-Based smartphone system by exploring possible vulnerabilities and developing countermeasures.

First, I actively explore possible vulnerabilities on the DL-Based smartphone system to develop proactive defense mechanisms. I discover a new side-channel attack on smartphones using the unrestricted magnetic sensor data. I demonstrate that attackers can …


Automatic Linear And Curvilinear Mesh Generation Driven By Validity Fidelity And Topological Guarantees, Jing Xu Aug 2020

Automatic Linear And Curvilinear Mesh Generation Driven By Validity Fidelity And Topological Guarantees, Jing Xu

Computer Science Theses & Dissertations

Image-based geometric modeling and mesh generation play a critical role in computational biology and medicine. In this dissertation, a comprehensive computational framework for both guaranteed quality linear and high-order automatic mesh generation is presented. Starting from segmented images, a quality 2D/3D linear mesh is constructed. The boundary of the constructed mesh is proved to be homeomorphic to the object surface. In addition, a guaranteed dihedral angle bound of up to 19:47o for the output tetrahedra is provided. Moreover, user-specified guaranteed bounds on the distance between the boundaries of the mesh and the boundaries of the materials are allowed. The …


A Framework For Verifying The Fixity Of Archived Web Resources, Mohamed Aturban Aug 2020

A Framework For Verifying The Fixity Of Archived Web Resources, Mohamed Aturban

Computer Science Theses & Dissertations

The number of public and private web archives has increased, and we implicitly trust content delivered by these archives. Fixity is checked to ensure that an archived resource has remained unaltered (i.e., fixed) since the time it was captured. Currently, end users do not have the ability to easily verify the fixity of content preserved in web archives. For instance, if a web page is archived in 1999 and replayed in 2019, how do we know that it has not been tampered with during those 20 years? In order for the users of web archives to verify that archived web …


Cyber-Assets At Risk (Car): Monetary Impact Of Personally Identifiable Information Data Breaches On Companies, Omer Ilker Poyraz Aug 2020

Cyber-Assets At Risk (Car): Monetary Impact Of Personally Identifiable Information Data Breaches On Companies, Omer Ilker Poyraz

Engineering Management & Systems Engineering Theses & Dissertations

Cyber-systems provide convenience, ubiquity, economic advantage, and higher efficiency to both individuals and organizations. However, vulnerabilities of the cyber domain also offer malicious actors with the opportunities to compromise the most sensitive information. Recent cybersecurity incidents show that a group of hackers can cause a massive data breach, resulting in companies losing competitive advantage, reputation, and money. Governments have since taken some actions in protecting individuals and companies from such crime by authorizing federal agencies and developing regulations. To protect the public from losing their most sensitive records, governments have also been compelling companies to follow cybersecurity regulations. If companies …


Human Supremacy As Posthuman Risk, Daniel Estrada Jul 2020

Human Supremacy As Posthuman Risk, Daniel Estrada

The Journal of Sociotechnical Critique

Human supremacy is the widely held view that human interests ought to be privileged over other interests as a matter of ethics and public policy. Posthumanism is the historical situation characterized by a critical reevaluation of anthropocentrist theory and practice. This paper draws on animal studies, critical posthumanism, and the critique of ideal theory in Charles Mills and Serene Khader to address the appeal to human supremacist rhetoric in AI ethics and policy discussions, particularly in the work of Joanna Bryson. This analysis identifies a specific risk posed by human supremacist policy in a posthuman context, namely the classification of …


Human Behavior Is A Significant Flaw In Maintaining Cyber Security, Elizabeth Jackson Jul 2020

Human Behavior Is A Significant Flaw In Maintaining Cyber Security, Elizabeth Jackson

Cybersecurity Undergraduate Research Showcase

Human behavior and data security utilization must be intertwined; in order to mitigate the negative effects of cyber attacks. No consumer wants their data hacked, breached, stolen, shared or wiped out. It is imperative to survey the type of education is needed to keep users safe and interested in securing their data. This can be done by simply seeking out the consumer's view of data security. The information obtained would allow the cybersecurity community to offer a simple way for consumers to protect their mobile data. There is a constant interaction between human behavior and the need for increased data …


Helion’S Snapshot Module, Nii-Kwartei Quartey Jul 2020

Helion’S Snapshot Module, Nii-Kwartei Quartey

Cybersecurity Undergraduate Research Showcase

During my undergraduate research, I spent my time working with a home automation program known as Helion, specifically, its Snapshot module. I was tasked with learning new material and completing part of the webpage that were unfinished. I also had to get a little creative when working on a design that users could find appealing. There were times I found working on Helion difficult but overall, working with Helion’s Snapshot Module is something that will help me improve with my undergraduate studies.


Virginia Digital Shipbuilding Program (Vdsp): Building An Agile Modern Workforce To Improve Performance In The Shipbuilding And Ship Repair Industry, Joseph Peter Kosteczko, Katherine Smith, Jessica Johnson, Rafael Diaz Jun 2020

Virginia Digital Shipbuilding Program (Vdsp): Building An Agile Modern Workforce To Improve Performance In The Shipbuilding And Ship Repair Industry, Joseph Peter Kosteczko, Katherine Smith, Jessica Johnson, Rafael Diaz

VMASC Publications

Industry 4.0 is the latest stage in the Industrial Revolution and is reflected in the digital transformation and use of emergent technologies including the Internet of Things, Big Data, Robotic automation of processes, 3D printing and additive manufacturing, drones and Artificial Intelligence (AI) in the manufacturing industry. The implementation of these technologies in the Shipbuilding and Ship Repair Industry is currently in a nascent stage. Considering this, there is huge potential to increase cost savings, decrease production timelines, and drive down inefficiencies in Lifecyle management of ships. However, the implementation of these Industry 4.0 technologies is hindered by a noticeable …


