Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Wright State University

Discipline
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 1 - 30 of 3840

Full-Text Articles in Physical Sciences and Mathematics

Desalination As A Source Of Freshwater, Jacob Pensky Mar 2024

Desalination As A Source Of Freshwater, Jacob Pensky

Best Integrated Writing

Jacob Pensky's article deals with technology we use to make saltwater drinkable. Drought-stricken coastal communities need desalination plants, especially as Earth's climate warms, but they are expensive and energy-intensive. This article describes ways to reduce the environmental and monetary costs.


Festival Of Research Abstracts, 2024, College Of Science And Mathematics, Wright State University Jan 2024

Festival Of Research Abstracts, 2024, College Of Science And Mathematics, Wright State University

Festival of Research

The collection of abstracts accepted for the 2024 Festival of Research hosted by the Wright State University College of Science and Mathematics.


Role Of Urban Parks In Carbon Sequestration– A Case Study Of Safari Park, Karachi, Pakistan, Amna Bano, Minzah Shehzad, Hasnain Kazmi, Jamshaid Iqbal Dec 2023

Role Of Urban Parks In Carbon Sequestration– A Case Study Of Safari Park, Karachi, Pakistan, Amna Bano, Minzah Shehzad, Hasnain Kazmi, Jamshaid Iqbal

Journal of Bioresource Management

Urban parks besides their recreational use can be the potential source of climate mitigation through carbon sequestration. Present study aims to identify the carbon sequestration potential of Safari Park which is by far the largest public park of Karachi established in 1970 covering an area of 0.72 km2. A total of 153 individual trees belonging to 25 species and 14 families were included in the study. Five dominant species with highest Important Value Index (IVI) were Cocos nucifera (14.62 %), Azadirachta indica (14.21 %), Guaiacum officinale (9.93 %), Washington robusta (9.31 %) and Delonix regia (7.11 %). The …


Wright State University's Celebration Of Student Research, Scholarship & Creative Activities From Thursday, October 26, 2023, Wright State University Oct 2023

Wright State University's Celebration Of Student Research, Scholarship & Creative Activities From Thursday, October 26, 2023, Wright State University

Symposium of Student Research, Scholarship, and Creative Activities Abstract Books

The student abstract booklet is a compilation of abstracts from students' oral and poster presentations at Wright State University's Celebration of Student Research, Scholarship & Creative Activities on October 26, 2023.


On Colorings And Orientations Of Signed Graphs, Daniel Slilaty Jun 2023

On Colorings And Orientations Of Signed Graphs, Daniel Slilaty

Mathematics and Statistics Faculty Publications

A classical theorem independently due to Gallai and Roy states that a graph G has a proper k-coloring if and only if G has an orientation without coherent paths of length k. An analogue of this result for signed graphs is proved in this article.


Mining Themes In Clinical Notes To Identify Phenotypes And To Predict Length Of Stay In Patients Admitted With Heart Failure, Ankita Agarwal, Tanvi Banerjee, William Romine, Krishnaprasad Thirunarayan, Lingwei Chen, Mia Cajita May 2023

Mining Themes In Clinical Notes To Identify Phenotypes And To Predict Length Of Stay In Patients Admitted With Heart Failure, Ankita Agarwal, Tanvi Banerjee, William Romine, Krishnaprasad Thirunarayan, Lingwei Chen, Mia Cajita

Computer Science and Engineering Faculty Publications

Heart failure is a syndrome which occurs when the heart is not able to pump blood and oxygen to support other organs in the body. Identifying the underlying themes in the diagnostic codes and procedure reports of patients admitted for heart failure could reveal the clinical phenotypes associated with heart failure and to group patients based on their similar characteristics which could also help in predicting patient outcomes like length of stay. These clinical phenotypes usually have a probabilistic latent structure and hence, as there has been no previous work on identifying phenotypes in clinical notes of heart failure patients …


A Preliminary Study Of The Efficacy Of Using A Wrist-Worn Multiparameter Sensor For The Prediction Of Cognitive Flow States In University-Level Students, Josephine Graft, William Romine, Brooklynn Watts, Noah Schroeder, Tawsik Jawad, Tanvi Banerjee Apr 2023

A Preliminary Study Of The Efficacy Of Using A Wrist-Worn Multiparameter Sensor For The Prediction Of Cognitive Flow States In University-Level Students, Josephine Graft, William Romine, Brooklynn Watts, Noah Schroeder, Tawsik Jawad, Tanvi Banerjee

