Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Computer Sciences (431)
- Mathematics (121)
- Social and Behavioral Sciences (66)
- Education (59)
- Engineering (49)
-
- Databases and Information Systems (42)
- Software Engineering (42)
- Library and Information Science (37)
- Theory and Algorithms (32)
- OS and Networks (31)
- Business (28)
- Computer Engineering (26)
- Artificial Intelligence and Robotics (23)
- Other Computer Sciences (23)
- Programming Languages and Compilers (23)
- Science and Mathematics Education (22)
- Graphics and Human Computer Interfaces (21)
- Data Science (20)
- Information Security (20)
- Systems Architecture (20)
- Numerical Analysis and Scientific Computing (18)
- Collection Development and Management (17)
- Management Information Systems (16)
- Arts and Humanities (14)
- Higher Education (13)
- Electrical and Computer Engineering (11)
- Data Storage Systems (9)
- Life Sciences (9)
- Computer and Systems Architecture (8)
- Institution
-
- Indian Statistical Institute (102)
- Selected Works (75)
- Loyola University Chicago (44)
- Nova Southeastern University (32)
- University of Rhode Island (29)
-
- City University of New York (CUNY) (24)
- Old Dominion University (17)
- Edith Cowan University (13)
- Portland State University (13)
- Brigham Young University (12)
- University of Texas Rio Grande Valley (9)
- Bryant University (8)
- University of Richmond (8)
- Kennesaw State University (7)
- Wright State University (7)
- University of the Pacific (6)
- Utah State University (6)
- Louisiana Tech University (5)
- Rhode Island College (5)
- Singapore Management University (5)
- Technological University Dublin (5)
- Bowling Green State University (4)
- Claremont Colleges (4)
- The University of Akron (4)
- University of Dayton (4)
- University of South Carolina (4)
- Dartmouth College (3)
- Marquette University (3)
- Syracuse University (3)
- The University of Maine (3)
- Publication Year
- Publication
-
- Doctoral Theses (102)
- Computer Science: Faculty Publications and Other Works (44)
- CCE Theses and Dissertations (32)
- George K. Thiruvathukal (28)
- Library Impact Statements (23)
-
- Open Educational Resources (23)
- Computer Science Faculty Publications (18)
- Theses and Dissertations (16)
- Konstantin Läufer (12)
- Theses: Doctorates and Masters (11)
- Herbert J. Mattord (10)
- Honors Projects (9)
- Dissertations and Theses (8)
- Browse all Theses and Dissertations (7)
- Theses and Dissertations - UTB/UTPA (7)
- Computer Science Faculty Publications and Presentations (6)
- Faculty and Research Publications (6)
- Ronald Greenberg (6)
- Collection Development Reports and Documents (5)
- Doctoral Dissertations (5)
- Electronic Theses and Dissertations (5)
- Dissertations (4)
- The Rock (4)
- Williams Honors College, Honors Research Projects (4)
- All Graduate Plan B and other Reports, Spring 1920 to Spring 2023 (3)
- Amanda Izenstark (3)
- Bookshelf (3)
- Department of Math & Statistics Technical Report Series (3)
- Honors College Theses (3)
- Honors Theses (3)
- Publication Type
Articles 31 - 60 of 559
Full-Text Articles in Physical Sciences and Mathematics
Constructions And Analyses Of Efficient Symmetric-Key Primitives For Authentication And Encryption., Sebati Ghosh Dr.
Constructions And Analyses Of Efficient Symmetric-Key Primitives For Authentication And Encryption., Sebati Ghosh Dr.
Doctoral Theses
In symmetric key cryptography there are two fundamental objectives, viz. 1. confidentiality or secrecy of message from unexpected party and 2. authentication of message which includes authenticating the source of the message as well as integrity of the message against any unwanted modification. Let us first concentrate on confidentiality. In classical symmetric key cryptography two parties, say Alice and Bob, first secretly exchange a key-pair (e, d). Later, if Alice wishes to send a secret message m ∈ M to Bob, she computes c = Ee(m) and transmits c to Bob. Upon receiving c, Bob computes Dd(c) = m and …
Morphological Network: Network With Morphological Neurons., Ranjan Mondal Dr.
Morphological Network: Network With Morphological Neurons., Ranjan Mondal Dr.
