Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Computer Sciences (74)
- Artificial Intelligence and Robotics (23)
- Astrophysics and Astronomy (15)
- External Galaxies (15)
- Information Security (12)
-
- Databases and Information Systems (10)
- Art and Design (9)
- Arts and Humanities (9)
- Game Design (9)
- Oceanography and Atmospheric Sciences and Meteorology (9)
- Climate (7)
- Other Computer Sciences (7)
- Physics (7)
- Engineering (6)
- Software Engineering (6)
- Environmental Sciences (5)
- Social and Behavioral Sciences (5)
- Atmospheric Sciences (4)
- Condensed Matter Physics (4)
- Education (4)
- Meteorology (4)
- OS and Networks (4)
- Programming Languages and Compilers (4)
- Stars, Interstellar Medium and the Galaxy (4)
- Chemistry (3)
- Computer Engineering (3)
- Environmental Education (3)
- Science and Mathematics Education (3)
- Theory and Algorithms (3)
- Keyword
-
- Galaxies: evolution (7)
- Galaxies: dwarf (4)
- CD (3)
- Galaxies: elliptical and lenticular (3)
- Galaxies: kinematics and dynamics (3)
-
- Machine learning (3)
- Video games (3)
- Chatbots (2)
- Community detection (2)
- Galaxies: ISM (2)
- Galaxies: clusters: general (2)
- Galaxies: formation (2)
- Galaxies: fundamental parameters (2)
- Galaxies: haloes (2)
- Galaxies: star clusters: general (2)
- Galaxies: stellar content (2)
- Galaxies: structure (2)
- Game studies (2)
- Hidden Markov Model (2)
- History (2)
- Information Flow Security (2)
- Machine Learning (2)
- Malware (2)
- Neural nets (2)
- Neural networks (2)
- Physics and Astronomy (2)
- Syllabus (2)
- Adverse drug event (1)
- Apache HBase (1)
- Appeal (1)
- Publication
- Publication Type
Articles 1 - 30 of 113
Full-Text Articles in Physical Sciences and Mathematics
An Analysis Of Operant Conditioning And Its Relationship With Video Game Addiction, Daniel Vu
An Analysis Of Operant Conditioning And Its Relationship With Video Game Addiction, Daniel Vu
ART 108: Introduction to Games Studies
A report published by the Entertainment Software Association revealed that in 2015, 155 million Americans play video games with an average of two gamers in each game-playing household (Entertainment Software Association, “Essential Facts about the Computer and Video Game Industry”). With this massive popularity that has sprung alongside video games, the question must be asked: how are video games affecting today's people? With the current way some video games are structured, the video game rewards players for achieving certain accomplishments. For example, competitive video games reward players who achieve victories by giving them a higher ranking or other games display …
Random Numbers And Gaming, Sinjin Baglin
Random Numbers And Gaming, Sinjin Baglin
ART 108: Introduction to Games Studies
In Counter Strike: Global Offensive spray pattern control becomes a muscle memory to a player after long periods of playing. It’s a design choice that makes the gunplay between players more about instant crosshair placement with the faster player usually winning. This is very different from the gunplay of the current popular shooter Player Unknown’s Battlegrounds. Player Unknown’s Battleground’s spray pattern for the guns are random. So how does this affect the player experience? Well as opposed to Counter Strike: Global Offensive, the design choice makes gunplay between two players more about how a person can adapt faster …
Exploring Oculus Rift: A Historical Analysis Of The ‘Virtual Reality’ Paradigm, Chastin Gammage
Exploring Oculus Rift: A Historical Analysis Of The ‘Virtual Reality’ Paradigm, Chastin Gammage
ART 108: Introduction to Games Studies
This paper will first provide background information about Virtual Reality in order to better analyze its development throughout history and into the future. Next, this essay begins an in-depth historical analysis of how virtual reality has developed prior to 1970, a pivotal year in Virtual Reality history, followed by an exploration of how this development paradigm shifted between the 1970's and the turn of the century. The historical analysis of virtual reality is concluded by covering the modern period from 2000-present. Finally, this paper examines the layout of the virtual reality field in respect to he history and innovations presented.
