Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 11 of 11

Full-Text Articles in Physical Sciences and Mathematics

Rcrab: An R Analytics Tool To Visualize And Analyze The Movement Of Horseshoe Crabs In Long Island Sound, Ismael Youssef, Samah Senbel, Jo-Marie Kasinak, Jennifer Mattei Aug 2019

Rcrab: An R Analytics Tool To Visualize And Analyze The Movement Of Horseshoe Crabs In Long Island Sound, Ismael Youssef, Samah Senbel, Jo-Marie Kasinak, Jennifer Mattei

School of Computer Science & Engineering Faculty Publications

Mark-recapture programs are important for studying the ecology and population dynamics of wildlife. An R shiny analytics tool was developed to track the movement of horseshoe crabs in Long Island Sound based on tag and resight data. The crabs were tagged and recaptured by volunteers of Project Limulus, a community-based research program. The dataset contains tag and recapture location information for 14,065 horseshoe crabs over 18 years. The dataset was initially cleaned by removing records with missing, duplicate or incorrect data. A new data structure was developed to save the data and simplify processing: Three dimensions were used, one for …


Securing The Human: Broadening Diversity In Cybersecurity, Mohammad Azhar, Sajal Bhatia, Greg Gagne, Chadi Kari, Joseph Maguire, Xenia Montrouidou, Liviana Tudor, David Vosen, Timothy T. Yuen Jul 2019

Securing The Human: Broadening Diversity In Cybersecurity, Mohammad Azhar, Sajal Bhatia, Greg Gagne, Chadi Kari, Joseph Maguire, Xenia Montrouidou, Liviana Tudor, David Vosen, Timothy T. Yuen

School of Computer Science & Engineering Faculty Publications

Recent global demand for cybersecurity professionals is promising, with the U.S. job growth rate at 28%, three times the national average [1]. Lacking qualified applicants, many organizations struggle to fill open positions [2]. In a global survey, 2,300 security managers reported that 59% of their security positions were unfilled, although 82% anticipated cyberattacks to their systems [3]. At the same time, the cybersecurity field is broadening, not only in technical concepts but also in human factors, business processes, and international law. The field has not become culturally diversified, however. Professionals hired in 2018 included only 24.9% women, 12.3% African Americans, …


Teaching Self-Balancing Trees Using A Beauty Contest, Samah Senbel Jul 2019

Teaching Self-Balancing Trees Using A Beauty Contest, Samah Senbel

School of Computer Science & Engineering Faculty Publications

Trees data structures and their performance is one of the main topics to teach in a data structures course. Appreciating the importance of tree structure and tree height in software performance is an important concept to teach. In this paper, a simple and amusing activity is presented. It demonstrates to students the importance of a well-balanced tree by comparing the height of a binary search tree to a balanced (AVL) tree build upon some personal data to find the “prettiest” tree (minimum height). The activity highlights the fact that, irrelevant of your data sequence, a balanced tree guarantees a height …


On The Responsibility For Uses Of Downstream Software, Marty J. Wolf, Keith W. Miller, Frances Grodzinsky, Ed. May 2019

On The Responsibility For Uses Of Downstream Software, Marty J. Wolf, Keith W. Miller, Frances Grodzinsky, Ed.

School of Computer Science & Engineering Faculty Publications

In this paper we explore an issue that is different from whether developers are responsible for the direct impact of the software they write. We examine, instead, in what ways, and to what degree, developers are responsible for the way their software is used “downstream.” We review some key scholarship analyzing responsibility in computing ethics, including some recent work by Floridi. We use an adaptation of a mechanism developed by Floridi to argue that there are features of software that can be used as guides to better distinguish situations where a software developer might share in responsibility for the software’s …


Responding To Some Challenges Posed By The Re-Identification Of Anonymized Personal Data, Herman T. Tavani, Frances Grodzinsky, Ed. May 2019

Responding To Some Challenges Posed By The Re-Identification Of Anonymized Personal Data, Herman T. Tavani, Frances Grodzinsky, Ed.

School of Computer Science & Engineering Faculty Publications

In this paper, we examine a cluster of ethical controversies generated by the reidentification of anonymized personal data in the context of big data analytics, with particular attention to the implications for personal privacy. Our paper is organized into two main parts. Part One examines some ethical problems involving re-identification of personally identifiable information (PII) in large data sets. Part Two begins with a brief description of Moor and Weckert’s Dynamic Ethics (DE) and Nissenbaum’s Contextual Integrity (CI) Frameworks. We then investigate whether these frameworks, used together, can provide us with a more robust scheme for analyzing privacy concerns that …


An Artificial Sweating System For Sweat Sensor Testing Applications, Andrew Brueck, Kyle Bates, Trent Wood, William House, Zachary Martinez, Shannon Peters, Blain Root, Kumar Yelamarthi, Tolga Kaya May 2019

