Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

2015

PDF

Computer Sciences

Institution
Keyword
Publication
Publication Type

Articles 1 - 30 of 2389

Full-Text Articles in Physical Sciences and Mathematics

The Construction And Validation Of An Instructor Learning Analytics Implementation Model To Support At-Risk Students, Holly M. Mckee Dec 2015

The Construction And Validation Of An Instructor Learning Analytics Implementation Model To Support At-Risk Students, Holly M. Mckee

CCE Theses and Dissertations

With the widespread use of learning analytics tools, there is a need to explore how these technologies can be used to enhance teaching and learning. Little research has been conducted on what human processes are necessary to facilitate meaningful adoption of learning analytics. The research problem is that there is a lack of evidence-based guidance on how instructors can effectively implement learning analytics to support academically at-risk students with the purpose of improving learning outcomes. The goal was to develop and validate a model to guide instructors in the implementation of learning analytics tools to support academically at-risk students with …


Front Matter Dec 2015

Front Matter

Journal of Digital Forensics, Security and Law

No abstract provided.


Back Matter Dec 2015

Back Matter

Journal of Digital Forensics, Security and Law

No abstract provided.


Masthead Dec 2015

Masthead

Journal of Digital Forensics, Security and Law

No abstract provided.


Analisis Desain Website Terhadap Budaya Pendekatan Teori Hofstede, Amelia Fauziah Husna Dec 2015

Analisis Desain Website Terhadap Budaya Pendekatan Teori Hofstede, Amelia Fauziah Husna

Elinvo (Electronics, Informatics, and Vocational Education)

Penelitian ini bertujuan untuk mengetahui pengaruh kebudayaan terhadap desai suatu website dan mengetahui budaya apakah yang berkembang di daerah tersebut melalui desai websitenya. Metode yang digunakan adalah studi kasus. Variabel yang digunakan ada 5, sesuai dengan Teori Hofstede, yaitu Power Distance (Jarak Kekuasaan), Indivialism vs Collectivism (Individualisme vs Kolektivisme), Masculinity vs Femininity (Maskulinitas vs Feminitas), Uncertainty Avoidance (Penghindaran terhadap Ketidakpastian), dan Long Term Orientation vs Short Term Normative (Orientasi Jangka Panjang vs Orientasi Normatif Jangka Pendek. Penelitian ini membandingkan tiga website yang berasal dari tiga negara yang berbeda, bahkan benua yang berbeda. Hasilnya terdapat perbedaan desain website yang dipengaruhi oleh …


Automatic Detection And Quantification Of Bluff Erosion Events In Single Image Series, Martin D. Hellwig Dec 2015

Automatic Detection And Quantification Of Bluff Erosion Events In Single Image Series, Martin D. Hellwig

Graduate Masters Theses

Many communities along coastlines and riverbanks are threatened by water erosion and hence an accurate model to predict erosion events is needed in order to plan mitigation strategies. Such models need to rely on readily available meteorological data that may or may not be correlated with the occurrence of erosion events. In order to accurately study these potential correlations, researchers need a quantified time series index indicating the occurrence and magnitude of erosion in the studied area. We show that such an index can be obtained by creating and analyzing a single image series using relatively cheap consumer grade digital …


Entropyexplorer: An R Package For Computing And Comparing Differential Shannon Entropy, Kai Wang, Charles A. Philips, Arnold M. Saxton, Michael A. Langston Dec 2015

Entropyexplorer: An R Package For Computing And Comparing Differential Shannon Entropy, Kai Wang, Charles A. Philips, Arnold M. Saxton, Michael A. Langston

Department of Computer Science Faculty Publications

Background: Differential Shannon entropy (DSE) and differential coefficient of variation (DCV) are effective metrics for the study of gene expression data. They can serve to augment differential expression (DE), and be applied in numerous settings whenever one seeks to measure differences in variability rather than mere differences in magnitude. A general purpose, easily accessible tool for DSE and DCV would help make these two metrics available to data scientists. Automated p value computations would additionally be useful, and are often easier to interpret than raw test statistic values alone.

Results: EntropyExplorer is an R package for calculating DSE, DCV and …


Web Based Attendance Management System (Project Source Code In Php And Mysql), Dr. Muhammad Zubair Asghar Dec 2015

Web Based Attendance Management System (Project Source Code In Php And Mysql), Dr. Muhammad Zubair Asghar

Dr. Muhammad Zubair Asghar

This source code deals with the development of web based attendance management system using PHP and MYSQL. It is developed by one my BSCS student, namely sahar hassan under my supervision.