Deep Subaru Hyper Suprime-Cam Observations Of Milky Way Satellites Columba I And Triangulum Ii*, Jeffrey Carlin, David Sand, Ricardo Muñoz, Kristine Spekkens, Beth Willman, Denija Crnojević, Duncan Forbes, Jonathan Hargis, Evan Kirby, Annika Peter, Aaron Romanowsky, Jay Strader
Deep Subaru Hyper Suprime-Cam Observations Of Milky Way Satellites Columba I And Triangulum Ii*, Jeffrey Carlin, David Sand, Ricardo Muñoz, Kristine Spekkens, Beth Willman, Denija Crnojević, Duncan Forbes, Jonathan Hargis, Evan Kirby, Annika Peter, Aaron Romanowsky, Jay Strader
Faculty Publications
We present deep, wide-field Subaru Hyper Suprime-Cam photometry of two recently discovered satellites of the Milky Way (MW): Columba I (Col I) and Triangulum II (Tri II). The color–magnitude diagrams of both objects point to exclusively old and metal-poor stellar populations. We re-derive structural parameters and luminosities of these satellites, and find for Col I and for Tri II, with corresponding half-light radii of pc and pc. The properties of both systems are consistent with observed scaling relations for MW dwarf galaxies. Based on archival data, we derive upper limits on the neutral gas content of these dwarfs, and find …
Fighting Game Difficulty, Andrew Hon
Fighting Game Difficulty, Andrew Hon
ART 108: Introduction to Games Studies
Lowering difficulty in games has become a recent trend amongst gaming companies. The goal of this tactic is to provide a more welcoming platform for players that are new to the franchise. However, this trend has been met with criticism amongst more experienced veterans of their respective games. This essay will touch upon different games within the fighting game genre that have lowered their overall difficulty, and the positive/negative effects of it.
Protecting And Maintaining Silicon Valley’S Liquid Gold, Paul Mark Fulcher
Protecting And Maintaining Silicon Valley’S Liquid Gold, Paul Mark Fulcher
Master's Projects
Public sector leaders and decision makers in the California water industry have learned from previous severe drought conditions that to sustain water supplies during extremely dry seasons, there is a substantial need for behavioral changes associated with water conservation efforts among the businesses and residents of the community to maintain an adequate water supply. The intent of this study is to compare four California water agencies that have been designated as sustainable groundwater agencies (GSA), and determine what current programs and/or practices those agencies are using to meet the mandated requirements of the Sustainable Groundwater Management Act of 2014 (Act …
Initial Mass Function Variability (Or Not) Among Low-Velocity Dispersion, Compact Stellar Systems, Alexa Villaume, Jean Brodie, Charlie Conroy, Aaron Romanowsky, Pieter Van Dokkum
Initial Mass Function Variability (Or Not) Among Low-Velocity Dispersion, Compact Stellar Systems, Alexa Villaume, Jean Brodie, Charlie Conroy, Aaron Romanowsky, Pieter Van Dokkum
Faculty Publications
Analyses of strong gravitational lenses, galaxy-scale kinematics, and absorption-line stellar population synthesis (SPS) have all concluded that the stellar initial mass function (IMF) varies within the massive early-type galaxy (ETG) population. However, the physical mechanism that drives variation in the IMF is an outstanding question. Here we use new SPS models to consider a diverse set of compact, low-velocity dispersion stellar systems: globular clusters (GCs), an ultra-compact dwarf (UCD), and the compact elliptical (cE) galaxy M32. We compare our results to massive ETGs and available dynamical measurements. We find that the GCs have stellar mass-to-light ratios (M/L) that are either …
Superconductivity At Т≈200 K In Bismuth Cuprates Synthesized Using Solar Energy, J. Chigvinadze, Juana Acrivos, S. Ashimov, D. Gulamova, G. Donadze
Superconductivity At Т≈200 K In Bismuth Cuprates Synthesized Using Solar Energy, J. Chigvinadze, Juana Acrivos, S. Ashimov, D. Gulamova, G. Donadze
Faculty Publications, Chemistry
When investigating low-frequency (0.1 Hz) oscillations of multiphase high-temperature cuprate superconductors (HTCS) Bi1,7Pb0,3Sr2Ca(n-1)CunOy (n=2-30), a wide attenuation peak (ΔT~100 К) with a maximum at Т≈200 К was detected. This peak was particularly pronounced in field cooling (FC) experiments, i.e. after abrupt cooling of the sample in the external magnetic field at the temperature Т<Тс with subsequent slow warming up to room temperature with invariance of the applied field. The attenuation peak height depended on the preliminaryorientation (before cooling) of the samples θ in the measured permanent magnetic field Н. On the one hand, it is well known that, after the FC procedure and subsequent slow warming up, at the temperatures close to the critical temperature Тс, the attenuation peak associated with “melting” of the Abrikosov frozen vortex structure and its disappearance at Т >Тс is detected in monophase samples. At the same time, in most multiphase bismuth HTCS samples, synthesized using solar energy and superfast quenching of the melt, the attenuation peak with the maximum at Т≈200 К was observed.Depending on the conditions of synthesis, the attenuation peak could …тс>
Quantifying The Role Of Education On Behavior Programs, Eugene Cordero, Diana Centeno, Anne Marie Todd
Quantifying The Role Of Education On Behavior Programs, Eugene Cordero, Diana Centeno, Anne Marie Todd
Faculty Research, Scholarly, and Creative Activity
No abstract provided.