Doctoral Theses
Image processing with traditional approaches mainly use the tools of linear systems. However, linear approaches are not well suited and may even fail to solve problems involving geometrical aspects of the image. Thus, nonlinear geometric approaches like morphological operations are very popular in those cases. Morphological operations are nonlinear operations based on a set and lattice-theoretic methodology for image analysis that are capable of describing the geometrical structure of image objects quantitatively. It is suitable for various problems in image processing, computer vision, and pattern recognition. While solving problems with morphology, a particular structuring element is defined. Structuring elements have …
"Design For Co-Design" In A Computer Science Curriculum Research-Practice Partnership, Victor R. Lee, Jody Clarke-Midura, Jessica F. Shumway, Mimi Recker
"Design For Co-Design" In A Computer Science Curriculum Research-Practice Partnership, Victor R. Lee, Jody Clarke-Midura, Jessica F. Shumway, Mimi Recker
Publications
This paper reports on a study of the dynamics of a Research-Practice Partnership (RPP) oriented around design, specifically the co-design model. The RPP is focused on supporting elementary school computer science (CS) instruction by involving paraprofessional educators and teachers in curricular co-design. A problem of practice addressed is that few elementary educators have backgrounds in teaching CS and have limited available instructional time and budget for CS. The co-design strategy entailed highlighting CS concepts in the mathematics curriculum during classroom instruction and designing computer lab lessons that explored related ideas through programming. Analyses focused on tensions within RPP interaction dynamics …
Mining The Soma Cube For Gems: Isomorphic Subgraphs Reveal Equivalence Classes, Edward Vogel, My Tram
Mining The Soma Cube For Gems: Isomorphic Subgraphs Reveal Equivalence Classes, Edward Vogel, My Tram
Journal of Humanistic Mathematics
Soma cubes are an example of a dissection puzzle, where an object is broken down into pieces, which must then be reassembled to form either the original shape or some new design. In this paper, we present some interesting discoveries regarding the Soma Cube. Equivalence classes form aesthetically pleasing shapes in the solution set of the puzzle. These gems are identified by subgraph isomorphisms using SNAP!/Edgy, a simple block-based computer programming language. Our preliminary findings offer several opportunities for researchers from middle school to undergraduate to utilize graphs, group theory, topology, and computer science to discover connections between computation and …
Computing Well-Structured Subgraphs In Geometric Intersection Graphs., Satyabrata Jana Dr.
Computing Well-Structured Subgraphs In Geometric Intersection Graphs., Satyabrata Jana Dr.
Doctoral Theses
For a set of geometric objects, the associative geometric intersection graph is the graph with a vertex for each object and an edge between two vertices if and only if the corresponding objects intersect. Geometric intersection graphs are very important due to their theoretical properties and applicability. Based on the different geometric objects, several types of geometric intersection graphs are defined. Given a graph G, an induced (either vertex or edge) subgraph H ⊆ G is said to be an well-structured subgraph if H satisfies certain properties among the vertices in H. This thesis studies some well-structured subgraphs finding problems …
Temporal Sentiment Mapping System For Time-Synchronized Data, Jiachen Ma
Temporal Sentiment Mapping System For Time-Synchronized Data, Jiachen Ma
Dissertations (1934 -)
Temporal sentiment labels are used in various multimedia studies. They are useful for numerous classification and detection tasks such as video tagging, segmentation, and labeling. However, generating a large-scale sentiment dataset through manual labeling is usually expensive and challenging. Some recent studies explored the possibility of using online Time-Sync Comments (TSCs) as the primary source of their sentiment maps. Although the approach has positive results, existing TSCs datasets are limited in scale and content categories. Guidelines for generating such data within a constrained budget are yet to be developed and discussed. This dissertation tries to address the above issues by …
Understanding User Perceptions Of Voice Personal Assistants, Ha Young Kim
Understanding User Perceptions Of Voice Personal Assistants, Ha Young Kim
All Theses
As the artificial intelligence (AI) technique improves, voice assistant (smart speaker) such as Amazon Alexa and Google Assistant are quickly, surely permeating into people's daily lives. With its powerful and convenient benefits and the circumstances that people started to stay at their home longer due to the pandemic, reliance on smart speakers has increased rapidly. But at the same time, concerns of security on smart speakers have increased.
