Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer science

Engineering

Institution
Publication Year
Publication
Publication Type

Articles 1 - 30 of 49

Full-Text Articles in Physical Sciences and Mathematics

Making Sense Of Big (Kinematic) Data: A Comprehensive Analysis Of Movement Parameters In A Diverse Population, Naomi Wilma Nunis Jan 2023

Making Sense Of Big (Kinematic) Data: A Comprehensive Analysis Of Movement Parameters In A Diverse Population, Naomi Wilma Nunis

University of the Pacific Theses and Dissertations

OBJECTIVE

The purpose of this study was to determine how kinematic, big data can be evaluated using computational, comprehensive analysis of movement parameters in a diverse population.

METHODS

Retrospective data was collected, cleaned, and reviewed for further analysis of biomechanical movement in an active population using 3D collinear resistance loads. The active sample of the population involved in the study ranged from age 7 to 82 years old and respectively identified as active in 13 different sports. Moreover, a series of exercises were conducted by each participant across multiple sessions. Exercises were measured and recorded based on 6 distinct biometric …


Development Of Sensing And Programming Activities For Engineering Technology Pathways Using A Virtual Arduino Simulation Platform, Murat Kuzlu, Vukica Jovanovic, Otilia Popescu, Salih Sarp Jan 2023

Development Of Sensing And Programming Activities For Engineering Technology Pathways Using A Virtual Arduino Simulation Platform, Murat Kuzlu, Vukica Jovanovic, Otilia Popescu, Salih Sarp

Engineering Technology Faculty Publications

The Arduino platform has long been an efficient tool in teaching electrical engineering technology, electrical engineering, and computer science concepts in schools and universities and introducing new learners to programming and microcontrollers. Numerous Arduino projects are widely available through the open-source community, and they can help students to have hands-on experience in building circuits and programming electronics with a wide variety of topics that can make learning electrical prototyping fun. The educational fields of electrical engineering and electrical engineering technology need continuous updating to keep up with the continuous evolution of the computer system. Although the traditional Arduino platform has …


A Structure-Aware Generative Adversarial Network For Bilingual Lexicon Induction, Bocheng Han, Qian Tao, Lusi Li, Zhihao Xiong Jan 2023

A Structure-Aware Generative Adversarial Network For Bilingual Lexicon Induction, Bocheng Han, Qian Tao, Lusi Li, Zhihao Xiong

Computer Science Faculty Publications

Bilingual lexicon induction (BLI) is the task of inducing word translations with a learned mapping function that aligns monolingual word embedding spaces in two different languages. However, most previous methods treat word embeddings as isolated entities and fail to jointly consider both the intra-space and inter-space topological relations between words. This limitation makes it challenging to align words from embedding spaces with distinct topological structures, especially when the assumption of isomorphism may not hold. To this end, we propose a novel approach called the Structure-Aware Generative Adversarial Network (SA-GAN) model to explicitly capture multiple topological structure information to achieve accurate …


Messiness: Automating Iot Data Streaming Spatial Analysis, Christopher White, Atilio Barreda Ii Dec 2021

Messiness: Automating Iot Data Streaming Spatial Analysis, Christopher White, Atilio Barreda Ii

Publications and Research

The spaces we live in go through many transformations over the course of a year, a month, or a day; My room has seen tremendous clutter and pristine order within the span of a few hours. My goal is to discover patterns within my space and formulate an understanding of the changes that occur. This insight will provide actionable direction for maintaining a cleaner environment, as well as provide some information about the optimal times for productivity and energy preservation.

Using a Raspberry Pi, I will set up automated image capture in a room in my home. These images will …


Automated Test Generation For Validating Systemc Designs, Bin Lin Jan 2021

Automated Test Generation For Validating Systemc Designs, Bin Lin

Dissertations and Theses

Modern system design involves integration of all components of a system on a single chip, namely System-on-a-Chip (SoC). The ever-increasing complexity of SoCs and rapidly decreasing time-to-market have pushed the design abstraction to the electronic system level (ESL), in order to increase design productivity. SystemC is a widely used ESL modeling language that plays a central role in modern SoCs design process. ESL SystemC designs usually serve as executable specifications for the subsequent SoCs design flow. Therefore, undetected bugs in ESL SystemC designs may propagate to low-level implementations or even final silicon products. In addition, modern SoCs design often involves …


Computational Simulation And Analysis Of Neuroplasticity, Madison E. Yancey Jan 2021