“Bluff” With Ai, Tina Philip
“Bluff” With Ai, Tina Philip
Master's Projects
The goal of this project is to build multiple agents for the game Bluff and to conduct experiments as to which performs better. Bluff is a multi-player, non-deterministic card game where players try to get rid of all the cards in their hand. The process of bluffing involves making a move such that it misleads the opponent and thus prove to be of advantage to the player. The strategic complexity in the game arises due to the imperfect or hidden information which means that certain relevant details about the game are unknown to the players. Multiple agents followed different strategies …
Changes In Service And Associated Ridership Impacts Near A New Light Rail Transit Line, Jeongwoo Lee, Marlon Boarnet, Douglas Houston, Hilary Nixon, Steven Spears
Changes In Service And Associated Ridership Impacts Near A New Light Rail Transit Line, Jeongwoo Lee, Marlon Boarnet, Douglas Houston, Hilary Nixon, Steven Spears
Faculty Publications, Urban and Regional Planning
Los Angeles (LA), for many years a city with limited rail transit, is substantially expanding its public transit system. This paradigm change in transportation policy and investment creates new requirements for monitoring. One area needing evaluation is whether new, high quality transit options, such as light rail, near existing transit services increase sustainable transportation mode shares and reduce car travel. Few studies have explored light rail’s role as a catalyst to increase overall transit use and achieve sustainability goals within an auto-oriented city like LA. Metro’s data show that trips taken on its bus and rail system dropped overall by …
Bootbandit: A Macos Bootloader Attack, Armen Boursalian
Bootbandit: A Macos Bootloader Attack, Armen Boursalian
Master's Projects
Full disk encryption (FDE) is used to protect a computer system against data theft by physical access. If a laptop or hard disk drive protected with FDE is stolen or lost, the data remains unreadable without the encryption key. To foil this defense, an intruder can gain physical access to a computer system in a so-called “evil maid” attack, install malware in the boot (pre-operating system) environment, and use the malware to intercept the victim’s password. Such an attack relies on the fact that the system is in a vulnerable state before booting into the operating system. In this paper, …
Multi Language Browser Support, Swapnil Mohan Patil
Multi Language Browser Support, Swapnil Mohan Patil
Master's Projects
Web browsers have become an increasingly appealing platform for application developers. Browsers make it relatively easy to deliver cross-platform applications. Web browsers have become a de facto universal operating system, and JavaScript its instruction set. Unfortunately, executing any other language than JavaScript in web browser is not usually possible. Previous approaches are either non-portable or demand extensive modifications for programs to work in the browser. Translation to JavaScript (JS) is one option but that can be challenging if the language is sufficiently different from JS. Also, debugging translated applications can be difficult. This paper presents how languages like Scheme and …
Virtualized Baseband Units Consolidation In Advanced Lte Networks Using Mobility- And Power-Aware Algorithms, Uladzimir Karneyenka
Virtualized Baseband Units Consolidation In Advanced Lte Networks Using Mobility- And Power-Aware Algorithms, Uladzimir Karneyenka
Master's Projects
Virtualization of baseband units in Advanced Long-Term Evolution networks and a rapid performance growth of general purpose processors naturally raise the interest in resource multiplexing. The concept of resource sharing and management between virtualized instances is not new and extensively used in data centers. We adopt some of the resource management techniques to organize virtualized baseband units on a pool of hosts and investigate the behavior of the system in order to identify features which are particularly relevant to mobile environment. Subsequently, we introduce our own resource management algorithm specifically targeted to address some of the peculiarities identified by experimental …
Aria A11y Analyzer: Helping Integrate Accessibility Into Websites, Jayashree Prabunathan
Aria A11y Analyzer: Helping Integrate Accessibility Into Websites, Jayashree Prabunathan
Master's Projects