Advanced Techniques For Computational And Information Sciences, William Guo, Chih-Cheng Hung, Paul Scheunders, Bor-Chen Kuo Dec 2015

Advanced Techniques For Computational And Information Sciences, William Guo, Chih-Cheng Hung, Paul Scheunders, Bor-Chen Kuo

Faculty and Research Publications

New techniques in computational and information sciences have played an important role in keeping advancing the so called knowledge economy. Advanced techniques have been introduced to or emerging in almost every field of the scientific world for hundreds of years, which has been accelerated since the late 1970s when the advancement in computers and digital technologies brought the world into the Information Era. In addition to the rapid development of computational intelligence and new data fusion techniques in the past thirty years [1–4], mobile and cloud computing, grid computing driven numeric computation models, big data intelligence, and other emerging technologies …


Spatial 2015, Werner Kuhn, Matt Duckham, Marcia Castro Dec 2015

Spatial 2015, Werner Kuhn, Matt Duckham, Marcia Castro

Journal of Spatial Information Science

This report summarizes the first in a new series of interdisciplinary unconferences, called SPATIAL. SPATIAL 2015 was focused on applying spatial information to human health, and was held at the Center for Spatial Studies at the University of California, Santa Barbara, 9-11 December 2015.


Spatial Refinement As Collection Order Relations, Zhong Zhao Dec 2015

Spatial Refinement As Collection Order Relations, Zhong Zhao

Journal of Spatial Information Science

An abstract examination of refinement (and conversely, coarsening) with respect to the involved spatial relations gives rise to formulated order relations between spatial coverings, which are defined as complete-coverage representations composed of regional granules. Coverings, which generalize partitions by allowing granules to overlap, enhance hierarchical geocomputations in several ways. Refinement between spatial coverings has underlying patterns with respect to inclusion—formalized as binary topological relations—between their granules. The patterns are captured by collection relations of inclusion, which are obtained by constraining relevant topological relations with cardinality properties such as uniqueness and totality. Conjoining relevant collection relations of equality and proper inclusion …


Routes Visualization: Automated Placement Of Multiple Route Symbols Along A Physical Network Infrastructure, Jules Teulade-Denantes, Adrien Maudet, Cécile Duchêne Dec 2015

Routes Visualization: Automated Placement Of Multiple Route Symbols Along A Physical Network Infrastructure, Jules Teulade-Denantes, Adrien Maudet, Cécile Duchêne

Journal of Spatial Information Science

This paper tackles the representation of routes carried by a physical network infrastructure on a map. In particular, the paper examines the case where each route is represented by a separate colored linear symbol offset from the physical network segments and from other routes---as on public transit maps with bus routes offset from roads. In this study, the objective is to automate the placement of such route symbols while maximizing their legibility, especially at junctions. The problem is modeled as a constraint optimization problem. Legibility criteria are identified and formalized as constraints to optimize, while focusing on the case of …


Invariant Spatial Information In Sketch Maps — A Study Of Survey Sketch Maps Of Urban Areas, Jia Wang, Angela Schwering Dec 2015

Invariant Spatial Information In Sketch Maps — A Study Of Survey Sketch Maps Of Urban Areas, Jia Wang, Angela Schwering

Journal of Spatial Information Science

It is commonly recognized that free-hand sketch maps are influenced by cognitive impacts and therefore sketch maps are incomplete, distorted, and schematized. This makes it difficult to achieve a one-to-one alignment between a sketch map and its corresponding geo-referenced metric map. Nevertheless, sketch maps are still useful to communicate spatial knowledge, indicating that sketch maps contain certain spatial information that is robust to cognitive impacts. In existing studies, sketch maps are used frequently to measure cognitive maps. However, little work has been done on invariant spatial information in sketch maps, which is the information of spatial configurations representing correctly the …


Development And Evaluation Of A Geographic Information Retrieval System Using Fine Grained Toponyms, Damien Palacio, Curdin Derungs, Ross S. Purves Dec 2015

Development And Evaluation Of A Geographic Information Retrieval System Using Fine Grained Toponyms, Damien Palacio, Curdin Derungs, Ross S. Purves

Journal of Spatial Information Science

Geographic information retrieval (GIR) is concerned with returning information in response to an information need, typically expressed in terms of a thematic and spatial component linked by a spatial relationship. However, evaluation initiatives have often failed to show significant differences between simple text baselines and more complex spatially enabled GIR approaches. We explore the effectiveness of three systems (a text baseline, spatial query expansion, and a full GIR system utilizing both text and spatial indexes) at retrieving documents from a corpus describing mountaineering expeditions, centred around fine grained toponyms. To allow evaluation, we use user generated content (UGC) in the …


