Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 17 of 17

Full-Text Articles in Physical Sciences and Mathematics

Improving Tattle-Tale K-Deniability, Nicholas G.E. Morales May 2024

Improving Tattle-Tale K-Deniability, Nicholas G.E. Morales

Student Research Symposium

Ensuring privacy for databases is an ongoing struggle. While the majority of work has focused on using access control lists to protect sensitive data these methods are vulnerable to inference attacks. A set of algorithms, referred to as Tattle-Tale, was developed that could protect sensitive data from being inferred however its runtime performance wasn’t suitable for production code. This set of algorithms contained two main subsets, Full Deniability and K-Deniability. My research focused on improving the runtime or utility of the K-Deniability algorithms. I investigated the runtime of the K-Deniability algorithms to identify what was slowing the process down. Aside …


Integration Of Agent Models And Meta Reinforcement Learning (Meta-Rl) Algorithms For Car Racing Experiment, Vidyavarshini Holenarasipur Jayashankar May 2024

Integration Of Agent Models And Meta Reinforcement Learning (Meta-Rl) Algorithms For Car Racing Experiment, Vidyavarshini Holenarasipur Jayashankar

Student Research Symposium

Introduction: Achieving optimal performance in 2D racing games presents unique challenges, requiring adaptive strategies and advanced learning algorithms. This research explores the integration of sophisticated agent models with Meta Reinforcement Learning (Meta-RL) techniques, specifically Model-Agnostic Meta-Learning (MAML) and Proximal Policy Optimization (PPO), to enhance decision-making and adaptability within these simulated environments. We hypothesize that this innovative approach will lead to marked improvements in game performance and learning efficiency.

Methods: In our experimental setup, we applied MAML for its rapid adaptation capabilities and PPO for optimizing the agents' policy decisions within a 2D racing game simulator. The objective was …


A Novel Caching Algorithm For Efficient Fine-Grained Access Control In Database Management Systems, Anadi Shakya May 2024

A Novel Caching Algorithm For Efficient Fine-Grained Access Control In Database Management Systems, Anadi Shakya

Student Research Symposium

Fine-grained access Control (FGAC) in DBMS is vital for restricting user access to authorized data and enhancing security. FGAC policies govern how users are granted access to specific resources based on detailed criteria, ensuring security and privacy measures. Traditional methods struggle with scaling policies to thousands, causing delays in query responses. This paper introduces a novel caching algorithm designed to address this challenge by accelerating query processing and ensuring compliance with FGAC policies. In our approach, we create a circular hashmap and employ different replacement techniques to efficiently manage the cache, prioritizing entries that are visited more frequently. To evaluate …


Story Of Your Lazy Function’S Life: A Bidirectional Demand Semantics For Mechanized Cost Analysis Of Lazy Programs, Laura Israel, Nicholas Coltharp May 2024

Story Of Your Lazy Function’S Life: A Bidirectional Demand Semantics For Mechanized Cost Analysis Of Lazy Programs, Laura Israel, Nicholas Coltharp

Student Research Symposium

Lazy evaluation is a powerful tool that enables better compositionality and potentially better performance in functional programming, but it is challenging to analyze its computation cost. Existing works either require manually annotating sharing, or rely on separation logic to reason about heaps of mutable cells. In this paper, we propose a bidirectional demand semantics that allows for reasoning about the computation cost of lazy programs without relying on special program logics. To show the effectiveness of our approach, we apply the demand semantics to a variety of case studies including insertion sort, selection sort, Okasaki's banker's queue, and the push …


Systematic Comparison Of Reservoir Computing Frameworks, Nihar S. Koppolu, Christof Teuscher May 2024

Systematic Comparison Of Reservoir Computing Frameworks, Nihar S. Koppolu, Christof Teuscher

Student Research Symposium

In this poster, we present a systematic evaluation and comparison of five Reservoir computing (RC) software simulation frameworks, namely reservoirpy, RcTorch, pyRCN, pytorch-esn, and ReservoirComputing.jl. RC is a specific machine learning approach that leverages fixed, nonlinear systems to map signals into higher dimensions. Its unique strength lies in training only the readout layer, which reduces the training complexity. RC excels in temporal signal processing and is also well suited for various physical implementations. The increasing interest in RC has led to the proliferation of various RC simulation frameworks. Our RC simulation framework evaluation focuses on a feature comparison, documentation quality, …


Behavioral Intention For Ai Usage In Higher Education, Isaac A. Odai, Elliot Wiley May 2024