Computer Science and Engineering Faculty Publications

Engagement is enhanced by the ability to access the state of flow during a task, which is described as a full immersion experience. We report two studies on the efficacy of using physiological data collected from a wearable sensor for the automated prediction of flow. Study 1 took a two-level block design where activities were nested within its participants. A total of five participants were asked to complete 12 tasks that aligned with their interests while wearing the Empatica E4 sensor. This yielded 60 total tasks across the five participants. In a second study representing daily use of the device, …


Exploration Of C9or72c9-500 Sk2, Sk3 Channel Expression, Teresa L. Garrett Mar 2023

Exploration Of C9or72c9-500 Sk2, Sk3 Channel Expression, Teresa L. Garrett

Festival of Research

ALS (also known as Lou Gehrig's Disease) is a neurodegenerative disease that weakens muscles and impacts physical function. The C9 Gene is responsible for creating proteins that help neurons send and receive signals across the synapse. Small Conductance calcium activated potassium channels (SK channels) affect the hyperpolarization phase of an action potential. Hypothesis: SK2 and SK3 clusters of C9 positive cells should decrease in size and intensity when exposed to a disease state compared to C9 negative controls.


Predicting Thermoelectric Power Factor Of Bismuth Telluride During Laser Powder Bed Fusion Additive Manufacturing, Ankita Agarwal, Tanvi Banerjee, Joy Gockel, Saniya Leblanc, Joe Walker, John Middendorf Mar 2023

Predicting Thermoelectric Power Factor Of Bismuth Telluride During Laser Powder Bed Fusion Additive Manufacturing, Ankita Agarwal, Tanvi Banerjee, Joy Gockel, Saniya Leblanc, Joe Walker, John Middendorf

Computer Science and Engineering Faculty Publications

An additive manufacturing (AM) process, like laser powder bed fusion, allows for the fabrication of objects by spreading and melting powder in layers until a freeform part shape is created. In order to improve the properties of the material involved in the AM process, it is important to predict the material characterization property as a function of the processing conditions. In thermoelectric materials, the power factor is a measure of how efficiently the material can convert heat to electricity. While earlier works have predicted the material characterization properties of different thermoelectric materials using various techniques, implementation of machine learning models …


Overcoming Uncertainties In Molecular Visualization, Thomas Wischgoll Feb 2023

Overcoming Uncertainties In Molecular Visualization, Thomas Wischgoll

Computer Science and Engineering Faculty Publications

Uncertainties are difficult if not impossible to avoid. Capturing data from the analog world almost always results in some form of uncertainty. The amount of uncertainty depends on the method of measurement and its accuracy. When visualizing data that has some associated uncertainty, it is essential to properly process and convey such uncertainty and especially the amount of uncertainty keeping in mind that additional processing steps can amplify the uncertainty. There are various sources of uncertainty, such as numerical limitations or limitations of the capture device. However, there are other sources of uncertainty. Some of these uncertainties stem from model …


Wright State University Fact Sheet, 2022-2023, Office Of Institutional Research & Effectiveness, Wright State University Jan 2023

Wright State University Fact Sheet, 2022-2023, Office Of Institutional Research & Effectiveness, Wright State University

Wright State University Fact Sheets

The Wright State University Fact Sheet showcasing numbers and statistics for Wright State University including demographics, funding, programs, and employment for the 2022-2023 academic year.


Festival Of Research Abstracts, 2023, College Of Science And Mathematics, Wright State University Jan 2023

Festival Of Research Abstracts, 2023, College Of Science And Mathematics, Wright State University

Festival of Research

The collection of abstracts accepted for the 2023 Festival of Research hosted by the Wright State University College of Science and Mathematics.


Graphs Without A 2c3-Minor And Bicircular Matroids Without A U3,6-Minor, Daniel Slilaty Jan 2023

Graphs Without A 2c3-Minor And Bicircular Matroids Without A U3,6-Minor, Daniel Slilaty

Mathematics and Statistics Faculty Publications

In this note we characterize all graphs without a 2C3-minor. A consequence of this result is a characterization of the bicircular matroids with no U3,6-minor.


Odd Solutions To Systems Of Inequalities Coming From Regular Chain Groups, Daniel Slilaty Jan 2023

Odd Solutions To Systems Of Inequalities Coming From Regular Chain Groups, Daniel Slilaty

Mathematics and Statistics Faculty Publications

Hoffman’s theorem on feasible circulations and Ghouila-Houry’s theorem on feasible tensions are classical results of graph theory. Camion generalized these results to systems of inequalities over regular chain groups. An analogue of Camion’s result is proved in which solutions can be forced to be odd valued. The obtained result also generalizes the results of Pretzel and Youngs as well as Slilaty. It is also shown how Ghouila-Houry’s result can be used to give a new proof of the graph- coloring theorem of Minty and Vitaver.