An Artificial Sweating System For Sweat Sensor Testing Applications, Andrew Brueck, Kyle Bates, Trent Wood, William House, Zachary Martinez, Shannon Peters, Blain Root, Kumar Yelamarthi, Tolga Kaya

School of Computer Science & Engineering Faculty Publications

This research proposes a completely automated, computer-controlled fluid mixing and dispensing system, which is suitable for testing sweat sensing devices, as an alternative to requiring human trials during the development phase of a sweat sensor device. An arm mold was designed and implemented with dragon skin and pores to simulate sweating action. The relay controlled mixing tanks allow for the different concentration of fluid solutions at various rates of fluid dispensing through pores. The onboard single board computer controls a dozen electronic relays and it switches and presents an easy to use graphical user interface to allow end users to …


Applying Machine Learning To Anomaly-Based Intrusion Detection Systems, Fekadu Yihunie, Eman Abdelfattah, Amish Regmi May 2019

Applying Machine Learning To Anomaly-Based Intrusion Detection Systems, Fekadu Yihunie, Eman Abdelfattah, Amish Regmi

School of Computer Science & Engineering Faculty Publications

The enormous growth of Internet-based traffic exposes corporate networks with a wide variety of vulnerabilities. Intrusive traffics are affecting the normal functionality of network's operation by consuming corporate resources and time. Efficient ways of identifying, protecting, and mitigating from intrusive incidents enhance productivity. As Intrusion Detection System (IDS) is hosted in the network and at the user machine level to oversee the malicious traffic in the network and at the individual computer, it is one of the critical components of a network and host security. Unsupervised anomaly traffic detection techniques are improving over time. This research aims to find an …


Rigorous Computational And Experimental Investigations On Mdm2/Mdmx-Targeted Linear And Macrocyclic Peptides, David J. Diller, Jon Swanson, Alexander S. Bayden, Chris J. Brown, Dawn Thean, David P. Lane, Anthony W. Patridge, Tomi K. Sawyer, Joseph Audie Jan 2019

Rigorous Computational And Experimental Investigations On Mdm2/Mdmx-Targeted Linear And Macrocyclic Peptides, David J. Diller, Jon Swanson, Alexander S. Bayden, Chris J. Brown, Dawn Thean, David P. Lane, Anthony W. Patridge, Tomi K. Sawyer, Joseph Audie

Chemistry & Physics Faculty Publications

There is interest in peptide drug design, especially for targeting intracellular protein–protein interactions. Therefore, the experimental validation of a computational platform for enabling peptide drug design is of interest. Here, we describe our peptide drug design platform (CMDInventus) and demonstrate its use in modeling and predicting the structural and binding aspects of diverse peptides that interact with oncology targets MDM2/MDMX in comparison to both retrospective (pre-prediction) and prospective (post-prediction) data. In the retrospective study, CMDInventus modules (CMDpeptide, CMDboltzmann, CMDescore and CMDyscore) were used to accurately reproduce structural and binding data across multiple MDM2/MDMX data sets. In the prospective study, CMDescore, …


Math Department Newsletter, 2018-2019, Mathematics Department Jan 2019

Math Department Newsletter, 2018-2019, Mathematics Department

Mathematics Newsletter

No abstract provided.


The Ethics Of An Unlicensed Medical Practitioner, Charles C. Escott Jan 2019

The Ethics Of An Unlicensed Medical Practitioner, Charles C. Escott

Writing Across the Curriculum

For option A of this assignment, the prompt is that Harry, a manufacturer of medical equipment and an avid reader of medical textbooks, has developed a program that will allow its users to self-diagnose and self-treat their ailments, without a doctor’s help. Harry wants to sell his program to “ordinary folk” as a replacement for consulting licensed medical practitioners. An important point here is that Harry is not licensed to practice medicine and has only read books on the subject. The posed question is whether or not his program should be published (from an ethical standpoint—not necessarily a profit-driven one). …


Electrochemical Amperometric Biosensor Applications Of Nanostructured Metal Oxides: A Review, Bünyamin Sahin, Tolga Kaya Jan 2019

Electrochemical Amperometric Biosensor Applications Of Nanostructured Metal Oxides: A Review, Bünyamin Sahin, Tolga Kaya

School of Computer Science & Engineering Faculty Publications

Biological sensors have been extensively investigated during the last few decades. Among the diverse facets of biosensing research, nanostructured metal oxides (NMOs) offer a plethora of potential benefits. In this article, we provide a thorough review on the sensor applications of NMOs such as glucose, cholesterol, urea, and uric acid. A detailed analysis of the literature is presented with organized tables elaborating the fundamental characteristics of sensors including the sensitivity, limit of detection, detection range, and stability parameters such as duration, relative standard deviation, and retention. Further analysis was provided through an innovative way of displaying the sensitivity and linear …