Work-In-Progress: Augmented Reality System For Vehicle Health Diagnostics And Maintenance, Yuzhong Shen, Anthony W. Dean, Rafael Landaeta Jun 2020

Work-In-Progress: Augmented Reality System For Vehicle Health Diagnostics And Maintenance, Yuzhong Shen, Anthony W. Dean, Rafael Landaeta

Electrical & Computer Engineering Faculty Publications

This paper discusses undergraduate research to develop an augmented reality (AR) system for diagnostics and maintenance of the Joint Light Tactical Vehicle (JLTV) employed by U.S. Army and U.S. Marine Corps. The JLTV’s diagnostic information will be accessed by attaching a Bluetooth adaptor (Ford Reference Vehicle Interface) to JLTV’s On-board diagnostics (OBD) system. The proposed AR system will be developed for mobile devices (Android and iOS tablets and phones) and it communicates with the JLTV’s OBD via Bluetooth. The AR application will contain a simplistic user interface that reads diagnostic data from the JLTV, shows vehicle sensors, and allows users …


The Accumulation Of It Capability And Its Long-Term Effect On Financial Performance, Jin Ho Kim Jun 2020

The Accumulation Of It Capability And Its Long-Term Effect On Financial Performance, Jin Ho Kim

Theses and Dissertations in Business Administration

Many scholars have been studying information technology (IT) capability and its impact on business performance. However, it has been debated whether the IT capability influences firm performance because prior literature shows mixed results. To understand this phenomenon, I performed two studies in this research, placed in two parts. First, by deploying the new concept of accumulation of IT capability, I attempted to reinvestigate the relationship between IT capability and business performance. Next, I examined what factors influence the accumulation of IT capability. In the first part, I suggested two novel constructs that measure the extent of the accumulation of IT …


What Do Undergraduate Engineering Students And Preservice Teachers Learn By Collaborating And Teaching Engineering And Coding Through Robotics?, Jennifer Jill Kidd, Krishnanand Kaipa, Samuel J. Jacks, Stacie I. Ringleb, Pilar Pazos, Kristie Gutierrez, Orlando M. Ayala, Lillian Maria De Souza Almeida Jun 2020

What Do Undergraduate Engineering Students And Preservice Teachers Learn By Collaborating And Teaching Engineering And Coding Through Robotics?, Jennifer Jill Kidd, Krishnanand Kaipa, Samuel J. Jacks, Stacie I. Ringleb, Pilar Pazos, Kristie Gutierrez, Orlando M. Ayala, Lillian Maria De Souza Almeida

Teaching & Learning Faculty Publications

This research paper presents preliminary results of an NSF-supported interdisciplinary collaboration between undergraduate engineering students and preservice teachers. The fields of engineering and elementary education share similar challenges when it comes to preparing undergraduate students for the new demands they will encounter in their profession. Engineering students need interprofessional skills that will help them value and negotiate the contributions of various disciplines while working on problems that require a multidisciplinary approach. Increasingly, the solutions to today's complex problems must integrate knowledge and practices from multiple disciplines and engineers must be able to recognize when expertise from outside their field can …


Npgreat: Hybrid Assembly Of Human Subtelomeres With The Use Of Nanopore And Linked-Read Datasets, Eleni Adam, Desh Ranjan, Harold Riethman Apr 2020

Npgreat: Hybrid Assembly Of Human Subtelomeres With The Use Of Nanopore And Linked-Read Datasets, Eleni Adam, Desh Ranjan, Harold Riethman

College of Sciences Posters

The telomeres are vitally important regions that are located at the tips of the chromosomes. Their dysfunction, caused by length shortening can lead to senescent cells, which in turn cause age-related diseases, including cancer. The subtelomeres, located next to the telomeres, possess the critical role of regulating the adjacent telomere lengths. Even after many years of research, human subtelomeres have proven to be very hard to assemble due to their morphology. In order to overcome these problems, the hybrid assembly method we develop utilizes two of the latest available types of data, which complement each other: Linked-Reads and ultralong Nanopore …


A Feel For The Game: Ai, Computer Games And Perceiving Perception, Marc A. Ouellette, Steven Conway Apr 2020

A Feel For The Game: Ai, Computer Games And Perceiving Perception, Marc A. Ouellette, Steven Conway

English Faculty Publications

I walk into the room and the smell of burning wood hits me immediately. The warmth from the fireplace grows as I step nearer to it. The fire needs to heat the little cottage through the night so I add a log to the fire. There are a few sparks and embers. I throw a bigger log onto the fire and it drops with a thud. Again, there are barely any sparks or embers. The heat and the smell stay the same. They don’t change and I do not become habituated to it. Rather, they are just a steady stream, …


Cylindrical Similarity Measurement For Helices In Medium-Resolution Cryo-Electron Microscopy Density Maps, Salim Sazzed, Peter Scheible, Maytha Alshammari, Willy Wriggers, Jing He Apr 2020

Cylindrical Similarity Measurement For Helices In Medium-Resolution Cryo-Electron Microscopy Density Maps, Salim Sazzed, Peter Scheible, Maytha Alshammari, Willy Wriggers, Jing He

College of Sciences Posters

Cryo-electron microscopy (cryo-EM) density maps at medium resolution (5-10 Å) reveal secondary structural features such as α-helices and β-sheets, but they lack the side chains details that would enable a direct structure determination. Among the more than 800 entries in the Electron Microscopy Data Bank (EMDB) of medium-resolution density maps that are associated with atomic models, a wide variety of similarities can be observed between maps and models. To validate such atomic models and to classify structural features, a local similarity criterion, the F1 score, is proposed and evaluated in this study. The F1 score is theoretically normalized to a …