Behavioral Intention For Ai Usage In Higher Education, Isaac A. Odai, Elliot Wiley

Student Research Symposium

This study sought to further understand the cognitive factors that influence undergraduate students' behavioral intention to use generative AI. Generative AI's presence in academic spaces opens the door for ethical and pedagogical questions. This study surveyed 51 undergraduate communication students to measure their attitudes, subjective norms, self efficacy and their behavioral intention to use GenAI for school work. The results of this study showed behavioral intent had a positive relationship with attitudes and subjective norms. The implications of these findings show that personal beliefs and the perceived beliefs of others are correlated to undergraduate students’ intent to use GenAI for …


Proceedings Of The Rust-Edu Workshop, Bart Massey Aug 2022

Proceedings Of The Rust-Edu Workshop, Bart Massey

Rust-Edu Workshop

The 2022 Rust-Edu Workshop was an experiment. We wanted to gather together as many thought leaders we could attract in the area of Rust education, with an emphasis on academic-facing ideas. We hoped that productive discussions and future collaborations would result. Given the quick preparation and the difficulties of an international remote event, I am very happy to report a grand success. We had more than 27 participants from timezones around the globe. We had eight talks, four refereed papers and statements from 15 participants. Everyone seemed to have a good time, and I can say that I learned a …


The Power Of The Collective: A Multi Agent-Based Modeling Approach To Nuclear Radiation Localization, Benjamin Totten, Christof Teuscher May 2022

The Power Of The Collective: A Multi Agent-Based Modeling Approach To Nuclear Radiation Localization, Benjamin Totten, Christof Teuscher

Student Research Symposium

Gamma radiation is a very high frequency, very dangerous electromagnetic wave that has a chance of being emitted after radioactive decay. Radiation source localization, or locating the previously unknown source of nuclear radiation, in a rapid and efficient manner is critically important, but challenging. We aim to create an architecture for multiple, fully independent agents that cooperate to localize sources faster than existing single-agent architectures, without compromising accuracy. Using Agent-Based Modeling and Deep Reinforcement Learning, agents are enabled to make decisions based on other agents' behaviors while maintaining programmatic autonomy. We hypothesize that radiation sources can be localized faster using …


Growing Reservoir Networks Using The Genetic Algorithm Deep Hyperneat, Nancy L. Mackenzie May 2022

Growing Reservoir Networks Using The Genetic Algorithm Deep Hyperneat, Nancy L. Mackenzie

Student Research Symposium

Typical Artificial Neural Networks (ANNs) have static architectures. The number of nodes and their organization must be chosen and tuned for each task. Choosing these values, or hyperparameters, is a bit of a guessing game, and optimizing must be repeated for each task. If the model is larger than necessary, this leads to more training time and computational cost. The goal of this project is to evolve networks that grow according to the task at hand. By gradually increasing the size and complexity of the network to the extent that the task requires, we will build networks that are more …


Development Of A Design Guideline For Pile Foundations Subjected To Liquefaction-Induced Lateral Spreading, Milad Souri, Arash Khosravifar May 2019

Development Of A Design Guideline For Pile Foundations Subjected To Liquefaction-Induced Lateral Spreading, Milad Souri, Arash Khosravifar

Student Research Symposium

Past earthquakes confirmed that seismically induced kinematic loads from soil lateral spreading and inertial loads from structure can cause severe damages to pile foundations. The research questions are:

  • How to combine inertial and kinematic loads in design of pile foundations in liquefied soil?
  • How the combination of inertia and kinematics changes with depth?
  • How this combination is affected by long-duration earthquakes?
  • How this combination affects inelastic demands in piles?


Exploring And Expanding The One-Pixel Attack, Umairullah Khan, Walt Woods, Christof Teuscher May 2019

Exploring And Expanding The One-Pixel Attack, Umairullah Khan, Walt Woods, Christof Teuscher

Student Research Symposium

In machine learning research, adversarial examples are normal inputs to a classifier that have been specifically perturbed to cause the model to misclassify the input. These perturbations rarely affect the human readability of an input, even though the model’s output is drastically different. Recent work has demonstrated that image-classifying deep neural networks (DNNs) can be reliably fooled with the modification of a single pixel in the input image, without knowledge of a DNN’s internal parameters. This “one-pixel attack” utilizes an iterative evolutionary optimizer known as differential evolution (DE) to find the most effective pixel to perturb, via the evaluation of …


Using Reservoir Computing To Build A Robust Interface With Dna Circuits In Determining Genetic Similarities Between Pathogens, Christopher Neighbor, Christof Teuscher May 2018

