Software Jimenae Allows Efficient Dynamic Simulations Of Boolean Networks, Centrality And System State Analysis,
2023
Biozentrum der Universität Würzburg
Software Jimenae Allows Efficient Dynamic Simulations Of Boolean Networks, Centrality And System State Analysis, Martin Kaltdorf, Tim Breitenbach, Stefan Karl, Maximilian Fuchs, David Komla Kessie, Eric Psota, Martina Prelog, Edita Sarukhanyan, Regina Ebert, Franz Jakob, Gudrun Dandekar, Muhammad Naseem, Chunguang Liang, Thomas Dandekar
All Works
The signal modelling framework JimenaE simulates dynamically Boolean networks. In contrast to SQUAD, there is systematic and not just heuristic calculation of all system states. These specific features are not present in CellNetAnalyzer and BoolNet. JimenaE is an expert extension of Jimena, with new optimized code, network conversion into different formats, rapid convergence both for system state calculation as well as for all three network centralities. It allows higher accuracy in determining network states and allows to dissect networks and identification of network control type and amount for each protein with high accuracy. Biological examples demonstrate this: (i) High plasticity …
Leveraging Aruco Fiducial Marker System For Bridge Displacement Estimation Using Unmanned Aerial Vehicles,
2023
University of Nebraska-Lincoln
Leveraging Aruco Fiducial Marker System For Bridge Displacement Estimation Using Unmanned Aerial Vehicles, Mohamed Aly
Computer Science and Engineering: Theses, Dissertations, and Student Research
The use of unmanned aerial vehicles (UAVs) in construction sites has been widely growing for surveying and inspection purposes. Their mobility and agility have enabled engineers to use UAVs in Structural Health Monitoring (SHM) applications to overcome the limitations of traditional approaches that require labor-intensive installation, extended time, and long-term maintenance. One of the critical applications of SHM is measuring bridge deflections during the bridge operation period. Due to the complex remote sites of bridges, remote sensing techniques, such as camera-equipped drones, can facilitate measuring bridge deflections. This work takes a step to build a pipeline using the state-of-the-art computer …
A Generative Neural Network For Discovering Near Optimaldynamic Inductive Power Transfer Systems,
2023
Utah State University
A Generative Neural Network For Discovering Near Optimaldynamic Inductive Power Transfer Systems, Md Shain Shahid Chowdhury Oni
All Graduate Theses and Dissertations
An urgent need is to electrify transportation to lower carbon emissions into the atmosphere. Wireless charging makes electrical vehicles (EVs) more convenient and cheaper because energy is transferred to the vehicle without the need to plug it in. Dynamic wireless charging is particularly interesting, where the vehicle does not need to stop to receive the energy. This technology requires the EV and the roadway to include coils of wire, where the roadway coil is energized as the vehicle passes over it to induce an electrical current in the EV coil through electromagnetic induction. However, the problem of designing the two …
Rethinking Integrated Computer Science Instruction: A Cross-Context And Expansive Approach In Elementary Classrooms,
2023
Utah State University
Rethinking Integrated Computer Science Instruction: A Cross-Context And Expansive Approach In Elementary Classrooms, Umar Shehzad, Jody E. Clarke-Midura, Kimberly Beck, Jessica F. Shumway, Mimi M. Recker
Publications
This study examines how a rural-serving school district aimed to provide elementary level computer science (CS) by offering instruction during students’ computer lab, a class taught by paraprofessional educators with limited background in computing. As part of a research practice partnership, cross-context mathematics and CS lessons were co-designed to expansively frame and highlight connections across – as opposed to integration within – the two subjects. Findings indicate that the paraprofessionals teaching the lessons generally reported positive experiences and understanding of content; however, those less comfortable with the content reported lower student interest. Further, most students who engaged with the lessons …
Analyzing Syntactic Constructs Of Java Programs With Machine Learning,
2023
Munster Technological University, Department Computer Science, Cork, Ireland; University of Oviedo, Computer Science Department, c/Federico Garcia Lorca 18, 33007, Oviedo, Spain
Analyzing Syntactic Constructs Of Java Programs With Machine Learning, Francisco Ortin, Guillermo Facundo, Miguel Garcia
