Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 14 of 14

Full-Text Articles in Physical Sciences and Mathematics

Smart Sensing And Mobile Computing, Guihai Chen, Dakshnamoorthy Manivannan, Chen Qian, Fangming Liu, Jinsong Han Nov 2015

Smart Sensing And Mobile Computing, Guihai Chen, Dakshnamoorthy Manivannan, Chen Qian, Fangming Liu, Jinsong Han

Computer Science Faculty Publications

No abstract provided.


Large-Scale Geo-Facial Image Analysis, Mohammed T. Islam, Connor Greenwell, Richard Souvenir, Nathan Jacobs Jun 2015

Large-Scale Geo-Facial Image Analysis, Mohammed T. Islam, Connor Greenwell, Richard Souvenir, Nathan Jacobs

Computer Science Faculty Publications

While face analysis from images is a well-studied area, little work has explored the dependence of facial appearance on the geographic location from which the image was captured. To fill this gap, we constructed GeoFaces, a large dataset of geotagged face images, and used it to examine the geo-dependence of facial features and attributes, such as ethnicity, gender, or the presence of facial hair. Our analysis illuminates the relationship between raw facial appearance, facial attributes, and geographic location, both globally and in selected major urban areas. Some of our experiments, and the resulting visualizations, confirm prior expectations, such as the …


Teaching Cybersecurity Using The Cloud, Khaled Salah, Mohammad Hammoud, Sherali Zeadally Apr 2015

Teaching Cybersecurity Using The Cloud, Khaled Salah, Mohammad Hammoud, Sherali Zeadally

Information Science Faculty Publications

Cloud computing platforms can be highly attractive to conduct course assignments and empower students with valuable and indispensable hands-on experience. In particular, the cloud can offer teaching staff and students (whether local or remote) on-demand, elastic, dedicated, isolated, (virtually) unlimited, and easily configurable virtual machines. As such, employing cloud-based laboratories can have clear advantages over using classical ones, which impose major hindrances against fulfilling pedagogical objectives and do not scale well when the number of students and distant university campuses grows up. We show how the cloud paradigm can be leveraged to teach a cybersecurity course. Specifically, we share our …


Band Gap Engineering Via Doping: A Predictive Approach, Antonis N. Andriotis, Madhu Menon Mar 2015

Band Gap Engineering Via Doping: A Predictive Approach, Antonis N. Andriotis, Madhu Menon

Center for Computational Sciences Faculty Publications

We employ an extension of Harrison's theory at the tight binding level of approximation to develop a predictive approach for band gap engineering involving isovalent doping of wide band gap semiconductors. Our results indicate that reasonably accurate predictions can be achieved at qualitative as well as quantitative levels. The predictive results were checked against ab initio ones obtained at the level of DFT/SGGA + U approximation. The minor disagreements between predicted and ab initio results can be attributed to the electronic processes not incorporated in Harrison's theory. These include processes such as the conduction band anticrossing [Shan et al., …


Novel Computational Methods For Transcript Reconstruction And Quantification Using Rna-Seq Data, Yan Huang Jan 2015

Novel Computational Methods For Transcript Reconstruction And Quantification Using Rna-Seq Data, Yan Huang

Theses and Dissertations--Computer Science

The advent of RNA-seq technologies provides an unprecedented opportunity to precisely profile the mRNA transcriptome of a specific cell population. It helps reveal the characteristics of the cell under the particular condition such as a disease. It is now possible to discover mRNA transcripts not cataloged in existing database, in addition to assessing the identities and quantities of the known transcripts in a given sample or cell. However, the sequence reads obtained from an RNA-seq experiment is only a short fragment of the original transcript. How to recapitulate the mRNA transcriptome from short RNA-seq reads remains a challenging problem. We …


Numerical Investigation On Charring Ablator Geometric Effects: Study Of Stardust Sample Return Capsule Heat Shield, Haoyue Weng, Alexandre Martin Jan 2015

Numerical Investigation On Charring Ablator Geometric Effects: Study Of Stardust Sample Return Capsule Heat Shield, Haoyue Weng, Alexandre Martin

Mechanical Engineering Faculty Publications

Sample geometry is very influential in small charring ablative articles where 1D assumption might not be accurate. In heat shield design, 1D is often assumed since the nose radius is much larger than the thickness of charring. Whether the 1D assumption is valid for the heat shield is unknown. Therefore, the geometric effects of Stardust sample return capsule heat shield are numerically studied using a material response program. The developed computer program models material charring, conductive heat transfer, surface energy balance, pyrolysis gas transport and orthotropic material properties in 3D Cartesian coordinates. Simulation results show that the centerline temperatures predicted …


Singular Value Computation And Subspace Clustering, Qiao Liang Jan 2015

Singular Value Computation And Subspace Clustering, Qiao Liang

Theses and Dissertations--Mathematics

In this dissertation we discuss two problems. In the first part, we consider the problem of computing a few extreme eigenvalues of a symmetric definite generalized eigenvalue problem or a few extreme singular values of a large and sparse matrix. The standard method of choice of computing a few extreme eigenvalues of a large symmetric matrix is the Lanczos or the implicitly restarted Lanczos method. These methods usually employ a shift-and-invert transformation to accelerate the speed of convergence, which is not practical for truly large problems. With this in mind, Golub and Ye proposes an inverse-free preconditioned Krylov subspace method, …


Data Privacy Preservation In Collaborative Filtering Based Recommender Systems, Xiwei Wang Jan 2015

Data Privacy Preservation In Collaborative Filtering Based Recommender Systems, Xiwei Wang

Theses and Dissertations--Computer Science

This dissertation studies data privacy preservation in collaborative filtering based recommender systems and proposes several collaborative filtering models that aim at preserving user privacy from different perspectives.

