Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 19 of 19

Full-Text Articles in Physical Sciences and Mathematics

Effects Of Visualization On Algorithm Comprehension, Matthew Mulvey Aug 2015

Effects Of Visualization On Algorithm Comprehension, Matthew Mulvey

Theses and Dissertations

Computer science students are expected to learn and apply a variety of core algorithms which are an essential part of the field. Any one of these algorithms by itself is not necessarily extremely complex, but remembering the large variety of algorithms and the differences between them is challenging. To address this challenge, we present a novel algorithm visualization tool designed to enhance students understanding of Dijkstra’s algorithm by allowing them to discover the rules of the algorithm for themselves. It is hoped that a deeper understanding of the algorithm will help students correctly select, adapt and apply the appropriate algorithm …


An Examination Of Service Level Agreement Attributes That Influence Cloud Computing Adoption, Howard Gregory Hamilton Jun 2015

An Examination Of Service Level Agreement Attributes That Influence Cloud Computing Adoption, Howard Gregory Hamilton

CCE Theses and Dissertations

Cloud computing is perceived as the technological innovation that will transform future investments in information technology. As cloud services become more ubiquitous, public and private enterprises still grapple with concerns about cloud computing. One such concern is about service level agreements (SLAs) and their appropriateness.

While the benefits of using cloud services are well defined, the debate about the challenges that may inhibit the seamless adoption of these services still continues. SLAs are seen as an instrument to help foster adoption. However, cloud computing SLAs are alleged to be ineffective, meaningless, and costly to administer. This could impact widespread acceptance …


A Dynamic Behavioral Biometric Approach To Authenticate Users Employing Their Fingers To Interact With Touchscreen Devices, Arturo Ponce May 2015

A Dynamic Behavioral Biometric Approach To Authenticate Users Employing Their Fingers To Interact With Touchscreen Devices, Arturo Ponce

CCE Theses and Dissertations

The use of mobile devices has extended to all areas of human life and has changed the way people work and socialize. Mobile devices are susceptible to getting lost, stolen, or compromised. Several approaches have been adopted to protect the information stored on these devices. One of these approaches is user authentication. The two most popular methods of user authentication are knowledge based and token based methods but they present different kinds of problems.

Biometric authentication methods have emerged in recent years as a way to deal with these problems. They use an individual’s unique characteristics for identification and have …


Locating Potential Aspect Interference Using Clustering Analysis, Brian Todd Bennett May 2015

Locating Potential Aspect Interference Using Clustering Analysis, Brian Todd Bennett

CCE Theses and Dissertations

Software design continues to evolve from the structured programming paradigm of the 1970s and 1980s and the object-oriented programming (OOP) paradigm of the 1980s and 1990s. The functional decomposition design methodology used in these paradigms reduced the prominence of non-functional requirements, which resulted in scattered and tangled code to address non-functional elements. Aspect-oriented programming (AOP) allowed the removal of crosscutting concerns scattered throughout class code into single modules known as aspects. Aspectization resulted in increased modularity in class code, but introduced new types of problems that did not exist in OOP. One such problem was aspect interference, in which aspects …


Design, Programming, And User-Experience, Kaila G. Manca May 2015

Design, Programming, And User-Experience, Kaila G. Manca

Honors Scholar Theses

This thesis is a culmination of my individualized major in Human-Computer Interaction. As such, it showcases my knowledge of design, computer engineering, user-experience research, and puts into practice my background in psychology, com- munications, and neuroscience.

I provided full-service design and development for a web application to be used by the Digital Media and Design Department and their students.This process involved several iterations of user-experience research, testing, concepting, branding and strategy, ideation, and design. It lead to two products.