Computational Simulation And Analysis Of Neuroplasticity, Madison E. Yancey

Browse all Theses and Dissertations

Homeostatic synaptic plasticity is the process by which neurons alter their activity in response to changes in network activity. Neuroscientists attempting to understand homeostatic synaptic plasticity have developed three different mathematical methods to analyze collections of event recordings from neurons acting as a proxy for neuronal activity. These collections of events are from control data and treatment data, referring to the treatment of neuron cultures with pharmacological agents that augment or inhibit network activity. If the distribution of control events can be functionally mapped to the distribution of treatment events, a better understanding of the biological processes underlying homeostatic synaptic …


Identifying Knowledge Gaps Using A Graph-Based Knowledge Representation, Daniel P. Schmidt Jan 2020

Identifying Knowledge Gaps Using A Graph-Based Knowledge Representation, Daniel P. Schmidt

Browse all Theses and Dissertations

Knowledge integration and knowledge bases are becoming more and more prevalent in the systems we use every day. When developing these knowledge bases, it is important to ensure the correctness of the information upon entry, as well as allow queries of all sorts; for this, understanding where the gaps in knowledge can arise is critical. This thesis proposes a descriptive taxonomy of knowledge gaps, along with a framework for automated detection and resolution of some of those gaps. Additionally, the effectiveness of this framework is evaluated in terms of successful responses to queries on a knowledge base constructed from a …


A Tutorial And Future Research For Building A Blockchain-Based Secure Communication Scheme For Internet Of Intelligent Things, Mohammad Wazid, Ashok Kumar Das, Sachin Shetty, Minho Jo Jan 2020

A Tutorial And Future Research For Building A Blockchain-Based Secure Communication Scheme For Internet Of Intelligent Things, Mohammad Wazid, Ashok Kumar Das, Sachin Shetty, Minho Jo

Computational Modeling & Simulation Engineering Faculty Publications

The Internet of Intelligent Things (IoIT) communication environment can be utilized in various types of applications (for example, intelligent battlefields, smart healthcare systems, the industrial internet, home automation, and many more). Communications that happen in such environments can have different types of security and privacy issues, which can be resolved through the utilization of blockchain. In this paper, we propose a tutorial that aims in desiging a generalized blockchain-based secure authentication key management scheme for the IoIT environment. Moreover, some issues with using blockchain for a communication environment are discussed as future research directions. The details of different types of …


Social Media Based Algorithmic Clinical Decision Support Learning From Behavioral Predispositions, Radhika V. Medury Jan 2020

Social Media Based Algorithmic Clinical Decision Support Learning From Behavioral Predispositions, Radhika V. Medury

Doctoral Dissertations

Behavioral disorders are disabilities characterized by an individual’s mood, thinking, and social interactions. The commonality of behavioral disorders amongst the United States population has increased in the last few years, with an estimated 50% of all Americans diagnosed with a behavioral disorder at some point in their lifetime. AttentionDeficit/Hyperactivity Disorder is one such behavioral disorder that is a severe public health concern because of its high prevalence, incurable nature, significant impact on domestic life, and peer relationships. Symptomatically, in theory, ADHD is characterized by inattention, hyperactivity, and impulsivity. Access to providers who can offer diagnosis and treat the disorder varies …


An Adversarial Framework For Deep 3d Target Template Generation, Walter E. Waldow Jan 2020

An Adversarial Framework For Deep 3d Target Template Generation, Walter E. Waldow

Browse all Theses and Dissertations

This paper presents a framework for the generation of 3D models. This is an important problem for many reasons. For example, 3D models are important for systems that are involved in target recognition. These systems use 3D models to train up accuracy on identifying real world object. Traditional means of gathering 3D models have limitations that the generation of 3D models can help overcome. The framework uses a novel generative adversarial network (GAN) that learns latent representations of two dimensional views of a model to bootstrap the network’s ability to learn to generate three dimensional objects. The novel architecture is …


Single Image Reflection Removal Beyond Linearity, Qiang Wen, Yinjie Tan, Jing Qin, Wenxi Liu, Guoqiang Han, Shengfeng He Jun 2019

Single Image Reflection Removal Beyond Linearity, Qiang Wen, Yinjie Tan, Jing Qin, Wenxi Liu, Guoqiang Han, Shengfeng He