Using Reservoir Computing To Build A Robust Interface With Dna Circuits In Determining Genetic Similarities Between Pathogens, Christopher Neighbor, Christof Teuscher

Student Research Symposium

As computational power increases, the field of neural networks has advanced exponentially. In particular recurrent neural networks (RNNs) are being utilized to simulate dynamic systems and to learn to predict time series data. Reservoir computing is an architecture which has the potential to increase training speed while reducing computational costs. Reservoir computing consists of a RNN with a fixed connections “reservoir” while only the output layer is trained. The purpose of this research is to explore the effective use of reservoir computing networks with the eventual application towards use in a DNA based molecular computing reservoir for use in pathogen …


Assessment Of Observed Increases In Extreme Warm Exceedances In Locations With Short Warm Side Tails, Jacob S. Hunter, Paul C. Loikith, J. David Neelin May 2018

Assessment Of Observed Increases In Extreme Warm Exceedances In Locations With Short Warm Side Tails, Jacob S. Hunter, Paul C. Loikith, J. David Neelin

Student Research Symposium

Regions of shorter-than-Gaussian temperature distribution tails have been shown to occur in spatially coherent patterns in the current climate using reanalysis. Under such conditions, future changes in extremes due to global warming may manifest in more complex ways than if the underlying distribution were closer to Gaussian. For instance, under a uniform warm shift, the simplest prototype for future warming, a location with a short warm side tail would experience a greater increase in exceedances than if the distribution were Gaussian. This carries meaningful societal and environmental implications including but not limited to negative impacts on human and ecosystem health, …


Bayesian Optimization For Refining Object Proposals, With An Application To Pedestrian Detection, Anthony D. Rhodes May 2017

Bayesian Optimization For Refining Object Proposals, With An Application To Pedestrian Detection, Anthony D. Rhodes

Student Research Symposium

We devise an algorithm using a Bayesian optimization framework in conjunction with contextual visual data for the efficient localization of objects in still images. Recent research has demonstrated substantial progress in object localization and related tasks for computer vision. However, many current state-of-the-art object localization procedures still suffer from inaccuracy and inefficiency, in addition to failing to successfully leverage contextual data. We address these issues with the current research.

Our method encompasses an active search procedure that uses contextual data to generate initial bounding-box proposals for a target object. We train a convolutional neural network to approximate an offset distance …


Performance Analysis Of Droughthpc, Yasodhadevi Nachimuthu May 2017

Performance Analysis Of Droughthpc, Yasodhadevi Nachimuthu

Student Research Symposium

We present our performance analysis of DroughtHPC, a software application being developed by an interdisciplinary effort lead by Dr.Moradkhani in the Civil Engineering department, Dr. Daescu in the Math Department, and Dr. Karavanic in the Computer Science Department.

The DroughtHPC application is used to predict drought conditions for a target geographical area. The data used in the prediction are soil conditions, vegetation layers, canopy cover, snow accumulation information from satellites, and meteorological data. DroughtHPC is written in Python and uses two hydrologic models, PRMS [1] and VIC [2], to simulate soil moisture levels. A larger geographical area such as the …


Collecting Image Cropping Dataset: A Hybrid System Of Machine And Human Intelligence, Uyen T. Mai, Feng Liu May 2016

Collecting Image Cropping Dataset: A Hybrid System Of Machine And Human Intelligence, Uyen T. Mai, Feng Liu

Student Research Symposium

Image cropping is a common tool that exists in almost any image editor, yet automatic cropping is still a difficult problem in Computer Vision. Since images nowadays can be easily collected through the web, machine learning is a promising approach to solve this problem. However, an image cropping dataset is not yet available and gathering such a large-scale dataset is a non-trivial task. Although a crowdsourcing website such as Mechanical Turk seems to be a solution to this task, image cropping is a sophisticated task that is vulnerable to unreliable annotation; furthermore, collecting a large-scale high-quality dataset through crowdsourcing is …


Non-Orientable Objects As Gaming Surfaces, Haley P. Bourke, Paul Latiolais May 2015

Non-Orientable Objects As Gaming Surfaces, Haley P. Bourke, Paul Latiolais

Student Research Symposium

Developed in Python, Klein Space Fighter is an interactive learning tool and mathematically themed arcade game that allows the player to combat on different mathematical surfaces including a 2D Klein bottle. The app is available for Android and desktop devices, and will be made available for iOS in the future.

To receive an invitation to download the app through Google Play, contact me at HaleyoBourke@yahoo.com