The first product is full-scale development and optimization of the web appli- cation.The web application adheres to best practices. It was …


News Feeds Clustering Research Study, Haytham Abuel-Futuh Apr 2015

News Feeds Clustering Research Study, Haytham Abuel-Futuh

CCE Theses and Dissertations

With over 0.25 billion web pages hosted in the World Wide Web, it is virtually impossible to navigate through the Internet. Many applications try to help users achieve this task. For example, search engines build indexes to make the entire World Wide Web searchable, and news curators allow users to browse topics of interest on different structured sites. One problem that arises for these applications and others with similar goals is identifying documents with similar contents. This helps the applications show users documents with unique contents as well as group various similar documents under similar topics. There has been a …


Design Of A Novel Low - Cost, Portable, 3d Ultrasound System With Extended Imaging Capabilities For Point-Of-Care Applications, Michail Tsakalakis Jan 2015

Design Of A Novel Low - Cost, Portable, 3d Ultrasound System With Extended Imaging Capabilities For Point-Of-Care Applications, Michail Tsakalakis

Browse all Theses and Dissertations

Ultrasound Imaging (USI) or Medical Sonography (MS), as it is formally called, has been widely used in biomedical applications over the last decades. USI can provide clinicians with a thorough view of the internal parts of the human body, making use of sound waves of higher frequencies than humans can perceive. USI systems are considered highly portable and of low-cost, compared to other imaging modalities. However, despite those advantages, Ultrasound Systems (US) and especially 3D ones, have not been yet extensively utilized for Point-of-Care (POC) applications, due to numerous restrictions and artifacts that they currently present.

Hardware complexity and real-time …


Object Oriented Programming, Praveen Khethavath Jan 2015

Object Oriented Programming, Praveen Khethavath

Open Educational Resources

Students write a program that reads data based on a provided banking scenario, work on inputs, and generate a report after the data is processed.


Characterization Of Prose By Rhetorical Structure For Machine Learning Classification, James Java Jan 2015

Characterization Of Prose By Rhetorical Structure For Machine Learning Classification, James Java

CCE Theses and Dissertations

Measures of classical rhetorical structure in text can improve accuracy in certain types of stylistic classification tasks such as authorship attribution. This research augments the relatively scarce work in the automated identification of rhetorical figures and uses the resulting statistics to characterize an author's rhetorical style. These characterizations of style can then become part of the feature set of various classification models.

Our Rhetorica software identifies 14 classical rhetorical figures in free English text, with generally good precision and recall, and provides summary measures to use in descriptive or classification tasks. Classification models trained on Rhetorica's rhetorical measures paired with …


Fail-Safe Testing Of Web Applications, Salah Boukhris Jan 2015

Fail-Safe Testing Of Web Applications, Salah Boukhris

Electronic Theses and Dissertations

This dissertation introduces an approach to generate tests to test fail-safe behavior for web applications. We apply the approach to a commercial web application. We build models for both behavioral and mitigation requirements. We create mitigation tests from an existing functional black box test suite by determining failure type and points of failure in the test suite and weaving required mitigation based on weaving rules to generate a test suite that tests proper mitigation of failures. A genetic algorithm (GA) is used to determine points of failure and type of failure that needs to be tested. Mitigation test paths are …


Isolation In Synchronized Drone Formations, Andrew P. Brunner Jan 2015

Isolation In Synchronized Drone Formations, Andrew P. Brunner

Electronic Theses and Dissertations

This paper expands on a theoretical model that is used for aerial robots that are working cooperatively to complete a task. In certain situations, such as when multiple robots have catastrophic failures, the surviving robots could become isolated so that they never again communicate with another robot. We prove some properties about isolated robots flying in a grid formation, and we present an algorithm that determines how many robots need to fail to isolate at least one robot. Finally, we propose a strategy that eliminates the possibility of isolation altogether.


Exploring Algorithmic Musical Key Recognition, Nathan J. Levine Jan 2015

Exploring Algorithmic Musical Key Recognition, Nathan J. Levine

CMC Senior Theses

The following thesis outlines the goal and process of algorithmic musical key detection as well as the underlying music theory. This includes a discussion of signal-processing techniques intended to most accurately detect musical pitch, as well as a detailed description of the Krumhansl-Shmuckler (KS) key-finding algorithm. It also describes the Java based implementation and testing process of a musical key-finding program based on the KS algorithm. This thesis provides an analysis of the results and a comparison with the original algorithm, ending with a discussion of the recommended direction of further development.