In this thesis, we conducted an online user survey of smart speaker users with five different perspectives – 1) Users’ engagement with privacy policy; 2) Awareness of different policy requirements defined by …
Simulating Polistes Dominulus Nest-Building Heuristics With Deterministic And Markovian Properties, Benjamin Pottinger
Simulating Polistes Dominulus Nest-Building Heuristics With Deterministic And Markovian Properties, Benjamin Pottinger
Undergraduate Honors Theses
European Paper Wasps (Polistes dominula) are social insects that build round, symmetrical nests. Current models indicate that these wasps develop colonies by following simple heuristics based on nest stimuli. Computer simulations can model wasp behavior to imitate natural nest building. This research investigated various building heuristics through a novel Markov-based simulation. The simulation used a hexagonal grid to build cells based on the building rule supplied to the agent. Nest data was compared with natural data and through visual inspection. Larger nests were found to be less compact for the rules simulated.
Efficient Handover Mechanisms For Heterogeneous Networks., Shankar Kumar Ghosh Dr.
Efficient Handover Mechanisms For Heterogeneous Networks., Shankar Kumar Ghosh Dr.
Doctoral Theses
In this thesis, some analytical frameworks have been developed to analyze the effect of different system parameters on handover performances in heterogeneous network (HetNet) and based on such frameworks, some efficient handover algorithms have been proposed. The study starts with an analytical framework to investigate the effect of resource allocation mechanisms, upper layer mobility management protocols (MMPs) and handover decision metrics on user perceived throughput. This analysis reveals that among other factors, handover decision metric plays a crucial role in determining user perceived throughput in HetNet. Subsequently, we develop two handover decision metrics for ultra dense networks (UDN) and unlicensed …
Einstein-Roscoe Regression For The Slag Viscosity Prediction Problem In Steelmaking, Hiroto Saigo, Dukka Kc, Noritaka Saito
Einstein-Roscoe Regression For The Slag Viscosity Prediction Problem In Steelmaking, Hiroto Saigo, Dukka Kc, Noritaka Saito
Michigan Tech Publications
In classical machine learning, regressors are trained without attempting to gain insight into the mechanism connecting inputs and outputs. Natural sciences, however, are interested in finding a robust interpretable function for the target phenomenon, that can return predictions even outside of the training domains. This paper focuses on viscosity prediction problem in steelmaking, and proposes Einstein-Roscoe regression (ERR), which learns the coefficients of the Einstein-Roscoe equation, and is able to extrapolate to unseen domains. Besides, it is often the case in the natural sciences that some measurements are unavailable or expensive than the others due to physical constraints. To this …
Cook-It!: A Web Application For Easy Meal Planning, Carol Juneau
Cook-It!: A Web Application For Easy Meal Planning, Carol Juneau
Senior Theses
Cook-it! is a web application for meal planning based on the Django framework and deployed on the Heroku platform. This application has an intuitive interface to make it easy to use. The project has been developed over two semesters, roughly separated into a planning phase and an implementation phase. Cook-it! incorporates a robust feature set and an attractive design. Its core purpose is to make it easy for users to plan meals, interact with other users, and keep track of user information such as a grocery list.
Zero-Knowledge Proof, Deniability And Their Applications In Blockchain, E-Voting And Deniable Secret Handshake Protocols., Somnath Panja Dr.
Zero-Knowledge Proof, Deniability And Their Applications In Blockchain, E-Voting And Deniable Secret Handshake Protocols., Somnath Panja Dr.
Doctoral Theses
In this thesis, we propose a cryptographic technique for an authenticated, end-to-end verifiable and secret ballot election. Currently, almost all verifiable e-voting systems require trusted authorities to perform the tallying process except for the DRE-i and DRE-ip systems. We have shown a weaknesses in the DRE-ip system and proposed a solution. We have modified the DRE-ip system so that no adversary can create and post a valid ballot on the public bulletin board without detection. We provide security proofs to prove the security properties of the proposed scheme. We propose two methods to store these ballots using blockchain and cloud …
Online Masters In Data Science, Joanna Burkhardt
Online Masters In Data Science, Joanna Burkhardt
Library Impact Statements
No abstract provided.
Data Analytics And Visualization Dsp 562, Harrison Dekker
Data Analytics And Visualization Dsp 562, Harrison Dekker
Collection Development Reports and Documents
No abstract provided.
Advanced Topics In Machine Learning Dsp 566, Harrison Dekker
Advanced Topics In Machine Learning Dsp 566, Harrison Dekker
Collection Development Reports and Documents
No abstract provided.