Research Collection School Of Computing and Information Systems

Due to the lack of paired data, the training of image reflection removal relies heavily on synthesizing reflection images. However, existing methods model reflection as a linear combination model, which cannot fully simulate the real-world scenarios. In this paper, we inject non-linearity into reflection removal from two aspects. First, instead of synthesizing reflection with a fixed combination factor or kernel, we propose to synthesize reflection images by predicting a non-linear alpha blending mask. This enables a free combination of different blurry kernels, leading to a controllable and diverse reflection synthesis. Second, we design a cascaded network for reflection removal with …


Seeing Eye To Eye: A Machine Learning Approach To Automated Saccade Analysis, Maigh Attre May 2019

Seeing Eye To Eye: A Machine Learning Approach To Automated Saccade Analysis, Maigh Attre

Honors Scholar Theses

Abnormal ocular motility is a common manifestation of many underlying pathologies particularly those that are neurological. Dynamics of saccades, when the eye rapidly changes its point of fixation, have been characterized for many neurological disorders including concussions, traumatic brain injuries (TBI), and Parkinson’s disease. However, widespread saccade analysis for diagnostic and research purposes requires the recognition of certain eye movement parameters. Key information such as velocity and duration must be determined from data based on a wide set of patients’ characteristics that may range in eye shapes and iris, hair and skin pigmentation [36]. Previous work on saccade analysis has …


Sec-Lib: Protecting Scholarly Digital Libraries From Infected Papers Using Active Machine Learning Framework, Nir Nissim, Aviad Cohen, Jian Wu, Andrea Lanzi, Lior Rokach, Yuval Elovici, Lee Giles Jan 2019

Sec-Lib: Protecting Scholarly Digital Libraries From Infected Papers Using Active Machine Learning Framework, Nir Nissim, Aviad Cohen, Jian Wu, Andrea Lanzi, Lior Rokach, Yuval Elovici, Lee Giles

Computer Science Faculty Publications

Researchers from academia and the corporate-sector rely on scholarly digital libraries to access articles. Attackers take advantage of innocent users who consider the articles' files safe and thus open PDF-files with little concern. In addition, researchers consider scholarly libraries a reliable, trusted, and untainted corpus of papers. For these reasons, scholarly digital libraries are an attractive-target and inadvertently support the proliferation of cyber-attacks launched via malicious PDF-files. In this study, we present related vulnerabilities and malware distribution approaches that exploit the vulnerabilities of scholarly digital libraries. We evaluated over two-million scholarly papers in the CiteSeerX library and found the library …


A Survey Of Attention Deficit Hyperactivity Disorder Identification Using Psychophysiological Data, S. De Silva, S. Dayarathna, G. Ariyarathne, D. Meedeniya, Sampath Jayarathna Jan 2019

A Survey Of Attention Deficit Hyperactivity Disorder Identification Using Psychophysiological Data, S. De Silva, S. Dayarathna, G. Ariyarathne, D. Meedeniya, Sampath Jayarathna

Computer Science Faculty Publications

Attention Deficit Hyperactivity Disorder (ADHD) is one of the most common neurological disorders among children, that affects different areas in the brain that allows executing certain functionalities. This may lead to a variety of impairments such as difficulties in paying attention or focusing, controlling impulsive behaviours and overreacting. The continuous symptoms may have a severe impact in the long-term. This paper explores the ADHD identification studies using eye movement data and functional Magnetic Resonance Imaging (fMRI). This study discusses different machine learning techniques, existing models and analyses the existing literature. We have identified the current challenges and possible future directions …


Minutes & Seconds: The Scientists, Patrick Aievoli Sep 2018

Minutes & Seconds: The Scientists, Patrick Aievoli

Zea E-Books Collection

Minutes & Seconds, is a captivating intelligible read for those who strive to understand where the “what if” moment has gone. Succeeding his other captivating books, Aievoli’s deep introspective lens dials his readers in to awaken the proverbial sleeping giant inside of our consciousness. He designs an insightful exciting romp through the surreal landscape of our society and illustrates how various pioneers have lead us to a crossroads. I’m truly impressed with Aievoli’s perspicacious comprehension of where digital has taken us through the hands of these select individuals. --Sequoyah Wharton

In creating Minutes & Seconds, Aievoli has assembled an interesting …


The Fat-Pyramid: A Robust Network For Parallel Computation, Ronald I. Greenberg Jan 2018

The Fat-Pyramid: A Robust Network For Parallel Computation, Ronald I. Greenberg

Ronald Greenberg

This paper shows that a fat-pyramid of area Theta(A) built from processors of size lg A requires only O(lg^2 A) slowdown in bit-times to simulate any network of area A under very general conditions. Specifically, there is no restriction on processor size (amount of attached memory) or number of processors in the competing network, nor is the assumption of unit wire delay required. This paper also derives upper bounds on the slowdown required by a fat-pyramid to simulate a network of larger area in the case of unit wire delay.