Reliability And Validity Of Neurobehavioral Function On The Psychology Experimental Building Language Test Battery In Young Adults, Brian J. Piper, Shane Mueller, Alexander R. Geerken, Kyle L. Dixon, Gregory Kroliczak, Reid H. Olsen, Jeremy K. Miller Dec 2015

Reliability And Validity Of Neurobehavioral Function On The Psychology Experimental Building Language Test Battery In Young Adults, Brian J. Piper, Shane Mueller, Alexander R. Geerken, Kyle L. Dixon, Gregory Kroliczak, Reid H. Olsen, Jeremy K. Miller

Michigan Tech Publications

Background. The Psychology Experiment Building Language (PEBL) software consists of over one-hundred computerized tests based on classic and novel cognitive neuropsychology and behavioral neurology measures. Although the PEBL tests are becoming more widely utilized, there is currently very limited information about the psychometric properties of these measures.

Methods. Study I examined inter-relationships among nine PEBL tests including indices of motor-function (Pursuit Rotor and Dexterity), attention (Test of Attentional Vigilance and Time-Wall), working memory (Digit Span Forward), and executive-function (PEBL Trail Making Test, Berg/Wisconsin Card Sorting Test, Iowa Gambling Test, and Mental Rotation) in a normative sample (N = 189, …


Evaluating Different Distributed-Cyber-Infrastructure For Data And Compute Intensive Scientific Application, Arghya Kusum Das, Seung Jong Park, Jaeki Hong, Wooseok Chang Dec 2015

Evaluating Different Distributed-Cyber-Infrastructure For Data And Compute Intensive Scientific Application, Arghya Kusum Das, Seung Jong Park, Jaeki Hong, Wooseok Chang

Computer Science Faculty Research & Creative Works

Scientists are increasingly using the current state of the art big data analytic software (e.g., Hadoop, Giraph, etc.) for their data-intensive applications over HPC environment. However, understanding and designing the hardware environment that these data- and compute-intensive applications require for good performance is challenging. With this motivation, we evaluated the performance of big data software over three different distributed-cyber-infrastructures, including a traditional HPC-cluster called SuperMikeII, a regular datacenter called SwatIII, and a novel MicroBrick-based hyperscale system called CeresII, using our own benchmark Parallel Genome Assembler (PGA). PGA is developed atop Hadoop and Giraph and serves as a good real-world example …


Vascular Tree Structure: Fast Curvature Regularization And Validation, Egor Chesakov Dec 2015

Vascular Tree Structure: Fast Curvature Regularization And Validation, Egor Chesakov

Electronic Thesis and Dissertation Repository

This work addresses the challenging problem of accurate vessel structure analysis in high resolution 3D biomedical images. Typical segmentation methods fail on recent micro-CT data sets resolving near-capillary vessels due to limitations of standard first-order regularization models. While regularization is needed to address noise and partial volume issues in the data, we argue that extraction of thin tubular structures requires higher-order curvature-based regularization. There are no standard segmentation methods regularizing surface curvature in 3D that could be applied to large 3D volumes. However, we observe that standard measures for vessels structure are more concerned with topology, bifurcation angles, and other …


Sensor Resource Management: Intelligent Multi-Objective Modularized Optimization Methodology And Models, Boris Kovalerchuk, Leonid Perlovsky Dec 2015

Sensor Resource Management: Intelligent Multi-Objective Modularized Optimization Methodology And Models, Boris Kovalerchuk, Leonid Perlovsky

All Faculty Scholarship for the College of the Sciences

The importance of the optimal Sensor Resource Management (SRM) problem is growing. The number of Radar, EO/IR, Overhead Persistent InfraRed (OPIR), and other sensors with best capabilities, is limited in the stressing tasking environment relative to sensing needs. Sensor assets differ significantly in number, location, and capability over time. To determine on which object a sensor should collect measurements during the next observation period k, the known algorithms favor the object with the expected measurements that would result in the largest gain in relative information. We propose a new tasking paradigm OPTIMA for sensors that goes beyond information gain. It …


Autonomous Pipeline Monitoring And Maintenance System: A Rfid-Based Approach, Jong-Hoon Kim, Gokarna Sharma, Noureddine Boudriga, S.S. Iyengar, Nagarajan Prabakar Dec 2015

Autonomous Pipeline Monitoring And Maintenance System: A Rfid-Based Approach, Jong-Hoon Kim, Gokarna Sharma, Noureddine Boudriga, S.S. Iyengar, Nagarajan Prabakar