Department of Computer Science Publications
The massive number of open-source projects in public repositories has notably increased in the last years. Such repositories represent valuable information to be mined for different purposes, such as documenting recurrent syntactic constructs, analyzing the particular constructs used by experts and beginners, using them to teach programming and to detect bad programming practices, and building programming tools such as decompilers, Integrated Development Environments or Intelligent Tutoring Systems. An inherent problem of source code is that its syntactic information is represented with tree structures, while traditional machine learning algorithms use -dimensional datasets. Therefore, we present a feature engineering process to translate …
Using Object Detection To Navigate A Game Playfield,
2023
Marquette University
Using Object Detection To Navigate A Game Playfield, Peter Kearnan Hyde-Smith
Master's Theses (2009 -)
Perhaps the crown jewel of AI is the self-navigating agent. To take many sources of data as input and use it to traverse complex and varied areas while mitigating risk and damage to the vehicle that is being controlled, visual object detection is a key part of the overall suite of this technology. While much efforts are being put towards real-world applications, for example self-driving cars, healthcare related issues and automated manufacturing, we apply object detection in a different way; the automation of movement across a video game play field. We take the TensorFlow Object Detection API and use it …
A Package Of Smartphone And Sensor-Based Objective Measurement Tools For Physical And Social Exertional Activities For Patients With Illness-Limiting Capacities,
2023
Marquette University
A Package Of Smartphone And Sensor-Based Objective Measurement Tools For Physical And Social Exertional Activities For Patients With Illness-Limiting Capacities, Arafat Mahmood
Dissertations (1934 -)
Patients with several incompletely diagnosed and understood chronic diseases suffer from symptoms that limit their functional capacity. In particular, patients with chronic fatigue syndrome/myalgic encephalomyelitis (CFS/ME) and long covid syndromes have variable fatigue, malaise, poor and unrefreshing sleep, and delayed post-exertional exacerbations of these symptoms. There are no specific tests for these patients to diagnose their diseases properly. These patients must be aware of their daily activities and energy expenditure. Even a little physical effort or socially extroverted behavior can make them tired and incapable of continuing their daily routine. A comprehensive summary of the measured activities at any particular …
Attenuated Skeletal Muscle Metabolism Explains Blunted Reactive Hyperemia After Prolonged Sitting,
2023
University of Nebraska at Omaha
Attenuated Skeletal Muscle Metabolism Explains Blunted Reactive Hyperemia After Prolonged Sitting, Cody Anderson, Elizabeth Pekas, Michael Allen, Song-Young Park
UNO Student Research and Creative Activity Fair
Introduction: Although reduced post-occlusive reactive hyperemia (PORH) after prolonged sitting (PS) has been reported as impaired microvascular function, no specific mechanism(s) have been elucidated. One potential mechanism, independent of microvascular function, is that an altered muscle metabolic rate (MMR) may change the magnitude of PORH by modifying the oxygen deficit achieved during cuff-induced arterial occlusions. We speculated that if MMR changes during PS, this may invalidate current inferences about microvascular function during PS. Objective: Therefore, the objective of this study was to examine if peripheral leg MMR changes during PS and to ascertain whether the change in the oxygen deficit …
Healthcare Facilities: Maintaining Accessibility While Implementing Security,
2023
University of Nebraska at Omaha
Healthcare Facilities: Maintaining Accessibility While Implementing Security, Ryan Vilter
UNO Student Research and Creative Activity Fair
In the wake of the Tulsa, Oklahoma hospital shooting in the summer of 2022, it was made clear that more security needed to be implemented in healthcare facilities. As a result, I inquired: What is the happy balance for healthcare facilities to maintain their accessibility to the public while also implementing security measures to prevent terrorist attacks? With that base, I give recommendations in the areas of cybersecurity, physical infrastructure, and physical and mental health, based off the existing literature and data gathered from terrorist attacks against hospitals over several decades.