The Fat-Pyramid And Universal Parallel Computation Independent Of Wire Delay, Ronald I. Greenberg Jan 2018

The Fat-Pyramid And Universal Parallel Computation Independent Of Wire Delay, Ronald I. Greenberg

Ronald Greenberg

This paper shows that a fat-pyramid of area Θ(A) requires only O(log A) slowdown to simulate any competing network of area A under very general conditions. The result holds regardless of the processor size (amount of attached memory) and number of processors in the competing networks as long as the limitation on total area is met. Furthermore, the result is valid regardless of the relationship between wire length and wire delay. We especially focus on elimination of the common simplifying assumption that unit time suffices to traverse a wire regardless of its length, since the assumption becomes more and more …


Minimizing Channel Density With Movable Terminals, Ronald I. Greenberg, Jau-Der Shih Jan 2018

Minimizing Channel Density With Movable Terminals, Ronald I. Greenberg, Jau-Der Shih

Ronald Greenberg

We give algorithms to minimize density for channels with terminals that are movable subject to certain constraints. The main cases considered are channels with linear order constraints, channels with linear order constraints and separation constraints, channels with movable modules containing fixed terminals, and channels with movable modules and terminals. In each case, previous results for running time and space are improved by a factor of L/lg n and L , respectively, where L is the channel length and n is the number of terminals.


Feasible Offset And Optimal Offset For Single-Layer Channel Routing, Ronald I. Greenberg, Jau-Der Shih Jan 2018

Feasible Offset And Optimal Offset For Single-Layer Channel Routing, Ronald I. Greenberg, Jau-Der Shih

Ronald Greenberg

The paper provides an efficient method to find all feasible offsets for a given separation in a VLSI channel routing problem in one layer. The prior literature considers this task only for problems with no single-sided nets. When single-sided nets are included, the worst-case solution time increases from Theta(n) to Omega(n^2), where n is the number of nets. But, if the number of columns c is O(n), one can solve the problem in time O(n^{1.5}lg n ), which improves upon a `naive' O(cn) approach. As a corollary of this result, the same time bound suffices to find the optimal offset …


The Rock 2018, School Of Engineering And Computer Science Jan 2018

The Rock 2018, School Of Engineering And Computer Science

The Rock

No abstract provided.


A Twitter-Based Study For Understanding Public Reaction On Zika Virus, Roopteja Muppalla Jan 2018

A Twitter-Based Study For Understanding Public Reaction On Zika Virus, Roopteja Muppalla

Browse all Theses and Dissertations

In recent times, social media platforms like Twitter have become more popular and people have become more interactive and responsive than before. People often react to every news in real-time and within no-time, the information spreads rapidly. Even with viral diseases like Zika, people tend to share their opinions and concerns on social media. This can be leveraged by the health officials to track the disease in real-time thereby reducing the time lag due to traditional surveys. A faster and accurate detection of the disease can allow health officials to understand people's opinion of the disease and take necessary precautions …


The Rock 2017, School Of Engineering And Computer Science Jan 2017

The Rock 2017, School Of Engineering And Computer Science

The Rock

No abstract provided.


Automated Rendering Of Schema Diagram For Ontologies, Nazifa Karima Jan 2017

Automated Rendering Of Schema Diagram For Ontologies, Nazifa Karima

Browse all Theses and Dissertations

Semantic Web extends the current web, using ontologies, metadata and other technologies to establish links between terms and concepts. This enables machines to automatically integrate information across different platforms utilizing the standard definitions. Furthermore, reasoning agents can infer new knowledge by gathering existing information and these additional connections between them. As a result of being designed and maintained independently, data sources exhibit highly heterogeneous nature. This increases the complexity of data integration and hinders interoperability. However, if we can align the overlapping concepts among different domains of knowledge, the prospect of achieving interoperability and integration without having any intermediate reasoning …


Visualization Of Carbon Monoxide Particles Released From Firearms, Sadan Suneesh Menon Jan 2017

Visualization Of Carbon Monoxide Particles Released From Firearms, Sadan Suneesh Menon

