Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 16 of 16

Full-Text Articles in Physical Sciences and Mathematics

New Methods For Deep Learning Based Real-Valued Inter-Residue Distance Prediction, Jacob Barger Nov 2020

New Methods For Deep Learning Based Real-Valued Inter-Residue Distance Prediction, Jacob Barger

Theses

Background: Much of the recent success in protein structure prediction has been a result of accurate protein contact prediction--a binary classification problem. Dozens of methods, built from various types of machine learning and deep learning algorithms, have been published over the last two decades for predicting contacts. Recently, many groups, including Google DeepMind, have demonstrated that reformulating the problem as a multi-class classification problem is a more promising direction to pursue. As an alternative approach, we recently proposed real-valued distance predictions, formulating the problem as a regression problem. The nuances of protein 3D structures make this formulation appropriate, allowing predictions …


Provable Security Of Symmetric-Key Cryptographic Schemes., Ashwin Jha Dr. Oct 2020

Provable Security Of Symmetric-Key Cryptographic Schemes., Ashwin Jha Dr.

Doctoral Theses

In this thesis, we provide quantitative and/or qualitative improvements in the provable security of several symmetric-key schemes, encompassing major information security goals, viz. data authentication, encryption, and authenticated encryption.AUTHENTICATION AND INTEGRITY: Among authentication schemes, we analyze the CBC-MAC family and counter-based MACs (XMACC, XMACR, PCS, LightMAC etc.), referred as the XMAC family. First, we revisit the security proofs for CBC-MAC and EMAC, and identify a critical flaw in the state-of-the-art results. We revise the security proofs and obtain significantly better bounds in case of EMAC, ECBC and FCBC. Second, we study the security of CBC-MAC family, when the underlying primitive …


Semantic-Driven Unsupervised Image-To-Image Translation For Distinct Image Domains, Wesley Ackerman Sep 2020

Semantic-Driven Unsupervised Image-To-Image Translation For Distinct Image Domains, Wesley Ackerman

Theses and Dissertations

We expand the scope of image-to-image translation to include more distinct image domains, where the image sets have analogous structures, but may not share object types between them. Semantic-Driven Unsupervised Image-to-Image Translation for Distinct Image Domains (SUNIT) is built to more successfully translate images in this setting, where content from one domain is not found in the other. Our method trains an image translation model by learning encodings for semantic segmentations of images. These segmentations are translated between image domains to learn meaningful mappings between the structures in the two domains. The translated segmentations are then used as the basis …


An Analysis Of Syntax Exercises On The Performance Of Cs1 Students, Shelsey B. Sullivan Aug 2020

An Analysis Of Syntax Exercises On The Performance Of Cs1 Students, Shelsey B. Sullivan

All Graduate Theses and Dissertations, Spring 1920 to Summer 2023

Students in introductory programming classes (CS1) generally have a difficult time learning the rules of programming. Although the general concepts of programming are relatively easy to learn, it can be difficult to learn what exactly can be typed in what order, which is known as syntax. To attempt to help students overcome this barrier, a study was conducted that introduced exercises into a CS1 class which taught the programming syntax in simple steps. The results of this study were obtained by analyzing the keys the students pressed, the errors of their code, their midterm exam scores, and their responses to …


Improving Convolutional Neural Network Robustness To Adversarial Images Through Image Filtering, Natalie E. Bogda Aug 2020

Improving Convolutional Neural Network Robustness To Adversarial Images Through Image Filtering, Natalie E. Bogda

Masters Theses

The field of computer vision and deep learning is known for its ability to recognize images with extremely high accuracy. Convolutional neural networks exist that can correctly classify 96\% of 1.2 million images of complex scenes. However, with just a few carefully positioned imperceptible changes to the pixels of an input image, an otherwise accurate network will misclassify this almost identical image with high confidence. These perturbed images are known as \textit{adversarial examples} and expose that convolutional neural networks do not necessarily "see" the world in the way that humans do. This work focuses on increasing the robustness of classifiers …


Image Dehazing From The Perspective Of Environmental Illumination., Sanchayan Santra Dr. Jul 2020

Image Dehazing From The Perspective Of Environmental Illumination., Sanchayan Santra Dr.