Today, nearly 1 in 5 people have a disability that affects their daily life. These varied disabilities can include blindness, low vision or mobility impairments. When interacting with web content, users with such disabilities rely heavily on various assistive technologies, such as screen readers, keyboard, voice recognition software, etc. Here, assistive technologies are software applications or hardware devices that allows users with disabilities to interact with web and software applications. For instance, a screen reader is a software application that navigates through the page and speaks the content to users. Web accessibility is defined as the ability for assistive technology …
Cache Management Schemes For User Equipment Contexts In 5th Generation Cloud Radio Access Networks, Gurpreet Kaur
Cache Management Schemes For User Equipment Contexts In 5th Generation Cloud Radio Access Networks, Gurpreet Kaur
Master's Projects
Advances in cellular network technology continue to develop to address increasing demands from the growing number of devices resulting from the Internet of Things, or IoT. IoT has brought forth countless new equipment competing for service on cellular networks. The latest in cellular technology is 5th Generation Cloud Radio Access Networks, or 5G C-RAN, which consists of an architectural design created specifically to meet novel and necessary requirements for better performance, reduced latency of service, and scalability. As part of this design is the inclusion of a virtual cache, there is a necessity for useful cache management schemes and protocols, …
Detecting Encrypted Malware Using Hidden Markov Models, Dhiviya Dhanasekar
Detecting Encrypted Malware Using Hidden Markov Models, Dhiviya Dhanasekar
Master's Projects
Encrypted code is often present in some types of advanced malware, while such code virtually never appears in legitimate applications. Hence, the presence of encrypted code within an executable file could serve as a strong heuristic for detecting malware. In this research, we consider the feasibility of detecting encrypted code using hidden Markov models.
A Framework For Recommendation Of Highly Popular News Lacking Social Feedback, Nuno Moniz, Luís Torgo, Magdalini Eirinaki, Paula Branco
A Framework For Recommendation Of Highly Popular News Lacking Social Feedback, Nuno Moniz, Luís Torgo, Magdalini Eirinaki, Paula Branco
Faculty Publications
Social media is rapidly becoming the main source of news consumption for users, raising significant challenges to news aggregation and recommendation tasks. One of these challenges concerns the recommendation of very recent news. To tackle this problem, approaches to the prediction of news popularity have been proposed. In this paper, we study the task of predicting news popularity upon their publication, when social feedback is unavailable or scarce, and to use such predictions to produce news rankings. Unlike previous work, we focus on accurately predicting highly popular news. Such cases are rare, causing known issues for standard prediction models and …
A Scrabble Artificial Intelligence Game, Priyatha Joji Abraham
A Scrabble Artificial Intelligence Game, Priyatha Joji Abraham
Master's Projects
Computer AI players have already surpassed human opponents in competitive Scrabble, however, defeating a Computer AI opponent is complex and demands efficient heuristics. The primary objective of this project is to build two intelligent AI players from scr atch for the Scrabble cross - board puzzle game having different move generation heuristics and endgame strategies to evaluate their performance based on various benchmarks like winning criteria, quality of moves, and time consumption. The first AI selected is the most popular Scrabble AI, Maven. It generates a three - ply look - ahead simulation to evaluate the most promising candidate move …
Implementation Of Faceted Values In Node.Js., Andrew Kalenda
Implementation Of Faceted Values In Node.Js., Andrew Kalenda
Master's Projects
Information flow analysis is the study of mechanisms by which developers may protect sensitive data within an ecosystem containing untrusted third-party code. Secure multi-execution is one such mechanism that reliably prevents undesirable information flows, but a programmer’s use of secure multi-execution is itself challenging and prone to error. Faceted values have been shown to provide an alternative to secure multi-execution which is, in theory, functionally equivalent. The purpose of this work is to show that the theory holds in practice by implementing usable faceted values in JavaScript via source code transformation. The primary contribution of this project is to provide …