Browse all Theses and Dissertations

A number of soldiers have come forward to report discomfort, irritation and respiratory problems after taking part in a live firing session. These problems are caused due to the fumes and particulates emitted from the gun upon firing. There exists substantial research work focused on lead and other harmful metallic particulates expelled from a firearm, since they are the most harmful among the other emissions. However, our research focuses on visualizing the carbon monoxide (CO) particles released from a firearm in order to help understand adverse effects they may have on the human body. We use data provided by researchers …


Rendering Owl In Latex For Improved Readability: Extensions To The Owlapi, Cogan M. Shimizu Jan 2017

Rendering Owl In Latex For Improved Readability: Extensions To The Owlapi, Cogan M. Shimizu

Browse all Theses and Dissertations

As ontology engineering is inherently a multidisciplinary process, it is necessary to utilize multiple vehicles to present an ontology to a user. In order to examine the content of an ontology, formal logic renderings of the axioms appear to be a very helpful approach for some. This thesis introduces a number of incremental improvements to the OWLAPI's \LaTeX{} rendering framework in order to improve the readability, concision, and correctness of OWL files translated into Description Logic and First Order Logic. In addition, we examine the efficacy of these renderings as vehicles for understanding an ontology.


A Constraint Language For Static Semantic Analysis Based On Scope Graphs, Hendrik Van Antwerpen, Pierre Néron, Andrew Tolmach, Eelco Visser, Guido Wachsmuth Sep 2015

A Constraint Language For Static Semantic Analysis Based On Scope Graphs, Hendrik Van Antwerpen, Pierre Néron, Andrew Tolmach, Eelco Visser, Guido Wachsmuth

Computer Science Faculty Publications and Presentations

In previous work, we introduced scope graphs as a formalism for describing program binding structure and performing name resolution in an AST-independent way. In this paper, we show how to use scope graphs to build static semantic analyzers. We use constraints extracted from the AST to specify facts about binding, typing, and initialization. We treat name and type resolution as separate building blocks, but our approach can handle language constructs—such as record field access—for which binding and typing are mutually dependent.We also refine and extend our previous scope graph theory to address practical concerns including ambiguity checking and support for …


A Theory Of Name Resolution, Pierre Néron, Andrew Tolmach, Eelco Visser, Guido Wachsmuth Jan 2015

A Theory Of Name Resolution, Pierre Néron, Andrew Tolmach, Eelco Visser, Guido Wachsmuth

Computer Science Faculty Publications and Presentations

We describe a language-independent theory for name binding and resolution, suitable for programming languages with complex scoping rules including both lexical scoping and modules. We formulate name resolution as a two-stage problem. First a language-independent scope graph is constructed using language-specific rules from an abstract syntax tree. Then references in the scope graph are resolved to corresponding declarations using a language-independent resolution process. We introduce a resolution calculus as a concise, declarative, and language- independent specification of name resolution. We develop a resolution algorithm that is sound and complete with respect to the calculus. Based on the resolution calculus we …


Multi-Label Segmentation Propagation For Materials Science Images Incorporating Topology And Interactivity, Jarrell Waggoner Jan 2013

Multi-Label Segmentation Propagation For Materials Science Images Incorporating Topology And Interactivity, Jarrell Waggoner

Theses and Dissertations

Segmentation propagation is the problem of transferring the segmentation of an image to a neighboring image in a sequence. This problem is of particular importance to materials science, where the accurate segmentation of a series of 2D serial-sectioned images of multiple, contiguous 3D structures has important applications. Such structures may have prior-known shape, appearance, and/or topology among the underlying structures which can be considered to improve segmentation accuracy. For example, some materials images may have structures with a specific shape or appearance in each serial section slice, which only changes minimally from slice to slice; and some materials may exhibit …


Front Burner Jul 2012

Front Burner

Syracuse University Magazine

No abstract provided.


Naked Object File System (Nofs): A Framework To Expose An Object-Oriented Domain Model As A File System, Joseph P. Kaylor, Konstantin Läufer, George K. Thiruvathukal Jan 2012

Naked Object File System (Nofs): A Framework To Expose An Object-Oriented Domain Model As A File System, Joseph P. Kaylor, Konstantin Läufer, George K. Thiruvathukal

Konstantin Läufer

We present Naked Objects File System (NOFS), a novel framework that allows a developer to expose a domain model as a file system by leveraging the Naked Objects design principle. NOFS allows a developer to construct a file system without having to understand or implement all details related to normal file systems development. In this paper we explore file systems frameworks and object-oriented frameworks in a historical context and present an example domain model using the framework. This paper is based on a fully-functional implementation that is distributed as free/open source software, including virtual machine images to demonstrate and study …