Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Computer Sciences (48)
- Theory and Algorithms (11)
- Graphics and Human Computer Interfaces (9)
- Environmental Sciences (7)
- Information Security (6)
-
- Software Engineering (6)
- Artificial Intelligence and Robotics (4)
- Environmental Monitoring (3)
- OS and Networks (3)
- Social and Behavioral Sciences (3)
- Astrophysics and Astronomy (2)
- Business (2)
- Databases and Information Systems (2)
- Environmental Health and Protection (2)
- Environmental Indicators and Impact Assessment (2)
- Mathematics (2)
- Numerical Analysis and Scientific Computing (2)
- Other Computer Sciences (2)
- Political Science (2)
- Programming Languages and Compilers (2)
- Sustainability (2)
- American Politics (1)
- Art and Design (1)
- Art and Materials Conservation (1)
- Arts and Humanities (1)
- Atmospheric Sciences (1)
- Aviation (1)
- Cosmology, Relativity, and Gravity (1)
- Education (1)
- Keyword
-
- Machine learning (4)
- Algorithms (2)
- Biometrics (2)
- Evolutionary computation (2)
- Generative adversarial networks (2)
-
- Lexicase selection (2)
- Neural networks (2)
- Security (2)
- Water--Purification (2)
- Adversarial attacks (1)
- Air gestures (1)
- Air traffic management (1)
- Android launcher (1)
- Antialiasing (1)
- Approximate Query Processing (1)
- Astrophysics--Computer simulation (1)
- Authentication (1)
- Autoencoders (1)
- Automated deduction (1)
- Automobile (1)
- Autonomous vehicle (1)
- Autonomous vehicles (1)
- BRDF (1)
- Bayesian optimization (1)
- Big Data (1)
- Blockchain (1)
- Blockchains (Databases) (1)
- Broadening Participation (1)
- Browser fingerprinting (1)
- Browsers (Computer programs) (1)
Articles 1 - 30 of 57
Full-Text Articles in Physical Sciences and Mathematics
Hyper-Dimensional Computing And Its Applications In Tinyml, Ellis A. Weglewski
Hyper-Dimensional Computing And Its Applications In Tinyml, Ellis A. Weglewski
Scholarly Horizons: University of Minnesota, Morris Undergraduate Journal
As computing systems enter the realm of nano form levels, new fields of computational development have spawned, each posing their own set of challenges. Amongst these fields is Tiny Machine Learning (tinyML), which aims to install machine learning on tiny embedded systems. The restrictions imposed upon algorithms by the limited hardware of nano-scale tiny systems make contemporary approaches to machine learning non-contenders. Hyperdimensional computing is an approach to representing data as high-dimensional vectors which allows for one-pass encoding and quick all-encompassing comparison operations via an associative memory. This approach is power-efficient, robust, and can be done in-memory, all of which …
Enhancing Evolutionary Computation Through Phylogenetic Analysis, Chenfei Peng
Enhancing Evolutionary Computation Through Phylogenetic Analysis, Chenfei Peng
Scholarly Horizons: University of Minnesota, Morris Undergraduate Journal
In this paper, we will provide an overview of the paper “Phylogeny-informed fitness estimation for test-based parent selection” by Lalejini, et al. [7] Phylogenies, or ancestry trees, provide a detailed look into the evolutionary journey of a population. In evolutionary computation, a phylogeny can represent the progress of an evolutionary algorithm through a search space. Although phylogenetic analysis is mainly used to deepen the understanding of evolutionary algorithms after they have been run, this study explores its potential use in real-time to enhance parent selection during evolutionary searches. The research by Lalejini, et al. introduces the concept of phylogeny-informed fitness …
Music Genre Classification Capabilities Of Enhanced Neural Network Architectures, Joshua Engelkes
Music Genre Classification Capabilities Of Enhanced Neural Network Architectures, Joshua Engelkes
Scholarly Horizons: University of Minnesota, Morris Undergraduate Journal
With the increase of digital music audio uploads, applications that deal with music information have been widely requested by streaming platforms. Automatic music genre classification is an important function of music recommendation and music search applications. Since the music genre categorization criteria continually shift, data-driven methods such as neural networks have been proven especially useful to music information retrieval. An enhanced CNN architecture, the Bottom-up Broadcast Neural Network, uses mel-spectrograms to push music data through a network where important low-level information is preserved. An enhanced RNN architecture, the Independent Recurrent Neural Network for Music Genre Classification, takes advantage of the …
The Threads That Shape Us: Fashioning A Sustainable Future From Silk, Bryne Croyle Johnson
The Threads That Shape Us: Fashioning A Sustainable Future From Silk, Bryne Croyle Johnson
Scholarly Horizons: University of Minnesota, Morris Undergraduate Journal
Silk has been used for centuries as a natural fiber, but has declined in popularity due to synthetic alternatives. In this pop-science article style paper, the history, present, and possible futures of silk are discussed at a generally accessible level. Anthropology, Biology, Sociology, and Environmental Science are brought together to present a case for a renewed interest in silk as a sustainable fiber.