Doctoral Theses

Haze and fog are atmospheric phenomena where the particles suspended in the air obscure visibility by scattering the light propagating through the atmosphere. As a result only a part of the reflected light reaches the observer. So, the apparent intensity of the objects get reduced. Apart from that, the in-scatter of the atmospheric light creates a translucent veil, which is a common sight during haze. Image dehazing methods try to recover a haze-free version of a given image by removing the effects of haze.Although attempts have been made to accurately estimate the scene transmittance, the estimation of environmental illumination has …


A Computer Science Academic Vocabulary List, David Roesler Jul 2020

A Computer Science Academic Vocabulary List, David Roesler

Dissertations and Theses

This thesis documents the development of the Computer Science Academic Vocabulary List (CSAVL), a pedagogical tool intended for use by English-for-specific-purpose educators and material developers. A 3.5-million-word corpus of academic computer science textbooks and journal articles was developed in order to produce the CSAVL. This study draws on the improved methodologies used in the creation of recent lemma-based word lists such as the Academic Vocabulary List (AVL) and the Medical Academic Vocabulary List (MAVL), which take into account the discipline-specific meanings of academic vocabulary. The CSAVL provides specific information for each entry, including part of speech and CS-specific meanings in …


Using Natural Language Processing To Categorize Fictional Literature In An Unsupervised Manner, Dalton J. Crutchfield Jan 2020

Using Natural Language Processing To Categorize Fictional Literature In An Unsupervised Manner, Dalton J. Crutchfield

Electronic Theses and Dissertations

When following a plot in a story, categorization is something that humans do without even thinking; whether this is simple classification like “This is science fiction” or more complex trope recognition like recognizing a Chekhov's gun or a rags to riches storyline, humans group stories with other similar stories. Research has been done to categorize basic plots and acknowledge common story tropes on the literary side, however, there is not a formula or set way to determine these plots in a story line automatically. This paper explores multiple natural language processing techniques in an attempt to automatically compare and cluster …


Prediction Of Sudden Cardiac Death Using Ensemble Classifiers, Ayman Momtaz El-Geneidy Jan 2020

Prediction Of Sudden Cardiac Death Using Ensemble Classifiers, Ayman Momtaz El-Geneidy

CCE Theses and Dissertations

Sudden Cardiac Death (SCD) is a medical problem that is responsible for over 300,000 deaths per year in the United States and millions worldwide. SCD is defined as death occurring from within one hour of the onset of acute symptoms, an unwitnessed death in the absence of pre-existing progressive circulatory failures or other causes of deaths, or death during attempted resuscitation. Sudden death due to cardiac reasons is a leading cause of death among Congestive Heart Failure (CHF) patients. The use of Electronic Medical Records (EMR) systems has made a wealth of medical data available for research and analysis. Supervised …


A Pcnn Framework For Blood Cell Image Segmentation, Carol D. Lenihan Jan 2020

A Pcnn Framework For Blood Cell Image Segmentation, Carol D. Lenihan

CCE Theses and Dissertations

This research presents novel methods for segmenting digital blood cell images under a Pulse Coupled Neural Network (PCNN) framework. A blood cell image contains different types of blood cells found in the peripheral blood stream such as red blood cells (RBCs), white blood cells (WBCs), and platelets. WBCs can be classified into five normal types – neutrophil, monocyte, lymphocyte, eosinophil, and basophil – as well as abnormal types such as lymphoblasts and others. The focus of this research is on identifying and counting RBCs, normal types of WBCs, and lymphoblasts. The total number of RBCs and WBCs, along with classification …


The Perceptions And Lived Experiences Of Female Students In A Computer Science Program At A Community College, Terry Voldase Jan 2020

The Perceptions And Lived Experiences Of Female Students In A Computer Science Program At A Community College, Terry Voldase