Metamorphic Code Generation Using Llvm, Michael Crawford
Metamorphic Code Generation Using Llvm, Michael Crawford
Master's Projects
Each instance of metamorphic software changes its internal structure, but the function remains essentially the same. Such metamorphism has been used primarily by malware writers as a means of evading signature-based detection. However, metamorphism also has potential beneficial uses in fields related to software protection. In this research, we develop a practical framework within the LLVM compiler that automatically generates metamorphic code, where the user has well-defined control over the degree of morphing applied to the code. We analyze the effectiveness of this metamorphic generator based on Hidden Markov Model (HMM) analysis, and discover that HMMs are effective at detection …
Cache Management And Load Balancing For 5g Cloud Radio Access Networks, Chin Tsai
Cache Management And Load Balancing For 5g Cloud Radio Access Networks, Chin Tsai
Master's Projects
Cloud radio access network (CRAN) has been proposed for 5G mobile networks. The benefit of a CRAN includes better scalability, flexibility, and performance. The paper introduces a cache management algorithm for a baseband unit of CRAN and load balancing algorithms for virtual machines load within the CRAN. The proposed scheme, exponential decay (EXD) with analytical hierarchy process (AHP), increases hit rate and reduces network traffic. The scheme also provides preferential services for users with a higher service level agreement (SLA). Finally, the experiment shows the proposed load balancing algorithm can reduce the virtual machines’ (VM) queue size and wait time.
Measuring The Effectiveness Of Generic Malware Models, Naman Bagga
Measuring The Effectiveness Of Generic Malware Models, Naman Bagga
Master's Projects
Malware detection based on machine learning techniques is often treated as a problem specific to a particular malware family. In such cases, detection involves training and testing models for each malware family. This approach can generally achieve high accuracy, but it requires many classification steps, resulting in a slow, inefficient, and impractical process. In contrast, classifying samples as malware or be- nign based on a single model would be far more efficient. However, such an approach is extremely challenging—extracting common features from a variety of malware fam- ilies might result in a model that is too generic to be useful. …
Time-Efficient Hybrid Approach For Facial Expression Recognition, Roshni Velluva Puthanidam
Time-Efficient Hybrid Approach For Facial Expression Recognition, Roshni Velluva Puthanidam
Master's Projects
Facial expression recognition is an emerging research area for improving human and computer interaction. This research plays a significant role in the field of social communication, commercial enterprise, law enforcement, and other computer interactions. In this paper, we propose a time-efficient hybrid design for facial expression recognition, combining image pre-processing steps and different Convolutional Neural Network (CNN) structures providing better accuracy and greatly improved training time. We are predicting seven basic emotions of human faces: sadness, happiness, disgust, anger, fear, surprise and neutral. The model performs well regarding challenging facial expression recognition where the emotion expressed could be one of …
Word Sense Determination From Wikipedia Data Using Neural Networks, Qiao Liu
Word Sense Determination From Wikipedia Data Using Neural Networks, Qiao Liu
Master's Projects
Many words have multiple meanings. For example, “plant” can mean a type of living organism or a factory. Being able to determine the sense of such words is very useful in natural language processing tasks, such as speech synthesis, question answering, and machine translation. For the project described in this report, we used a modular model to classify the sense of words to be disambiguated. This model consisted of two parts: The first part was a neural-network-based language model to compute continuous vector representations of words from data sets created from Wikipedia pages. The second part classified the meaning of …
Improve And Implement An Open Source Question Answering System, Salil Shenoy
Improve And Implement An Open Source Question Answering System, Salil Shenoy
Master's Projects
