Case Study Of Scrum Methodology As Used By A Capstone Team, 2021 Portland State University
Case Study Of Scrum Methodology As Used By A Capstone Team, Lilly I. Yeaton
University Honors Theses
Scrum is widely used in the software industry to manage all kinds of projects. This case study examines the way in which a capstone team used the methodology and models the specific project management processes they used over the course of their project. These models and the process modifications therein are then compared to the team’s velocity at different points in the project. The results of this analysis suggest a correlation between asynchronous daily meetings and sprint reviews and improved velocity.
Examining Dimensions Of Patient Satisfaction With Telemedicine, 2021 DePaul University
Examining Dimensions Of Patient Satisfaction With Telemedicine, Robert Garcia
College of Computing and Digital Media Dissertations
During the outbreak of the novel coronavirus (COVID-19) medical institutions and practitioners have drastically increased their adoption of telemedicine. The proliferation of telemedicine systems has sparked renewed interest among IS researchers in evaluating its usage. One of the main indicators used to measure the success of telemedicine services is patient satisfaction. Yet several problems exist with current methods used to evaluate telemedicine satisfaction. Patient satisfaction with telemedicine is frequently evaluated using either single question items or handmade instruments that are seldom assessed for validity. While telemedicine satisfaction is typically evaluated through single measures, satisfaction is considered a complex and multidimensional ...
Identifying Optimal Course Structures Using Topic Models, 2021 Dartmouth College
Identifying Optimal Course Structures Using Topic Models, Tehut Tesfaye Biru
Dartmouth College Undergraduate Theses
This research project investigates whether there exists an optimal way to structure topics in educational course content that results in higher levels of engagement among students. It is implemented by fitting topic models to transcripts of educational videos contained in the Khan Academy platform. The fitted models were used to extract topic trajectories across time for each video and subsequently clustered based on whether they have similar “shapes”. The differences in mean engagement metrics per cluster suggest that some course shapes are more palatable to students regardless of subject matter. Additionally, the topic trajectories suggest a constant progression of topics ...
A Configurable Social Network For Running Irb-Approved Experiments, 2021 Dartmouth College
A Configurable Social Network For Running Irb-Approved Experiments, Mihovil Mandic
Dartmouth College Undergraduate Theses
Our world has never been more connected, and the size of the social media landscape draws a great deal of attention from academia. However, social networks are also a growing challenge for the Institutional Review Boards concerned with the subjects’ privacy. These networks contain a monumental variety of personal information of almost 4 billion people, allow for precise social profiling, and serve as a primary news source for many users. They are perfect environments for influence operations that are becoming difficult to defend against. Motivated to study online social influence via IRB-approved experiments, we designed and implemented a flexible, scalable ...
Pilltank, 2021 California Polytechnic State University, San Luis Obispo
Pilltank, Lucas Chang, Hayden Tam, Aaron Teh, Krista Round
Imagine an elderly family member, going through their daily routine of taking their pills. They find their pill box; however, they are having trouble identifying all the pills in there. Is there a name on the tablet? Can they read what it says? Do they just trust that the medication in their box is correct? How can they properly take care of themselves if they can not even confirm that what they are taking is the right medication? To combat this issue that many face, we present PillTank.
To decrease the risk of consuming the wrong medication, PillTank identifies the ...
Hierarchical Scheduling For Real-Time Periodic Tasks In Symmetric Multiprocessing, 2021 Chapman University
Hierarchical Scheduling For Real-Time Periodic Tasks In Symmetric Multiprocessing, Tom Springer, Peiyi Zhao
Engineering Faculty Articles and Research
In this paper, we present a new hierarchical scheduling framework for periodic tasks in symmetric multiprocessor (SMP) platforms. Partitioned and global scheduling are the two main approaches used by SMP based systems where global scheduling is recommended for overall performance and partitioned scheduling is recommended for hard real-time performance. Our approach combines both the global and partitioned approaches of traditional SMP-based schedulers to provide hard real-time performance guarantees for critical tasks and improved response times for soft real-time tasks. Implemented as part of VxWorks, the results are confirmed using a real-time benchmark application, where response times were improved for soft ...