Advanced Database Concepts, Cloud Computing And Big Data Dsp 567, Harrison Dekker
Advanced Database Concepts, Cloud Computing And Big Data Dsp 567, Harrison Dekker
Collection Development Reports and Documents
No abstract provided.
Introduction To Statistical Computing Dsp 565, Harrison Dekker
Introduction To Statistical Computing Dsp 565, Harrison Dekker
Collection Development Reports and Documents
No abstract provided.
Applications Of Data Science In Biological Science Dsp 569, Harrison Dekker
Applications Of Data Science In Biological Science Dsp 569, Harrison Dekker
Collection Development Reports and Documents
No abstract provided.
Many-Objective Evolutionary Algorithms: Objective Reduction, Decomposition And Multi-Modality., Monalisa Pal Dr.
Many-Objective Evolutionary Algorithms: Objective Reduction, Decomposition And Multi-Modality., Monalisa Pal Dr.
Doctoral Theses
Evolutionary Algorithms (EAs) for Many-Objective Optimization (MaOO) problems are challenging in nature due to the requirement of large population size, difficulty in maintaining the selection pressure towards global optima and inability of accurate visualization of high-dimensional Pareto-optimal Set (in decision space) and Pareto-Front (in objective space). The quality of the estimated set of Pareto-optimal solutions, resulting from the EAs for MaOO problems, is assessed in terms of proximity to the true surface (convergence) and uniformity and coverage of the estimated set over the true surface (diversity). With more number of objectives, the challenges become more profound. Thus, better strategies have …
Mathematical Formulations For Complex Resource Scheduling Problems., T. R. Lalita Dr.
Mathematical Formulations For Complex Resource Scheduling Problems., T. R. Lalita Dr.
Doctoral Theses
This thesis deals with development of effective models for large scale real-world resource scheduling problems. Efficient utilization of resources is crucial for any organization or industry as resources are often scarce. Scheduling them in an optimal way can not only take care of the scarcity but has potential economic benefits. Optimal utilization of resources reduces costs and thereby provides a competitive edge in the business world. Resources can be of different types such as human (personnel-skilled and unskilled), financial(budgets), materials, infrastructures(airports and seaports with designed facilities, windmills, warehouses’ area, hotel rooms etc) and equipment (microprocessors, cranes, machinery, aircraft simulators for …
On Class Imbalanced Learning:Design Of Non-Parametricclassifiers, Performance Indices, And Deep Oversampling Strategies., Sankha Mullick Dr.
On Class Imbalanced Learning:Design Of Non-Parametricclassifiers, Performance Indices, And Deep Oversampling Strategies., Sankha Mullick Dr.
Doctoral Theses
The relevance of classification is almost endless in the everyday application of machine learning. However, the performance of a classifier is only limited to the fulfillment of the inherent assumptions it makes about the training examples. For example, to facilitate unbiased learning a classifier is expected to be trained with an equal number of labeled data instances from all of the classes. However, in a large number of practical applications such as anomaly detection, semantic segmentation, disease prediction, etc. it may not be possible to gather an equal number of diverse training points for all the classes. This results in …
Optimal Eavesdropping In Quantum Cryptography, Atanu Acharyya Dr.
Optimal Eavesdropping In Quantum Cryptography, Atanu Acharyya Dr.
Doctoral Theses
Quantum key distribution (QKD) has raised some promise for more secured communication than its classical counterpart. It allows the legitimate parties to detect eavesdropping which introduces error in the channel. If disturbed, there are ways to distill a secure key within some threshold error-rate. The amount of information gained by an attacker is generally quantified by (Shannon) mutual information. Knowing the maximum amount of information that an intruder can gain is important for post-processing purposes, and we mainly focus on that side in the thesis. Renyi information is also useful especially when post-processing is considered. The scope of this thesis …
Factors Affecting Student Educational Choices Regarding Oer Material In Computer Science, Anastasia Angelopoulou, Rania Hodhod, Alfredo J. Perez
Factors Affecting Student Educational Choices Regarding Oer Material In Computer Science, Anastasia Angelopoulou, Rania Hodhod, Alfredo J. Perez
Computer Science Faculty Publications
The use of Open Educational Resources (OER) in course settings provides a solution to reduce the textbook barrier. Several published studies have concluded that high textbook costs may influence students' educational choices. However, there are other student characteristics that may be relevant to OER. In this work, we study various factors that may influence students' educational choices regarding OER and their impact on a student’s perspectives on OER use and quality. More specifically, we investigate whether there are significant differences in the frequency of use and perceived quality of the OER textbook based on gender, prior academic achievements, income, seniority, …
Computer-Based Scaffolding In Computer Science Education, Rebecca Trinh, Simone Levy
Computer-Based Scaffolding In Computer Science Education, Rebecca Trinh, Simone Levy
Summer REU Program
No abstract provided.