Time Evolution Is A Source Of Bias In The Wolf Algorithm For Largest Lyapunov Exponents,
2023
University of Nebraska at Omaha
Time Evolution Is A Source Of Bias In The Wolf Algorithm For Largest Lyapunov Exponents, Kolby Brink, Tyler Wiles, Nicholas Stergiou, Aaron Likens
UNO Student Research and Creative Activity Fair
Human movement is inherently variable by nature. One of the most common analytical tools for assessing movement variability is the largest Lyapunov exponent (LyE) which quantifies the rate of trajectory divergence or convergence in an n-dimensional state space. One popular method for assessing LyE is the Wolf algorithm. Many studies have investigated how Wolf’s calculation of the LyE changes due to sampling frequency, filtering, data normalization, and stride normalization. However, a surprisingly understudied parameter needed for LyE computation is evolution time. The purpose of this study is to investigate how the LyE changes as a function of evolution time …
The Rise And Risks Of Internet Of Things,
2023
Christopher Newport University
The Rise And Risks Of Internet Of Things, Diamond E. Hicks
Cybersecurity Undergraduate Research
Internet of Things (IoT) has become a necessary part of our everyday lives. IoT is the network in which many different devices communicate, connect, and share data. Though how IoT got to where it is today, the issues it faced, and how it affects our lives today is not common knowledge. Despite the fact that IoT has advanced our technology to what it is today, people do not completely understand what it does.
Multipath Tcp, And New Packet Scheduling Method,
2023
University of Minnesota, Morris
Multipath Tcp, And New Packet Scheduling Method, Cole N. Maxwell
Scholarly Horizons: University of Minnesota, Morris Undergraduate Journal
Today many devices contain hardware to transmit data across the internet via cellular, WiFi, and wired connections. Many of these devices communicate by using a protocol known as Transmission Control Protocol (TCP). TCP was developed when network resources were expensive, and it was rare for a typical network-aware device to have more than one connection to a network. An extension to TCP known as Multipath TCP (MPTCP) was developed to leverage the multiple network connections to which devices now have access. While the MPTCP extension has been successful in its goal of using multiple network connections to send data simultaneously, …
Using Probabilistic Context-Free Grammar To Create Password Guessing Models,
2023
University of Minnesota - Morris
Using Probabilistic Context-Free Grammar To Create Password Guessing Models, Isabelle Hjelden
Scholarly Horizons: University of Minnesota, Morris Undergraduate Journal
This paper will discuss two versions of probabilistic context-free grammar password-guessing models. The first model focuses on using English semantics to break down passwords and identify patterns. The second model identifies repeating chunks in passwords and uses this information to create possible passwords. Then, we will show the performance of each model on leaked password databases, and finally discuss the observations made on these tests.
Exploring Methods Used In Face Swapping,
2023
University of Minnesota, Morris
Exploring Methods Used In Face Swapping, Joshua Eklund
Scholarly Horizons: University of Minnesota, Morris Undergraduate Journal
Face swapping involves replacing the face in one image (the target) with a face in a different image (the source) while maintaining the pose and expression of the target face. Previous methods of face swapping required extensive computer power and man hours. As such, new methods are being developed that are quicker, less resource intensive, and more accessible to the non-expert. This paper provides background information on key methods used for face swapping and outlines three recently developed approaches: one based on generative adversarial networks, one based on linear 3D morphable models, and one based on encoder-decoders.
Applications Of Generative Adversarial Networks In Single Image Datasets,
2023
University of Minnesota, Morris
Applications Of Generative Adversarial Networks In Single Image Datasets, Dylan E. Cramer
Scholarly Horizons: University of Minnesota, Morris Undergraduate Journal
One of the main difficulties faced in most generative machine learning models is how much data is required to train it, especially when collecting a large dataset is not feasible. Recently there have been breakthroughs in tackling this issue in SinGAN, with its researchers being able to train a Generative Adversarial Network (GAN) on just a single image with a model that can perform many novel tasks, such as image harmonization. ConSinGAN is a model that builds upon this work by concurrently training several stages in a sequential multi-stage manner while retaining the ability to perform those novel tasks.