Possible Attacks On Match-In-Database Fingerprint Authentication, Jadyn Sondrol
Possible Attacks On Match-In-Database Fingerprint Authentication, Jadyn Sondrol
Scholarly Horizons: University of Minnesota, Morris Undergraduate Journal
Biometrics are used to help keep users’ data private. There are many different biometric systems, all dealing with a unique attribute of a user, such as fingerprint, face, retina, iris and voice recognition. Fingerprint biometric systems, specifically match-in-database, have universally become the most implemented biometric system. To make these systems more secure, threat models are used to identify potential attacks and ways to mitigate them. This paper introduces a threat model for match-in-database fingerprint authentication systems. It also describes some of the most frequent attacks these systems come across and some possible mitigation efforts that can be adapted to keep …
Probing As A Technique To Understand Abstract Spaces, Ashlen A. Plasek
Probing As A Technique To Understand Abstract Spaces, Ashlen A. Plasek
Scholarly Horizons: University of Minnesota, Morris Undergraduate Journal
Machine learning models, while very powerful, have their operation obfuscated behind millions of parameters. This obfuscation can make deriving a human meaningful process from a machine learning model very difficult. However, while the intermediate states of a machine learning model are similarly obfuscated, using probing, we can start to explore looking at possible structure in those intermediate states. Large language models are a prime example of this obfuscation, and probing can begin to allow novel experimentation to be performed.
Deep-Learning Realtime Upsampling Techniques In Video Games, Biruk Mengistu
Deep-Learning Realtime Upsampling Techniques In Video Games, Biruk Mengistu
Scholarly Horizons: University of Minnesota, Morris Undergraduate Journal
This paper addresses the challenge of keeping up with the ever-increasing graphical complexity of video games and introduces a deep-learning approach to mitigating it. As games get more and more demanding in terms of their graphics, it becomes increasingly difficult to maintain high-quality images while also ensuring good performance. This is where deep learning super sampling (DLSS) comes in. The paper explains how DLSS works, including the use of convolutional autoencoder neural networks and various other techniques and technologies. It also covers how the network is trained and optimized, as well as how it incorporates temporal antialiasing and frame generation …
Lidar Segmentation-Based Adversarial Attacks On Autonomous Vehicles, Blake Johnson
Lidar Segmentation-Based Adversarial Attacks On Autonomous Vehicles, Blake Johnson
Scholarly Horizons: University of Minnesota, Morris Undergraduate Journal
Autonomous vehicles utilizing LiDAR-based 3D perception systems are susceptible to adversarial attacks. This paper focuses on a specific attack scenario that relies on the creation of adversarial point clusters with the intention of fooling the segmentation model utilized by LiDAR into misclassifying point cloud data. This can be translated into the real world with the placement of objects (such as road signs or cardboard) at these adversarial point cluster locations. These locations are generated through an optimization algorithm performed on said adversarial point clusters that are introduced by the attacker.