Interpreting Attention-Based Models For Natural Language Processing, 2021 Dartmouth College
Interpreting Attention-Based Models For Natural Language Processing, Steven J. Signorelli Jr
Dartmouth College Undergraduate Theses
Large pre-trained language models (PLMs) such as BERT and XLNet have revolutionized the field of natural language processing (NLP). The interesting thing is that they are pre- trained through unsupervised tasks, so there is a natural curiosity as to what linguistic knowledge these models have learned from only unlabeled data. Fortunately, these models’ architectures are based on self-attention mechanisms, which are naturally interpretable. As such, there is a growing body of work that uses attention to gain insight as to what linguistic knowledge is possessed by these models. Most attention-focused studies use BERT as their subject, and consequently the field ...
Advancing The Ability To Predict Cognitive Decline And Alzheimer’S Disease Based On Genetic Variants Beyond Amyloid-Beta And Tau, 2021 San Jose State University
Advancing The Ability To Predict Cognitive Decline And Alzheimer’S Disease Based On Genetic Variants Beyond Amyloid-Beta And Tau, Naveen Rawat
A growing amount of neurodegenerative R&D is focused on identifying genomic- based explanations of AD that are beyond Amyloid-b and Tau. The proposed effort involves identifying some of the genomic variations, such as single nucleotide polymorphisms (SNPs), allele , chromosome, epigenetic contributors to MCI and AD that are beyond Aβ and Tau.
The project involves building a prediction model based on a support vector machine (SVM) classifier that takes into account the genomic variations and epigenetic factors to predict the early stage of mild cognitive impairment (MCI) and Alzheimer disease (AD). To achieve this, picking up important feature sets which ...
Prediction Of Financial Capacity Using Diffusion Compartment Imaging, 2021 San Jose State University
Prediction Of Financial Capacity Using Diffusion Compartment Imaging, Lok Yi Tai
Financial Capacity (FC) is the ability to manage one’s financial affairs, which is essential for autonomy and independence particularly for aging adults. Since dementia develops gradually, it is often difficult to detect the early signs that this cognitive dysfunction is developing This project aims to use Neurite orientation dispersion and density imaging (NODDI) to identify the white matter tracts that are associated with FC. Diffusion Tensor Images (DTI) and T1 Magnetic Resonance Images (MRI) of 18 Alzheimer’s Disease (AD) subjects, 47 Mild Cognitive Impaired (MCI) subjects, and 193 healthy control (CN) are compared to neuropsychological tests. Orientation Dispersion ...
Spaceflight And The Differential Gene Expression Of Human Stem Cell-Derived Cardiomyocytes, 2021 San Jose State University
Spaceflight And The Differential Gene Expression Of Human Stem Cell-Derived Cardiomyocytes, Eugenie Zhu
The National Aeronautics and Space Administration (NASA) has performed many experiments on the International Space Station (ISS) to further understand how conditions in space can affect life on Earth. This project analyzed GLDS-258, a gene set from NASA’s GeneLab repository which examines the impact of microgravity on human induced pluripotent stem-cell-derived cardiomyocytes (hiPSC-CMs). While many datasets have been run through NASA’s RNA-Seq Consensus Pipeline (RCP) to study differential gene expression in space, a Homo sapiens dataset has yet to be analyzed using the RCP. The aim of this project was to run the first Homo sapiens dataset, GLDS-258 ...
Higher-Order Link Prediction Using Node And Subgraph Embeddings, 2021 San Jose State University
Higher-Order Link Prediction Using Node And Subgraph Embeddings, Kalpnil Anjan
Social media, academia collaborations, e-commerce websites, biological structures, and other real-world networks are modeled as graphs to represent their entities and relationships in an abstract way. Such graphs are becoming more complex and informative, and by analyzing them we can solve various problems and find hidden insights. Some applications include predicting relationships and potential links between nodes, classifying nodes, and finding the most influential nodes in the graph, etc.
A large amount of research is being done in the field of predicting links between two nodes. However, predicting a future relationship among three or more nodes in a graph is ...
Wildfire Risk Prediction For A Smart City, 2021 San Jose State University
Wildfire Risk Prediction For A Smart City, Rekha Rani
Wildfires are uncontrolled fires that may lead to the destruction of biodiversity, soil fertility, and human resources. There is a need for timely detection and prediction of wildfires to minimize their disastrous effects. In this research, we propose a wildfire prediction model that relies on multi-criteria decision making (MCDM) to explicitly evaluates multiple conflicting criteria in decision making and weave the wildfire risks into the city’s resiliency plan. We incorporate fuzzy set theory to handle imprecision and uncertainties. In the process, we create a new data set that includes California cities’ weather, vegetation, topography, and population density records. The ...