Code Execution Capability As A Metric For Machine Learning–Assisted Software Vulnerability Detection Models, Daniel Grahn, Lingwei Chen, Junjie Zhang Jan 2023

Code Execution Capability As A Metric For Machine Learning–Assisted Software Vulnerability Detection Models, Daniel Grahn, Lingwei Chen, Junjie Zhang

Computer Science and Engineering Faculty Publications

In this paper, we consider how the ability to learn Code Execution Tasks affects a model’s accuracy on software vulnerability detection (SVD) benchmark datasets. We initially find that models can achieve near state-of-the-art accuracy on SVD benchmarks regardless of their ability to learn Code Execution Tasks. However, these models fail to generalize well across SVD benchmarks. The results indicate a bias in the datasets that allows models to predict non- SVD signals. Under the theory that different collection methods will reduce biases, we investigate combining the SVD datasets. When trained on combined datasets, SVD accuracy is reduced but correlation with …


Green Synthesis Of Nanoparticles And Their Utilization In Electrochemical Detection Of Catechol- Or Phenol-Based Substances, Daniel Laurence Myers Iii Jan 2023

Green Synthesis Of Nanoparticles And Their Utilization In Electrochemical Detection Of Catechol- Or Phenol-Based Substances, Daniel Laurence Myers Iii

Browse all Theses and Dissertations

PART A: GREEN SYNTHESIS OF COPPER NANOPARTICLES AND THEIR UTILIZATION IN THE DETECTION OF NEUROTRANSMITTERS Neurotransmitters, such as dopamine and epinephrine, are chemicals frequently found in the brain and are responsible for a number of human moods, needs, and emotions.1, 2 Detection of such neurotransmitters allows for a better judgement of a person’s physical and mental state, a utility that is vital in determining the presence of disease and mental illnesses.2 Electrochemical detectors used for such detections are often modified by materials such as metal nanoparticles.3 However, synthesizing nanoparticles can involve or produce chemicals, ammonium hydroxide among them, that are …


Fuzzing Php Interpreters By Automatically Generating Samples, Jacob S. Baumgarte Jan 2023

Fuzzing Php Interpreters By Automatically Generating Samples, Jacob S. Baumgarte

Browse all Theses and Dissertations

Modern web development has grown increasingly reliant on scripting languages such as PHP. The complexities of an interpreted language means it is very difficult to account for every use case as unusual interactions can cause unintended side effects. Automatically generating test input to detect bugs or fuzzing, has proven to be an effective technique for JavaScript engines. By extending this concept to PHP, existing vulnerabilities that have since gone undetected can be brought to light. While PHP fuzzers exist, they are limited to testing a small quantity of test seeds per second. In this thesis, we propose a solution for …


Comparative Adjudication Of Noisy And Subjective Data Annotation Disagreements For Deep Learning, Scott David Williams Jan 2023

Comparative Adjudication Of Noisy And Subjective Data Annotation Disagreements For Deep Learning, Scott David Williams

Browse all Theses and Dissertations

Obtaining accurate inferences from deep neural networks is difficult when models are trained on instances with conflicting labels. Algorithmic recognition of online hate speech illustrates this. No human annotator is perfectly reliable, so multiple annotators evaluate and label online posts in a corpus. Labeling scheme limitations, differences in annotators' beliefs, and limits to annotators' honesty and carefulness cause some labels to disagree. Consequently, decisive and accurate inferences become less likely. Some practical applications such as social research can tolerate some indecisiveness. However, an online platform using an indecisive classifier for automated content moderation could create more problems than it solves. …


Enhancing Graph Convolutional Network With Label Propagation And Residual For Malware Detection, Aravinda Sai Gundubogula Jan 2023

Enhancing Graph Convolutional Network With Label Propagation And Residual For Malware Detection, Aravinda Sai Gundubogula

Browse all Theses and Dissertations

Malware detection is a critical task in ensuring the security of computer systems. Due to a surge in malware and the malware program sophistication, machine learning methods have been developed to perform such a task with great success. To further learn structural semantics, Graph Neural Networks abbreviated as GNNs have emerged as a recent practice for malware detection by modeling the relationships between various components of a program as a graph, which deliver promising detection performance improvement. However, this line of research attends to individual programs while overlooking program interactions; also, these GNNs tend to perform feature aggregation from neighbors …


Anomaly Detection In Multi-Seasonal Time Series Data, Ashton Taylor Williams Jan 2023