Not-So-Super Superfund: Cercla’S Biggest Issues, Cameron Berthiaume
Not-So-Super Superfund: Cercla’S Biggest Issues, Cameron Berthiaume
Scholarly Horizons: University of Minnesota, Morris Undergraduate Journal
The Comprehensive Environmental Response, Compensation and Liability Act (CERCLA/Superfund) is a federal law that allows the Environmental Protection Agency (EPA) to clean up contaminated sites and hold the parties responsible for the contamination financially liable. However, CERCLA faces a number of challenges to fulfilling its mission. This report examines some of the biggest issues facing the law in the past and present.
Multipath Tcp, And New Packet Scheduling Method, Cole N. Maxwell
Multipath Tcp, And New Packet Scheduling Method, Cole N. Maxwell
Scholarly Horizons: University of Minnesota, Morris Undergraduate Journal
Today many devices contain hardware to transmit data across the internet via cellular, WiFi, and wired connections. Many of these devices communicate by using a protocol known as Transmission Control Protocol (TCP). TCP was developed when network resources were expensive, and it was rare for a typical network-aware device to have more than one connection to a network. An extension to TCP known as Multipath TCP (MPTCP) was developed to leverage the multiple network connections to which devices now have access. While the MPTCP extension has been successful in its goal of using multiple network connections to send data simultaneously, …
North Shore Prospecting, Shae Lindholm
North Shore Prospecting, Shae Lindholm
Scholarly Horizons: University of Minnesota, Morris Undergraduate Journal
If one wanted to pick a violently controversial issue in the North Shore region of Minnesota, mining and mineral prospecting would be at the top of the list. As someone who lives in the region, this EIS is a demonstration of policies directly relevant to my home, and is why I picked it. “Federal Hardrock Mineral Prospecting Permits” is an EIS originating from 2012 that, like the title of the EIS implies, deals with a request for permits to dig exploratory boreholes in various locations in the Superior National Forest, which would come from the USDA Forest Service and the …
Public Participation In The Vineyard Wind Project, Jude Humphrey
Public Participation In The Vineyard Wind Project, Jude Humphrey
Scholarly Horizons: University of Minnesota, Morris Undergraduate Journal
This paper analyzes the environmental and social impact of Vineyard Wind, a proposed offshore wind farm, as well as the public response to these impacts. This was done by reading and summarizing the draft and final environmental impact statement and comments made during the public participation process. Lawsuits brought against the company were also included in this analysis. The public participation process was deemed adequate and in some cases more than required by federal agencies, however the comments and lawsuits show that there are still concerns that were not included in the approved alternative. The public response to this project …
Using Probabilistic Context-Free Grammar To Create Password Guessing Models, Isabelle Hjelden
Using Probabilistic Context-Free Grammar To Create Password Guessing Models, Isabelle Hjelden
Scholarly Horizons: University of Minnesota, Morris Undergraduate Journal
This paper will discuss two versions of probabilistic context-free grammar password-guessing models. The first model focuses on using English semantics to break down passwords and identify patterns. The second model identifies repeating chunks in passwords and uses this information to create possible passwords. Then, we will show the performance of each model on leaked password databases, and finally discuss the observations made on these tests.
Exploring Methods Used In Face Swapping, Joshua Eklund
Exploring Methods Used In Face Swapping, Joshua Eklund
Scholarly Horizons: University of Minnesota, Morris Undergraduate Journal
Face swapping involves replacing the face in one image (the target) with a face in a different image (the source) while maintaining the pose and expression of the target face. Previous methods of face swapping required extensive computer power and man hours. As such, new methods are being developed that are quicker, less resource intensive, and more accessible to the non-expert. This paper provides background information on key methods used for face swapping and outlines three recently developed approaches: one based on generative adversarial networks, one based on linear 3D morphable models, and one based on encoder-decoders.