Walden Dissertations and Doctoral Studies

America's higher education institutions have aligned computer science curricula with today's modern technology. Despite these efforts, data have shown that there is slow growth among young women majoring in computer science and even slower growth in this area at community colleges. Higher education institutions have also acknowledged a gap between men and women entering the computer science field and a need to explore options for computer science programs to engage women in the industry. The purpose of this phenomenological study was to gain an understanding of the perceptions and lived experiences of female students enrolled in computer classes at New …


Examination Of Practices Used By Ap Computer Science Teachers With Higher Than Average Female Enrollment, Derek J. Miller Jan 2020

Examination Of Practices Used By Ap Computer Science Teachers With Higher Than Average Female Enrollment, Derek J. Miller

Graduate Research Theses & Dissertations

This dissertation examines the practices employed by AP Computer Science A teachers that can help recruit and retain female students in computer science. A survey was sent to teachers to see what practices they used in their classrooms and what practices they thought had the biggest influence on female student recruitment and retention. Of the five practice categories (recruitment, pedagogical, curricular, extracurricular, and mentoring), the survey respondents thought recruitment was the most influential and curricular was the least influential. After the survey, 12 teachers were chosen for interviews because they had a higher enrollment of female students than the rest …


Social Media Based Algorithmic Clinical Decision Support Learning From Behavioral Predispositions, Radhika V. Medury Jan 2020

Social Media Based Algorithmic Clinical Decision Support Learning From Behavioral Predispositions, Radhika V. Medury

Doctoral Dissertations

Behavioral disorders are disabilities characterized by an individual’s mood, thinking, and social interactions. The commonality of behavioral disorders amongst the United States population has increased in the last few years, with an estimated 50% of all Americans diagnosed with a behavioral disorder at some point in their lifetime. AttentionDeficit/Hyperactivity Disorder is one such behavioral disorder that is a severe public health concern because of its high prevalence, incurable nature, significant impact on domestic life, and peer relationships. Symptomatically, in theory, ADHD is characterized by inattention, hyperactivity, and impulsivity. Access to providers who can offer diagnosis and treat the disorder varies …


Ethics, Privacy And Data Collection: A Complex Intersection, Matthew S. Brown Jan 2020

Ethics, Privacy And Data Collection: A Complex Intersection, Matthew S. Brown

Honors Theses

The technology around us enables incredible abilities such as high-resolution video calls and the ability to stay connected with everyone we care about through social media. This technology also comes with a hidden cost in the form of data collection.

This work explores what privacy means and how users understand what data social media companies collect and monetize. This thesis also proposes a more ethical business model that addresses privacy concerns from an individual perspective.


An Adversarial Framework For Deep 3d Target Template Generation, Walter E. Waldow Jan 2020

An Adversarial Framework For Deep 3d Target Template Generation, Walter E. Waldow

Browse all Theses and Dissertations

This paper presents a framework for the generation of 3D models. This is an important problem for many reasons. For example, 3D models are important for systems that are involved in target recognition. These systems use 3D models to train up accuracy on identifying real world object. Traditional means of gathering 3D models have limitations that the generation of 3D models can help overcome. The framework uses a novel generative adversarial network (GAN) that learns latent representations of two dimensional views of a model to bootstrap the network’s ability to learn to generate three dimensional objects. The novel architecture is …


Identifying Knowledge Gaps Using A Graph-Based Knowledge Representation, Daniel P. Schmidt Jan 2020

Identifying Knowledge Gaps Using A Graph-Based Knowledge Representation, Daniel P. Schmidt

Browse all Theses and Dissertations

Knowledge integration and knowledge bases are becoming more and more prevalent in the systems we use every day. When developing these knowledge bases, it is important to ensure the correctness of the information upon entry, as well as allow queries of all sorts; for this, understanding where the gaps in knowledge can arise is critical. This thesis proposes a descriptive taxonomy of knowledge gaps, along with a framework for automated detection and resolution of some of those gaps. Additionally, the effectiveness of this framework is evaluated in terms of successful responses to queries on a knowledge base constructed from a …