Anomaly Detection In Multi-Seasonal Time Series Data, Ashton Taylor Williams

Browse all Theses and Dissertations

Most of today’s time series data contain anomalies and multiple seasonalities, and accurate anomaly detection in these data is critical to almost any type of business. However, most mainstream forecasting models used for anomaly detection can only incorporate one or no seasonal component into their forecasts and cannot capture every known seasonal pattern in time series data. In this thesis, we propose a new multi-seasonal forecasting model for anomaly detection in time series data that extends the popular Seasonal Autoregressive Integrated Moving Average (SARIMA) model. Our model, named multi-SARIMA, utilizes a time series dataset’s multiple pre-determined seasonal trends to increase …


A Secure And Efficient Iiot Anomaly Detection Approach Using A Hybrid Deep Learning Technique, Bharath Reedy Konatham Jan 2023

A Secure And Efficient Iiot Anomaly Detection Approach Using A Hybrid Deep Learning Technique, Bharath Reedy Konatham

Browse all Theses and Dissertations

The Industrial Internet of Things (IIoT) refers to a set of smart devices, i.e., actuators, detectors, smart sensors, and autonomous systems connected throughout the Internet to help achieve the purpose of various industrial applications. Unfortunately, IIoT applications are increasingly integrated into insecure physical environments leading to greater exposure to new cyber and physical system attacks. In the current IIoT security realm, effective anomaly detection is crucial for ensuring the integrity and reliability of critical infrastructure. Traditional security solutions may not apply to IIoT due to new dimensions, including extreme energy constraints in IIoT devices. Deep learning (DL) techniques like Convolutional …


Data-Driven Strategies For Pain Management In Patients With Sickle Cell Disease, Swati Padhee Jan 2023

Data-Driven Strategies For Pain Management In Patients With Sickle Cell Disease, Swati Padhee

Browse all Theses and Dissertations

This research explores data-driven AI techniques to extract insights from relevant medical data for pain management in patients with Sickle Cell Disease (SCD). SCD is an inherited red blood cell disorder that can cause a multitude of complications throughout an individual’s life. Most patients with SCD experience repeated, unpredictable episodes of severe pain. Arguably, the most challenging aspect of treating pain episodes in SCD is assessing and interpreting the patient’s pain intensity level due to the subjective nature of pain. In this study, we leverage multiple data-driven AI techniques to improve pain management in patients with SCD. The proposed approaches …


Unsupervised-Based Distributed Machine Learning For Efficient Data Clustering And Prediction, Vishnu Vardhan Baligodugula Jan 2023

Unsupervised-Based Distributed Machine Learning For Efficient Data Clustering And Prediction, Vishnu Vardhan Baligodugula

Browse all Theses and Dissertations

Machine learning techniques utilize training data samples to help understand, predict, classify, and make valuable decisions for different applications such as medicine, email filtering, speech recognition, agriculture, and computer vision, where it is challenging or unfeasible to produce traditional algorithms to accomplish the needed tasks. Unsupervised ML-based approaches have emerged for building groups of data samples known as data clusters for driving necessary decisions about these data samples and helping solve challenges in critical applications. Data clustering is used in multiple fields, including health, finance, social networks, education, and science. Sequential processing of clustering algorithms, like the K-Means, Minibatch K-Means, …


Data-Driven Strategies For Disease Management In Patients Admitted For Heart Failure, Ankita Agarwal Jan 2023

Data-Driven Strategies For Disease Management In Patients Admitted For Heart Failure, Ankita Agarwal

Browse all Theses and Dissertations

Heart failure is a syndrome which effects a patient’s quality of life adversely. It can be caused by different underlying conditions or abnormalities and involves both cardiovascular and non-cardiovascular comorbidities. Heart failure cannot be cured but a patient’s quality of life can be improved by effective treatment through medicines and surgery, and lifestyle management. As effective treatment of heart failure incurs cost for the patients and resource allocation for the hospitals, predicting length of stay of these patients during each hospitalization becomes important. Heart failure can be classified into two types: left sided heart failure and right sided heart failure. …


Contributors To Pathologic Depolarization In Myotonia Congenita, Jessica Hope Myers Jan 2023

Contributors To Pathologic Depolarization In Myotonia Congenita, Jessica Hope Myers