School of Computing and Information Sciences

Pipeline networks are one of the key infrastructures of our modern life. Proactive monitoring and frequent inspection of pipeline networks are very important for sustaining their safe and efficient functionalities. Existing monitoring and maintenance approaches are costly and inefficient because pipelines can be installed in large scale and in an inaccessible and hazardous environment. To overcome these challenges, we propose a novel Radio Frequency IDentification (RFID)-based Autonomous Maintenance system for Pipelines, called RAMP, which combines robotic, sensing, and RFID technologies for efficient and accurate inspection, corrective reparation, and precise geo-location information. RAMP can provide not only economical and scalable remedy …


Practical Teaching Method Based On Matlab In Ac Speed Regulating System Course, Qian Yang, Jinzhu Gao Dec 2015

Practical Teaching Method Based On Matlab In Ac Speed Regulating System Course, Qian Yang, Jinzhu Gao

All Faculty Presentations - School of Engineering and Computer Science

Because an AC speed regulating system is abstract and complex, the study on practical teaching method based on MATLAB software is quite necessary in the AC speed regulating system course at our university. The permanent magnet synchronous motor (PMSM) vector control system is taken as an example to explain in details the practical teaching method based on MATLAB. The course content is divided into several knowledge modules based on speed regulation methods. The concept of subsystem in Simulink is introduced. Each type of speed regulating systems can be divided into several subsystems according to its functions. The control principle, system …


Pattern Discovery In Dna Using Stochastic Automata, Shweta Shweta Dec 2015

Pattern Discovery In Dna Using Stochastic Automata, Shweta Shweta

Master's Projects

We consider the problem of identifying similarities between different species of DNA. To do this we infer a stochastic finite automata from a given training data and compare it with a test data. The training and test data consist of DNA sequence of different species. Our method first identifies sentences in DNA. To identify sentences we read DNA sequence one character at a time, 3 characters form a codon and codons form proteins (also known as amino acid chains).Each amino acid in proteins belongs to a group. In total we have 5 groups’ polar, non-polar, acidic, basic and stop codons. …


Extracting Windows Event Logs Using Memory Forensics, Matthew Veca Dec 2015

Extracting Windows Event Logs Using Memory Forensics, Matthew Veca

University of New Orleans Theses and Dissertations

Abstract Microsoft’s Windows Operating System provides a logging service that collects, filters and stores event messages from the kernel and applications into log files (.evt and .evtx). Volatility, the leading open source advanced memory forensic suite, currently allows users to extract these events from memory dumps of Windows XP and Windows 2003 machines. Currently there is no support for users to extract the event logs (.evtx) from Windows Vista, Win7 or Win8 memory dumps, and Volatility users have to rely on outside software in order to do this. This thesis discusses a newly developed evtxlogs.py plugin for Volatility, which allows …


Email Similarity Matching And Automatic Reply Generation Using Statistical Topic Modeling And Machine Learning, Zachery L. Schiller Dec 2015

Email Similarity Matching And Automatic Reply Generation Using Statistical Topic Modeling And Machine Learning, Zachery L. Schiller

Electronic Theses and Dissertations

Responding to email is a time-consuming task that is a requirement for most professions. Many people find themselves answering the same questions over and over, repeatedly replying with answers they have written previously either in whole or in part. In this thesis, the Automatic Mail Reply (AMR) system is implemented to help with repeated email response creation. The system uses past email interactions and, through unsupervised statistical learning, attempts to recover relevant information to give to the user to assist in writing their reply.

Three statistical learning models, term frequency-inverse document frequency (tf-idf), Latent Semantic Analysis (LSA), and Latent Dirichlet …


From Boolean Equalities To Constraints, Sergio Antoy, Michael Hanus Dec 2015

From Boolean Equalities To Constraints, Sergio Antoy, Michael Hanus

Computer Science Faculty Publications and Presentations

Although functional as well as logic languages use equality to discriminate between logically different cases, the operational meaning of equality is different in such languages. Functional languages reduce equational expressions to their Boolean values, True or False, logic languages use unification to check the validity only and fail otherwise. Consequently, the language Curry, which amalgamates functional and logic programming features, offers two kinds of equational expressions so that the programmer has to distinguish between these uses. We show that this distinction can be avoided by providing an analysis and transformation method that automatically selects the appropriate operation. Without this distinction …


Data To Decisions For Cyberspace Operations, Steve Stone Dec 2015

Data To Decisions For Cyberspace Operations, Steve Stone

Military Cyber Affairs

In 2011, the United States (U.S.) Department of Defense (DOD) named cyberspace a new operational domain. The U.S. Cyber Command and the Military Services are working to make the cyberspace environment a suitable place for achieving national objectives and enabling military command and control (C2). To effectively conduct cyberspace operations, DOD requires data and analysis of the Mission, Network, and Adversary. However, the DOD’s current data processing and analysis capabilities do not meet mission needs within critical operational timelines. This paper presents a summary of the data processing and analytics necessary to effectively conduct cyberspace operations.