Applications Of Generative Adversarial Networks In Single Image Datasets, Dylan E. Cramer
Applications Of Generative Adversarial Networks In Single Image Datasets, Dylan E. Cramer
Scholarly Horizons: University of Minnesota, Morris Undergraduate Journal
One of the main difficulties faced in most generative machine learning models is how much data is required to train it, especially when collecting a large dataset is not feasible. Recently there have been breakthroughs in tackling this issue in SinGAN, with its researchers being able to train a Generative Adversarial Network (GAN) on just a single image with a model that can perform many novel tasks, such as image harmonization. ConSinGAN is a model that builds upon this work by concurrently training several stages in a sequential multi-stage manner while retaining the ability to perform those novel tasks.
Mach's Principle: Why Are Some Reference Frames Inertial, And Others Not?, Joseph Moonan Walbran
Mach's Principle: Why Are Some Reference Frames Inertial, And Others Not?, Joseph Moonan Walbran
Scholarly Horizons: University of Minnesota, Morris Undergraduate Journal
Mach's principle is a conjecture that was popular among physicists in the early 1900s, and which still sees occasional interest today. The principle states that large accelerating masses induce a local inertial reference frame around them. This paper introduces the principle and its history, and discusses its influence on later theories, like Maxwellian theories of gravity and general relativity.
Intuitr: A Theorem Prover For Intuitionistic Propositional Logic, Erik Rauer
Intuitr: A Theorem Prover For Intuitionistic Propositional Logic, Erik Rauer
Scholarly Horizons: University of Minnesota, Morris Undergraduate Journal
A constructive proof proves the existence of a mathematical object by giving the steps necessary to construct said object. Proofs of this type can be interpreted as an algorithm for creating such an object. Intuitionistic Propositional Logic (IPL) is a propositional logic system wherein all valid proofs are constructive. intuitR is a theorem prover for IPL, that is, it determines whether a given formula is valid in IPL or not. In this paper, we describe how intuitR determines the validity of a formula and review its performance. When compared on a benchmark set of problems, intuitR was determined to solve …
Using Blockchain To Improve Security Of The Internet Of Things, Joshua W. Quist
Using Blockchain To Improve Security Of The Internet Of Things, Joshua W. Quist
Scholarly Horizons: University of Minnesota, Morris Undergraduate Journal
The Internet of Things has increased in popularity in recent years, with daily life now being surrounded by “smart devices.” This network of smart devices, such as thermostats, refrigerators, and even stationary bikes affords us convenience, but at a cost. Security measures are typically inferior on these devices; considering that they collect our data around the clock, this is a big reason for concern. Recent research shows that blockchain technology may be one way to address these security concerns. This paper discusses the Internet of Things and the current issues with how security is handled, discusses how blockchain can shore …
Filling Gaps On The Pareto Front In Multi- And Many-Objective Optimization, Richard Lussier
Filling Gaps On The Pareto Front In Multi- And Many-Objective Optimization, Richard Lussier
Scholarly Horizons: University of Minnesota, Morris Undergraduate Journal
Pareto fronts offer insight into the best found solutions of a given problem. Several algorithms have been developed to help maintain a well-distributed Pareto front and therefore offer a wide variety of solutions. However, in real-world problems, the Pareto front isn’t necessarily a continuous surface and may contain holes and/or discontinuous lines. These irregular areas on the Pareto front are considered gaps. These gaps can either be natural or artificial. In their research, Pellicer, Escudero, Alzueta, and Deb suggest a three-step procedure to find, validate, and fill these gaps. First, they developed an algorithm to generate gap points. Second, they …
Approaches To Broadening Participation With Ap Computer Science Principles, Audrey Le Meur
Approaches To Broadening Participation With Ap Computer Science Principles, Audrey Le Meur
Scholarly Horizons: University of Minnesota, Morris Undergraduate Journal