Browse all Theses and Dissertations

Myotonia congenita is an inherited skeletal muscle disorder caused by loss-of-function mutation in the CLCN1 gene. This gene encodes the ClC-1 chloride channel, which is almost exclusively expressed in skeletal muscle where it acts to stabilize the resting membrane potential. Loss of this chloride channel leads to skeletal muscle hyperexcitability, resulting in involuntary muscle action potentials (myotonic discharges) seen clinically as muscle stiffness (myotonia). Stiffness affects the limb and facial muscles, though specific muscle involvement can vary between patients. Interestingly, respiratory distress is not part of this disease despite muscles of respiration such as the diaphragm muscle also carrying this …


Encryption And Compression Classification Of Internet Of Things Traffic, Mariam Najdat M Saleh Jan 2023

Encryption And Compression Classification Of Internet Of Things Traffic, Mariam Najdat M Saleh

Browse all Theses and Dissertations

The Internet of Things (IoT) is used in many fields that generate sensitive data, such as healthcare and surveillance. Increased reliance on IoT raised serious information security concerns. This dissertation presents three systems for analyzing and classifying IoT traffic using Deep Learning (DL) models, and a large dataset is built for systems training and evaluation. The first system studies the effect of combining raw data and engineered features to optimize the classification of encrypted and compressed IoT traffic using Engineered Features Classification (EFC), Raw Data Classification (RDC), and combined Raw Data and Engineered Features Classification (RDEFC) approaches. Our results demonstrate …


Solidity Compiler Version Identification On Smart Contract Bytecode, Lakshmi Prasanna Katyayani Devasani Jan 2023

Solidity Compiler Version Identification On Smart Contract Bytecode, Lakshmi Prasanna Katyayani Devasani

Browse all Theses and Dissertations

Identifying the version of the Solidity compiler used to create an Ethereum contract is a challenging task, especially when the contract bytecode is obfuscated and lacks explicit metadata. Ethereum bytecode is highly complex, as it is generated by the Solidity compiler, which translates high-level programming constructs into low-level, stack-based code. Additionally, the Solidity compiler undergoes frequent updates and modifications, resulting in continuous evolution of bytecode patterns. To address this challenge, we propose using deep learning models to analyze Ethereum bytecodes and infer the compiler version that produced them. A large number of Ethereum contracts and the corresponding compiler versions is …


Efficient Cloud-Based Ml-Approach For Safe Smart Cities, Niveshitha Niveshitha Jan 2023

Efficient Cloud-Based Ml-Approach For Safe Smart Cities, Niveshitha Niveshitha

Browse all Theses and Dissertations

Smart cities have emerged to tackle many critical problems that can thwart the overwhelming urbanization process, such as traffic jams, environmental pollution, expensive health care, and increasing energy demand. This Master thesis proposes efficient and high-quality cloud-based machine-learning solutions for efficient and sustainable smart cities environment. Different supervised machine-learning models for air quality predication (AQP) in efficient and sustainable smart cities environment is developed. For that, ML-based techniques are implemented using cloud-based solutions. For example, regression and classification methods are implemented using distributed cloud computing to forecast air execution time and accuracy of the implemented ML solution. These models are …


Path-Safe :Enabling Dynamic Mandatory Access Controls Using Security Tokens, James P. Maclennan Jan 2023

Path-Safe :Enabling Dynamic Mandatory Access Controls Using Security Tokens, James P. Maclennan

Browse all Theses and Dissertations

Deploying Mandatory Access Controls (MAC) is a popular way to provide host protection against malware. Unfortunately, current implementations lack the flexibility to adapt to emergent malware threats and are known for being difficult to configure. A core tenet of MAC security systems is that the policies they are deployed with are immutable from the host while they are active. This work looks at deploying a MAC system that leverages using encrypted security tokens to allow for redeploying policy configurations in real-time without the need to stop a running process. This is instrumental in developing an adaptive framework for security systems …


The Open Charge Point Protocol (Ocpp) Version 1.6 Cyber Range A Training And Testing Platform, David Elmo Ii Jan 2023

The Open Charge Point Protocol (Ocpp) Version 1.6 Cyber Range A Training And Testing Platform, David Elmo Ii

Browse all Theses and Dissertations

The widespread expansion of Electric Vehicles (EV) throughout the world creates a requirement for charging stations. While Cybersecurity research is rapidly expanding in the field of Electric Vehicle Infrastructure, efforts are impacted by the availability of testing platforms. This paper presents a solution called the “Open Charge Point Protocol (OCPP) Cyber Range.” Its purpose is to conduct Cybersecurity research against vulnerabilities in the OCPP v1.6 protocol. The OCPP Cyber Range can be used to enable current or future research and to train operators and system managers of Electric Charge Vehicle Supply Equipment (EVSE). This paper demonstrates this solution using three …