A question answer system takes queries from the user in natural language and returns a short concise answer which best fits the response to the question. This report discusses the integration and implementation of question answer systems for English and Hindi as part of the open source search engine Yioop. We have implemented a question answer system for English and Hindi, keeping in mind users who use these languages as their primary language. The user should be able to query a set of documents and should get the answers in the same language. English and Hindi are very different when …
Spin-Imbalance In A 2d Fermi-Hubbard System, Peter Brown, Debayan Mitra, Elmer Guardado-Sanchez, Peter Schauß, Stanimir Kondov, Ehsan Khatami, Thereza Paiva, Nandini Trivedi, David Huse, Waseem Bakr
Spin-Imbalance In A 2d Fermi-Hubbard System, Peter Brown, Debayan Mitra, Elmer Guardado-Sanchez, Peter Schauß, Stanimir Kondov, Ehsan Khatami, Thereza Paiva, Nandini Trivedi, David Huse, Waseem Bakr
Faculty Publications
The interplay of strong interactions and magnetic fields gives rise to unusual forms of superconductivity and magnetism in quantum many-body systems. Here, we present an experimental study of the two-dimensional Fermi-Hubbard model—a paradigm for strongly correlated fermions on a lattice—in the presence of a Zeeman field and varying doping. Using site-resolved measurements, we revealed anisotropic antiferromagnetic correlations, a precursor to long-range canted order. We observed nonmonotonic behavior of the local polarization with doping for strong interactions, which we attribute to the evolution from an antiferromagnetic insulator to a metallic phase. Our results pave the way to experimentally mapping the low-temperature …
The Sluggs Survey: Trails Of Sluggs Galaxies In A Modified Spin-Ellipticity Diagram, Sabine Bellstedt, Alister Graham, Duncan Forbes, Aaron Romanowsky, Jean Brodie, Jay Strader
The Sluggs Survey: Trails Of Sluggs Galaxies In A Modified Spin-Ellipticity Diagram, Sabine Bellstedt, Alister Graham, Duncan Forbes, Aaron Romanowsky, Jean Brodie, Jay Strader
Faculty Publications
We present radial tracks for four early-type galaxies with embedded intermediate-scale discs in a modified spin-ellipticity diagram. Here, each galaxy's spin and ellipticity profiles are shown as a radial track, as opposed to a single, flux-weighted aperture-dependent value as is common in the literature. The use of a single ellipticity and spin parameter is inadequate to capture the basic nature of these galaxies, which transition from fast to slow rotation as one moves to larger radii where the disc ceases to dominate. After peaking, the four galaxy's radial tracks feature a downturn in both ellipticity and spin with increasing radius, …
Ice Nucleation Parameterization And Relative Humidity Distribution In Idealized Squall-Line Simulations, Minghui Diao, George Bryan, Hugh Morrison, Jorgen Jensen
Ice Nucleation Parameterization And Relative Humidity Distribution In Idealized Squall-Line Simulations, Minghui Diao, George Bryan, Hugh Morrison, Jorgen Jensen
Faculty Publications, Meteorology and Climate Science
Output from idealized simulations of a squall line are compared with in situ aircraft-based observations from the Deep Convective Clouds and Chemistry campaign. Relative humidity distributions around convection are compared between 1-Hz aircraft observations (≈250-m horizontal scale) and simulations using a double-moment bulk microphysics scheme at three horizontal grid spacings: Δx = 0.25, 1, and 4 km. The comparisons focus on the horizontal extent of ice supersaturated regions (ISSRs), the maximum and average relative humidity with respect to ice (RHi) in ISSRs, and the ice microphysical properties during cirrus cloud evolution, with simulations at 0.25 and 1 km providing better …
Machine Learning Phases Of Strongly Correlated Fermions, Kelvin Ch'ng, Juan Carrasquilla, Roger Melko, Ehsan Khatami
Machine Learning Phases Of Strongly Correlated Fermions, Kelvin Ch'ng, Juan Carrasquilla, Roger Melko, Ehsan Khatami
Faculty Publications
Machine learning offers an unprecedented perspective for the problem of classifying phases in condensed matter physics. We employ neural network machine learning techniques to distinguish finite-temperature phases of the strongly-correlated fermions on cubic lattices. We show that a three-dimensional convolutional network trained on auxiliary field configurations produced by quantum Monte Carlo simulations of the Hubbard model can correctly predict the magnetic phase diagram of the model at the average density of one (half filling). We then use the network, trained at half filling, to explore the trend in the transition temperature as the system is doped away from half filling. …