The Advanced Placement Computer Science Principles (AP CSP) course framework was created with the intention of broadening participation in computing. Research has produced mixed results on whether or not the framework succeeds in that goal. Given that teachers have significant freedom in how they choose to teach the AP CSP content, students can have a variety of experiences that may or may not impact their continued participation in CS. In this paper, I compare four different approaches to the AP CSP framework by examining their impact on AP exam scores, self-efficacy and confidence, belongingness and identity, and persistence and interest, …
An Overview Of Redirected Walking Approaches And Techniques In Virtual Reality, Benjamin Goldstein
An Overview Of Redirected Walking Approaches And Techniques In Virtual Reality, Benjamin Goldstein
Scholarly Horizons: University of Minnesota, Morris Undergraduate Journal
One major obstacle to the ideal of virtual reality is the physical constraints of the user’s location, primarily its limited size. A commonly proposed solution is using redirected walking, defined as manipulation of the user’s experience to alter their walking path, to keep the user within a confined physical space without causing any perceivable sensory distortion for the user. This paper discusses various redirected walking approaches which have been proposed, including predictions of user movement via navigation meshes and simulated users, and subtle redirection techniques using blink-induced change blindness and avatar manipulation.
Using Temporal Session Types To Analyze Time Complexities Of Concurrent Programs, Joseph M. Walbran
Using Temporal Session Types To Analyze Time Complexities Of Concurrent Programs, Joseph M. Walbran
Scholarly Horizons: University of Minnesota, Morris Undergraduate Journal
Das et al. develop a method for analyzing the time complexity of concurrent, message-passing algorithms. Their method is based on adding timing information to datatypes. Specifically, they use a family of datatypes called session types; these constrain the structure of interactions that may take place over a channel of communication. In Das’s system, the timing properties of an algorithm can be verified by a typechecker: if the timing information in the session types is mismatched, the computer will report a type error. In their paper, Das et al. develop the theory for such a typechecker, but do not provide an …
The Impact Of Dynamic Difficulty Adjustment On Player Experience In Video Games, Chineng Vang
The Impact Of Dynamic Difficulty Adjustment On Player Experience In Video Games, Chineng Vang
Scholarly Horizons: University of Minnesota, Morris Undergraduate Journal
Dynamic Difficulty Adjustment (DDA) is a process by which a video game adjusts its level of challenge to match a player’s skill level. Its popularity in the video game industry continues to grow as it has the ability to keep players continuously engaged in a game, a concept referred to as Flow. However, the influence of DDA on games has received mixed responses, specifically that it can enhance player experience as well as hinder it. This paper explores DDA through the Monte Carlo Tree Search algorithm and Reinforcement Learning, gathering feedback from players seeking to understand what about DDA is …
Intrusion Attacks On Automotive Can And Their Detection, Halley M. Paulson
Intrusion Attacks On Automotive Can And Their Detection, Halley M. Paulson
Scholarly Horizons: University of Minnesota, Morris Undergraduate Journal
The main highway of communication in a vehicle is the Controller Area Network, commonly known by the acronym CAN. Any vulnerability in this network could allow bad actors to block communication between vehicle subsystems, risking the safety of the vehicle’s occupants. With the ever growing list of vulnerabilities being exposed in the CAN, it is critical to address its safety. This paper looks at one of the known vulnerabilities in the data link layer of the CAN and an Intrusion Detection System that could detect attacks on this network. We detail a few processes of the CAN, arbitration and error …
Scheduling Aircraft Departures To Avoid Enroute Congestion, Johannes Martinez
Scheduling Aircraft Departures To Avoid Enroute Congestion, Johannes Martinez
Scholarly Horizons: University of Minnesota, Morris Undergraduate Journal
When scheduled flights are forecast to overcrowd sections of enroute airspace, an air traffic control authority may need to delay departures. Mixed integer linear programming can be used to compute a schedule that resolves the congestion while bringing the sum of all delays to a minimum. Standard linear programming constraint formulations for such scheduling problems, however, have poor run times for instances of realistic size. A new constraint formulation based on cycles and paths through a route graph reduces run times in computational experiments. It shows particularly strong performance for schedules that approach the worst-case solution times in standard formulations.