Stellar Atmosphere Models For Select Veritas Stellar Intensity Interferometry Targets,
2023
Embry-Riddle Aeronautical University
Stellar Atmosphere Models For Select Veritas Stellar Intensity Interferometry Targets, Jackson Ladd Sackrider, Jason P. Aufdenberg, Katelyn Sonnen
Beyond: Undergraduate Research Journal
Since 2020 the Very Energetic Radiation Imaging Telescope Array System (VERITAS) has observed 48 stellar targets using the technique of Stellar Intensity Interferometry (SII). Angular diameter measurements by VERITAS SII (VSII) in a waveband near 400 nm complement existing angular diameter measurements in the near-infrared. VSII observations will test fundamental predictions of stellar atmosphere models and should be more sensitive to limb darkening and gravity darkening effects than measurements in the near-IR, however, the magnitude of this difference has not been systematically explored in the literature. In order to investigate the synthetic interferometric (as well as spectroscopic) appearance of stars …
Deep Vulman: A Deep Reinforcement Learning-Enabled Cyber Vulnerability Management Framework,
2023
Army Cyber Institute, U.S. Military Academy
Deep Vulman: A Deep Reinforcement Learning-Enabled Cyber Vulnerability Management Framework, Soumyadeep Hore, Ankit Shah, Nathaniel D. Bastian
ACI Journal Articles
Cyber vulnerability management is a critical function of a cybersecurity operations center (CSOC) that helps protect organizations against cyber-attacks on their computer and network systems. Adversaries hold an asymmetric advantage over the CSOC, as the number of deficiencies in these systems is increasing at a significantly higher rate compared to the expansion rate of the security teams to mitigate them. The current approaches in cyber vulnerability management are deterministic and one-time decision-making methods, which do not consider future uncertainties when prioritizing and selecting vulnerabilities for mitigation. These approaches are also constrained by the sub-optimal distribution of resources, providing no flexibility …
The Vehicle Routing Problem With Simultaneous Pickup And Delivery And Occasional Drivers,
2023
Singapore Management University
The Vehicle Routing Problem With Simultaneous Pickup And Delivery And Occasional Drivers, Vincent F. Yu, Grace Aloina, Panca Jodiawan, Aldy Gunawan, Tsung-C. Huang
Research Collection School Of Computing and Information Systems
This research addresses the Vehicle Routing Problem with Simultaneous Pickup and Delivery and Occasional Drivers (VRPSPDOD), which is inspired from the importance of addressing product returns and the emerging notion of involving available crowds to perform pickup and delivery activities in exchange for some compensation. At the depot, a set of regular vehicles is available to deliver and/or pick up customers’ goods. A set of occasional drivers, each defined by their origin, destination, and flexibility, is also able to help serve the customers. The objective of VRPSPDOD is to minimize the total traveling cost of operating regular vehicles and total …
Specification-Based Autonomous Driving System Testing,
2023
Singapore Management University
Specification-Based Autonomous Driving System Testing, Yuan Zhou, Yang Sun, Yun Tang, Yuqi Chen, Jun Sun, Christopher M. Poskitt, Yang Liu, Zijiang Yang
Research Collection School Of Computing and Information Systems
Autonomous vehicle (AV) systems must be comprehensively tested and evaluated before they can be deployed. High-fidelity simulators such as CARLA or LGSVL allow this to be done safely in very realistic and highly customizable environments. Existing testing approaches, however, fail to test simulated AVs systematically, as they focus on specific scenarios and oracles (e.g., lane following scenario with the "no collision" requirement) and lack any coverage criteria measures. In this paper, we propose AVUnit, a framework for systematically testing AV systems against customizable correctness specifications. Designed modularly to support different simulators, AVUnit consists of two new languages for specifying dynamic …
Large-Scale Identification And Analysis Of Factors Impacting Simple Bug Resolution Times In Open Source Software Repositories,
2023
Chapman University
Large-Scale Identification And Analysis Of Factors Impacting Simple Bug Resolution Times In Open Source Software Repositories, Elia Eiroa-Lledo, Rao Hamza Ali, Gabriela Pinto, Jillian Anderson, Erik Linstead
Engineering Faculty Articles and Research
One of the most prominent issues the ever-growing open-source software community faces is the abundance of buggy code. Well-established version control systems and repository hosting services such as GitHub and Maven provide a checks-and-balances structure to minimize the amount of buggy code introduced. Although these platforms are effective in mitigating the problem, it still remains. To further the efforts toward a more effective and quicker response to bugs, we must understand the factors that affect the time it takes to fix one. We apply a custom traversal algorithm to commits made for open source repositories to determine when “simple stupid …