The empirical study on multiple classical recommendation algorithms presents the basic idea of the models and explores their performance on real world datasets. The algorithms that are investigated in this study include a popularity based model, an item similarity based model, a singular value decomposition based model, and a bipartite graph model. Top-N recommendations are evaluated to examine the prediction accuracy.

It is apparent that with more customers' preference data, recommender systems …


High Quality Human 3d Body Modeling, Tracking And Application, Qing Zhang Jan 2015

High Quality Human 3d Body Modeling, Tracking And Application, Qing Zhang

Theses and Dissertations--Computer Science

Geometric reconstruction of dynamic objects is a fundamental task of computer vision and graphics, and modeling human body of high fidelity is considered to be a core of this problem. Traditional human shape and motion capture techniques require an array of surrounding cameras or subjects wear reflective markers, resulting in a limitation of working space and portability. In this dissertation, a complete process is designed from geometric modeling detailed 3D human full body and capturing shape dynamics over time using a flexible setup to guiding clothes/person re-targeting with such data-driven models. As the mechanical movement of human body can be …


Privacy Preserving Data Mining For Numerical Matrices, Social Networks, And Big Data, Lian Liu Jan 2015

Privacy Preserving Data Mining For Numerical Matrices, Social Networks, And Big Data, Lian Liu

Theses and Dissertations--Computer Science

Motivated by increasing public awareness of possible abuse of confidential information, which is considered as a significant hindrance to the development of e-society, medical and financial markets, a privacy preserving data mining framework is presented so that data owners can carefully process data in order to preserve confidential information and guarantee information functionality within an acceptable boundary.

First, among many privacy-preserving methodologies, as a group of popular techniques for achieving a balance between data utility and information privacy, a class of data perturbation methods add a noise signal, following a statistical distribution, to an original numerical matrix. With the help …


Towards Intelligent Telerobotics: Visualization And Control Of Remote Robot, Bo Fu Jan 2015

Towards Intelligent Telerobotics: Visualization And Control Of Remote Robot, Bo Fu

Theses and Dissertations--Computer Science

Human-machine cooperative or co-robotics has been recognized as the next generation of robotics. In contrast to current systems that use limited-reasoning strategies or address problems in narrow contexts, new co-robot systems will be characterized by their flexibility, resourcefulness, varied modeling or reasoning approaches, and use of real-world data in real time, demonstrating a level of intelligence and adaptability seen in humans and animals. The research I focused is in the two sub-field of co-robotics: teleoperation and telepresence. We firstly explore the ways of teleoperation using mixed reality techniques. I proposed a new type of display: hybrid-reality display (HRD) system, which …


Consistency Checking Of Natural Language Temporal Requirements Using Answer-Set Programming, Wenbin Li Jan 2015

Consistency Checking Of Natural Language Temporal Requirements Using Answer-Set Programming, Wenbin Li

Theses and Dissertations--Computer Science

Successful software engineering practice requires high quality requirements. Inconsistency is one of the main requirement issues that may prevent software projects from being success. This is particularly onerous when the requirements concern temporal constraints. Manual checking whether temporal requirements are consistent is tedious and error prone when the number of requirements is large. This dissertation addresses the problem of identifying inconsistencies in temporal requirements expressed as natural language text. The goal of this research is to create an efficient, partially automated, approach for checking temporal consistency of natural language requirements and to minimize analysts' workload.

The key contributions of this …


Smooth Subdivision Surfaces: Mesh Blending And Local Interpolation, Jianzhong Wang Jan 2015

Smooth Subdivision Surfaces: Mesh Blending And Local Interpolation, Jianzhong Wang

Theses and Dissertations--Computer Science

Subdivision surfaces are widely used in computer graphics and animation. Catmull-Clark subdivision (CCS) is one of the most popular subdivision schemes. It is capable of modeling and representing complex shape of arbitrary topology. Polar surface, working on a triangle-quad mixed mesh structure, is proposed to solve the inherent ripple problem of Catmull-Clark subdivision surface (CCSS).

CCSS is known to be C1 continuous at extraordinary points. In this work, we present a G2 scheme at CCS extraordinary points. The work is done by revising CCS subdivision step with Extraordinary-Points-Avoidance model together with mesh blending technique which selects guiding control …


Modeling Of Spallation Phenomenon In An Arc-Jet Environment, Raghava Sai Chaitanya Davuluri Jan 2015

Modeling Of Spallation Phenomenon In An Arc-Jet Environment, Raghava Sai Chaitanya Davuluri

Theses and Dissertations--Mechanical Engineering

Space vehicles, while entering the planetary atmosphere, experience high loads of heat. Ablative materials are commonly used for a thermal protection system, which undergo mass removal mechanisms to counter the heat rates. Spallation is one of the ablative processes, which is characterized by the ejection of solid particles from the material into the flow. Numerical codes that are used in designing the heat shields ignore this phenomenon. Hence, to evaluate the effectiveness of spallation phenomenon, a numerical model is developed to compute the dynamics and chemistry of the particles. The code is one-way coupled to a CFD code that models …