Utilization Of Virtual Reality For General Education Purposes, Amit Lal
Utilization Of Virtual Reality For General Education Purposes, Amit Lal
University of the Pacific Theses and Dissertations
The use of Virtual Reality (VR) in a variety of professional, military, governmental, and educational fields has continued to expand over the past several decades, and the recent Covid-19 pandemic has brought attention to this field. This study surveys 154 college students over 23 questions that include various demographics that can be used to look for discriminators, multiple-choice VR-related questions, as well as a few free-form questions about use of VR in learning environments. The students’ experience with, interest in, and thoughts on how to best use VR vary considerably. The Covid-19 pandemic is found to have limited impact thus …
The Dsa Toolkit Shines Light Into Dark And Stormy Archives, Shawn Morgan Jones, Himarsha R. Jayanetti, Alex Osborne, Paul Koerbin, Klein Martin, Michele C. Weigle, Michael L. Nelson
The Dsa Toolkit Shines Light Into Dark And Stormy Archives, Shawn Morgan Jones, Himarsha R. Jayanetti, Alex Osborne, Paul Koerbin, Klein Martin, Michele C. Weigle, Michael L. Nelson
Computer Science Faculty Publications
Web archive collections are created with a particular purpose in mind. A curator selects seeds, or original resources, which are then captured by an archiving system and stored as archived web pages, or mementos. The systems that build web archive collections are often configured to revisit the same original resource multiple times. This is incredibly useful for understanding an unfolding news story or the evolution of an organization. Unfortunately, over time, some of these original resources can go off-topic and no longer suit the purpose for which the collection was originally created. They can go off-topic due to web site …
Secret Sharing And Its Variants, Matroids,Combinatorics., Shion Samadder Chaudhury Dr.
Secret Sharing And Its Variants, Matroids,Combinatorics., Shion Samadder Chaudhury Dr.
Doctoral Theses
The main focus of this thesis is secret sharing. Secret Sharing is a very basic and fundamental cryptographic primitive. It is a method to share a secret by a dealer among different parties in such a way that only certain predetermined subsets of parties can together reconstruct the secret while some of the remaining subsets of parties can have no information about the secret. Secret sharing was introduced independently by Shamir [139] and Blakely [20]. What they introduced is called a threshold secret sharing scheme. In such a secret sharing scheme the subsets of parties that can reconstruct a secret …
Teaching Computer Science Csc 222, Harrison Dekker
Teaching Computer Science Csc 222, Harrison Dekker
Library Impact Statements
No abstract provided.
Messiness: Automating Iot Data Streaming Spatial Analysis, Christopher White, Atilio Barreda Ii
Messiness: Automating Iot Data Streaming Spatial Analysis, Christopher White, Atilio Barreda Ii
Publications and Research
The spaces we live in go through many transformations over the course of a year, a month, or a day; My room has seen tremendous clutter and pristine order within the span of a few hours. My goal is to discover patterns within my space and formulate an understanding of the changes that occur. This insight will provide actionable direction for maintaining a cleaner environment, as well as provide some information about the optimal times for productivity and energy preservation.
Using a Raspberry Pi, I will set up automated image capture in a room in my home. These images will …
Chicago Alliance For Equity In Computer Science, Steven Mcgee, Lucia Dettori, Ronald I. Greenberg, Andrew M. Rasmussen, Dale F. Reed, Don Yanek
Chicago Alliance For Equity In Computer Science, Steven Mcgee, Lucia Dettori, Ronald I. Greenberg, Andrew M. Rasmussen, Dale F. Reed, Don Yanek
Computer Science: Faculty Publications and Other Works
CAFECS is committed to ensuring that all students in Chicago participate in engaging, relevant, and rigorous computing experiences by addressing problems of practice through research and development that increases opportunities for all students to pursue computing pathways and prepares all students for the future of work.