Glenside Fire Company Website Modernization, Jennifer Clark, Irene Patterson, David J. Cox Jr. Dec 2015

Glenside Fire Company Website Modernization, Jennifer Clark, Irene Patterson, David J. Cox Jr.

Senior Capstone Theses

Glenside Fire Company #1, known as GFC, is one of five volunteer fire companies operating in Cheltenham Township, providing services not limited to fire suppression, search and rescue, emergency medical services assistance, and fire safety education. GFC was looking to create a new website in order to promote volunteer firefighting, recruit new members, and fundraise, as well as provide a place where current members can keep records of events and trainings, using a public and member-only view. The website was created using a Bootstrap framework, in order to maximize usability across many platforms. The website will be easily updated with …


Applying Bayesian Machine Learning Methods To Theoretical Surface Science, Shane Carr Dec 2015

Applying Bayesian Machine Learning Methods To Theoretical Surface Science, Shane Carr

McKelvey School of Engineering Theses & Dissertations

Machine learning is a rapidly evolving field in computer science with increasingly many applications to other domains. In this thesis, I present a Bayesian machine learning approach to solving a problem in theoretical surface science: calculating the preferred active site on a catalyst surface for a given adsorbate molecule. I formulate the problem as a low-dimensional objective function. I show how the objective function can be approximated into a certain confidence interval using just one iteration of the self-consistent field (SCF) loop in density functional theory (DFT). I then use Bayesian optimization to perform a global search for the solution. …


The Performance Of Random Prototypes In Hierarchical Models Of Vision, Kendall Lee Stewart Dec 2015

The Performance Of Random Prototypes In Hierarchical Models Of Vision, Kendall Lee Stewart

Dissertations and Theses

I investigate properties of HMAX, a computational model of hierarchical processing in the primate visual cortex. High-level cortical neurons have been shown to respond highly to particular natural shapes, such as faces. HMAX models this property with a dictionary of natural shapes, called prototypes, that respond to the presence of those shapes. The resulting set of similarity measurements is an effective descriptor for classifying images. Curiously, prior work has shown that replacing the dictionary of natural shapes with entirely random prototypes has little impact on classification performance. This work explores that phenomenon by studying the performance of random prototypes on …


Nd − Pdpa: N Dimensional Probability Density Profile Analysis, Arjang Fahim Dec 2015

Nd − Pdpa: N Dimensional Probability Density Profile Analysis, Arjang Fahim

Theses and Dissertations

Proteins are often referred as working molecule of a cell, performing many structural, functional and regulatory processes. Revealing the function of proteins still remains a challenging problem. Advancement in genomics sequence projects produces large protein sequence repository, but due to technical difficulty and cost related to structure determination, the number of identified protein structure is far behind. Novel structures identification are particularly important for a number of reasons: they generate models of similar proteins for comparison; identify evolutionary relationships; further contribute to our understanding of protein function and mechanism; and allow for the fold of other family members to be …


All Your Sessions Are Belong To Us: Investigating Authenticator Leakage Through Backup Channels On Android, Guangdong Bai, Jun Sun, Jianliang Wu, Quanqi Ye, Li Li, Jin Song Dong, Shanqing Guo Dec 2015

All Your Sessions Are Belong To Us: Investigating Authenticator Leakage Through Backup Channels On Android, Guangdong Bai, Jun Sun, Jianliang Wu, Quanqi Ye, Li Li, Jin Song Dong, Shanqing Guo

Research Collection School Of Computing and Information Systems

Security of authentication protocols heavily relies on the confidentiality of credentials (or authenticators) like passwords and session IDs. However, unlike browser-based web applications for which highly evolved browsers manage the authenticators, Android apps have to construct their own management. We find that most apps simply locate their authenticators into the persistent storage and entrust underlying Android OS for mediation. Consequently, these authenticators can be leaked through compromised backup channels. In this work, we conduct the first systematic investigation on this previously overlooked attack vector. We find that nearly all backup apps on Google Play inadvertently expose backup data to any …