The Future Of Ios Development: Evaluating The Swift Programming Language, Garrett Wells Jan 2015

The Future Of Ios Development: Evaluating The Swift Programming Language, Garrett Wells

CMC Senior Theses

Swift is a new programming language developed by Apple for creating iOS and Mac OS X applications. Intended to eventually replace Objective-C as Apple’s language of choice, Swift needs to convince developers to switch over to the new language. Apple has promised that Swift will be faster than Objective-C, as well as offer more modern language features, be very safe, and be easy to learn and use. In this thesis I test these claims by creating an iOS application entirely in Swift as well as benchmarking two different algorithms. I find that while Swift is faster than Objective-C, it does …


Creating A Mobile Game, Timothy Jasany Jan 2015

Creating A Mobile Game, Timothy Jasany

Williams Honors College, Honors Research Projects

The world we live in today is one that revolves around technology. Whether you are checking your email or paying a bill, most of these actions can be accomplished through the use of technology. One of the most powerful pieces of technology is a cell phone, which can accomplish most tasks any other device can do. Since this piece of technology is growing better and better each day I decided to learn how to program android devices. Cell phones are becoming more widely used by the general public, which I think means that in the near future that cell phones …


Evaluation Of The Signature Molecular Descriptor With Blosum62 And An All-Atom Description For Use In Sequence Alignment Of Proteins, Lindsay M. Aichinger Jan 2015

Evaluation Of The Signature Molecular Descriptor With Blosum62 And An All-Atom Description For Use In Sequence Alignment Of Proteins, Lindsay M. Aichinger

Williams Honors College, Honors Research Projects

This Honors Project focused on a few aspects of this topic. The second is comparing the molecular signature kernels to three of the BLOSUM matrices (30, 62, and 90) to test the accuracy of the mathematical model. The kernel matrix was manipulated in order to improve the relationship by focusing on side groups and also by changing how the structure was represented in the matrix by increasing the initial height distance from the central atom (Height 1 and Height 2 included).

There were multiple design constraints for this project. The first was the comparison with the BLOSUM matrices (30, 62, …


Electronic Health Record Simulator, Samuel M. Brown Jan 2015

Electronic Health Record Simulator, Samuel M. Brown

Williams Honors College, Honors Research Projects

The Electronic Health Record Simulator is exactly that; it is meant to simulate an EHR (like those found in hospitals and clinics) for use in an academic setting. Its purpose is to familiarize students with the operation of real-world EHRs in order to better prepare them for the workforce. It allows instructors to create fictional patients (with full lab values), and allows students to fill in information as in a real EHR.


Learning Emotions: A Software Engine For Simulating Realistic Emotion In Artificial Agents, Douglas Code Jan 2015

Learning Emotions: A Software Engine For Simulating Realistic Emotion In Artificial Agents, Douglas Code

Senior Independent Study Theses

This paper outlines a software framework for the simulation of dynamic emotions in simulated agents. This framework acts as a domain-independent, black-box solution for giving actors in games or simulations realistic emotional reactions to events. The emotion management engine provided by the framework uses a modified Fuzzy Logic Adaptive Model of Emotions (FLAME) model, which lets it manage both appraisal of events in relation to an individual’s emotional state, and learning mechanisms through which an individual’s emotional responses to a particular event or object can change over time. In addition to the FLAME model, the engine draws on the design …


Features For Ranking Tweets Based On Credibility And Newsworthiness, Jacob W. Ross Jan 2015

Features For Ranking Tweets Based On Credibility And Newsworthiness, Jacob W. Ross

Browse all Theses and Dissertations

We create a robust and general feature set for learning to rank algorithms that rank tweets based on credibility and newsworthiness. In previous works, it has been demonstrated that when the training and testing data are from two distinct time periods, the ranker performs poorly. We improve upon previous work by creating a feature set that does not over fit a particular year or set of topics. This is critical given how people utilize social media changes as time progresses, and the topics discussed vary. In addition, we are constantly gaining new tweet data. Thus, it is important to be …


Evaluation Of Tcp Header Fields For Data Overhead Efficiency, Justin K. Yirka Jan 2015

Evaluation Of Tcp Header Fields For Data Overhead Efficiency, Justin K. Yirka

Undergraduate Research Posters

Bandwidth across the internet is constricted by monetary factors and hardware development, so researchers are left to improve the efficiency of data transmitted in order to improve internet speeds. The transmission control protocol (TCP) is the primary transport protocol on the modern internet, ensuring reliable delivery of the majority of data transmitted. I evaluated the TCP header fields for efficient use of data overhead so as to determine current waste and to suggest possible areas for revision. I examined original specifications for TCP mechanisms, comparing them to modern implementations as determined by updated standards and modern practices in the networking …