Fighting Gerrymandering By Automating Congressional Redistricting, Jacob Jenness
Fighting Gerrymandering By Automating Congressional Redistricting, Jacob Jenness
Scholarly Horizons: University of Minnesota, Morris Undergraduate Journal
Gerrymandering is a political problem that the United States has had for more than 200 years. Politicians have taken the dull and routine process of drawing congressional districts and turned it into a highly-partisan process. However, with recent improvements in redistricting algorithms, researchers Harry Levin and Sorelle Friedler have introduced their recursive Divide and Conquer Redistricting Algorithm. This algorithm has the potential to automate the process of congressional redistricting, thereby removing the potential for bias. By utilizing a set of partitioning and swapping algorithms, the Divide and Conquer Redistricting Algorithm achieves desirable goals, such as low population deviation, and high …
Umn Morris Carbon Footprint Calculations (2005 - 2020), Anneliese Tatham
Umn Morris Carbon Footprint Calculations (2005 - 2020), Anneliese Tatham
Scholarly Horizons: University of Minnesota, Morris Undergraduate Journal
The University of Minnesota Morris is well known for its commitment to sustainability. As a part of this commitment, the UMN Morris Office of Sustainability tracks and analyzes campus energy production, consumption and efficiency and summarizes this information as a carbon footprint. A carbon footprint combines all available greenhouse gas emissions data attributed to the institution from three categories: direct emissions from institution-owned or operated processes (Scope 1), indirect emissions related to the purchase of utilities (Scope 2), and indirect emissions from sources not owned by the institution but associated with its function (Scope 3). This project was an effort …
Electronic Voting Implementation Through Bitcoin Blockchain Technology, Cassie Schultz
Electronic Voting Implementation Through Bitcoin Blockchain Technology, Cassie Schultz
Scholarly Horizons: University of Minnesota, Morris Undergraduate Journal
Even with all the advances we have seen in secure digital technology, the most secure way to currently cast a vote on election day consist of a hand-marked paper ballot. When extenuating circumstances arise, offering a voting environment that is accessible and safe for everyone, but also secure can be a difficult task under the current voting system. This paper discusses one proposed electronic voting system which uses blockchain technology. Based on a review of literature on blockchain technology and specific implementations of voting systems, a summary of relevant background information as well as implementation protocol are provided. Even though …
Browser Fingerprinting And The Importance Of Digital Privacy, Aaron M. Corpstein
Browser Fingerprinting And The Importance Of Digital Privacy, Aaron M. Corpstein
Scholarly Horizons: University of Minnesota, Morris Undergraduate Journal
Browser fingerprinting is a type of internet tracking where the attributes of a user’s computer and browser accessing a web page are remotely recorded and then used for profiling, tracking, and advertising purposes. This paper focuses on defining browser fingerprinting and enumerating ways in which the user can combat fingerprinting. Browser fingerprinting can be thwarted by changing attributes within the user’s browser or machine, using a browser designed to combat fingerprinting, or with security and anti-fingerprinting focused browser extensions. All of these methods are capable of increasing the security of the user.
Recent Advances In Smartphone Computational Photography, Paul Friederichsen
Recent Advances In Smartphone Computational Photography, Paul Friederichsen
Scholarly Horizons: University of Minnesota, Morris Undergraduate Journal
Smartphone cameras present many challenges, most of which come from the need for them to be physically small. Their small size puts a fundamental limit on their ability to resolve detail and collect light, which makes low-light photography and zooming difficult. This paper presents two approaches to improve smartphone photography through software techniques. The first is handheld super-resolution which uses natural hand movement to improve the resolution smartphone images, especially when zoomed. The second approach is a system which improves low light photography in smartphones.