Overlapping Community Detection In Social Networks, 2021 San Jose State University
Overlapping Community Detection In Social Networks, Akshar Panchal
Social networking sites are important to connect with the world virtually. As the number of users accessing these sites increase, the data and information keeps on increasing. There are communities and groups which are formed virtually based on different factors. We can visualize these communities as networks of users or nodes and the relationships or connections between them as edges. This helps in evaluating and analyzing different factors that influence community formation in such a dense network. Community detection helps in revealing certain characteristics which makes these groups in the network unique and different from one another. We can use ...
Fake News Analysis And Graph Classification On A Covid-19 Twitter Dataset, 2021 San Jose State University
Fake News Analysis And Graph Classification On A Covid-19 Twitter Dataset, Kriti Gupta
Earlier researches have showed that the spread of fake news through social media can have a huge impact to society and also to individuals in an extremely negative way. In this work we aim to study the spread of fake news compared to real news in a social network. We do that by performing classical social network analysis to discover various characteristics, and formulate the problem as a binary classification, where we have graphs modeling the spread of fake and real news. For our experiments we rely on how news are propagated through a popular social media services such as ...
Cyberbullying Classification Based On Social Network Analysis, 2021 San Jose State University
Cyberbullying Classification Based On Social Network Analysis, Anqi Wang
With the popularity of social media platforms such as Facebook, Twitter, and Instagram, people widely share their opinions and comments over the Internet. Exten- sive use of social media has also caused a lot of problems. A representative problem is Cyberbullying, which is a serious social problem, mostly among teenagers. Cyber- bullying occurs when a social media user posts aggressive words or phrases to harass other users, and that leads to negatively affects on their mental and social well-being. Additionally, it may ruin the reputation of that media. We are considering the problem of detecting posts that are aggressive. Moreover ...
Knowing What We Know: Leveraging Community Knowledge Through Automated Text-Mining, 2021 Rochester Institute of Technology
Knowing What We Know: Leveraging Community Knowledge Through Automated Text-Mining, Justin Gardner, Jonathan Tory Toole, Hemant Kalia, Garry Spink Jr., Gordon Broderick
Advances in Clinical Medical Research and Healthcare Delivery
No abstract provided.
2vt: Visions, Technologies, And Visions Of Technologies For Understanding Human Scale Spaces, 2021 University of Oulu
2vt: Visions, Technologies, And Visions Of Technologies For Understanding Human Scale Spaces, Ville Paanen, Piia Markkanen, Jonas Oppenlaender, Haider Akmal, Lik Hang Lee, Ava Fatah Gen Schieck, John Dunham, Konstantinos Papangelis, Nicolas Lalone, Niels Van Berkel, Jorge Goncalves, Simo Hosio
Presentations and other scholarship
Spatial experience is an important subject in various fields, and in HCI it has been mostly investigated in the urban scale. Research on human scale spaces has focused mostly on the personal meaning or aesthetic and embodied experiences in the space. Further, spatial experience is increasingly topical in envisioning how to build and interact with technologies in our everyday lived environments, particularly in so-called smart cities. This workshop brings researchers and practitioners from diverse fields to collaboratively discover new ways to understand and capture human scale spatial experience and envision its implications to future technological and creative developments in our ...
Analyses And Creation Of Author Stylized Text, 2021 Dartmouth College
Analyses And Creation Of Author Stylized Text, Keith Carlson
Dartmouth College Ph.D Dissertations
Written text is one of the major ways that humans communicate their thoughts. A single thought can be expressed through many different combinations of words, and the writer must choose which they will use. We call the idea which is communicated the content of the message, and the particular words chosen to express the content, the style. The same content expressed in a different style may tell something useful about the author of the text (e.g., the author's identity), may be easier to understand for different audiences, or may evoke different emotions in the reader.
In this work ...
Standard Non-Uniform Noise Dataset, 2021 Utah State University
Standard Non-Uniform Noise Dataset, Andres Imperial, John M. Edwards
Browse all Datasets
Fixed Pattern Noise Non-Uniformity Correction through K-Means Clustering
Fixed pattern noise removal from imagery by software correction is a practical approach compared to a physical hardware correction because it allows for correction post-capture of the imagery. Fixed pattern noise presents a unique challenge for de-noising techniques as the noise does not present itself where large number statistics are effective. Traditional noise removal techniques such as blurring or despeckling produce poor correction results because of a lack of noise identification. Other correction methods developed for fixed pattern noise can often present another problem of misidentification of noise. This problem can result ...
Software-Based Side Channel Attacks And The Future Of Hardened Microarchitecture, 2021 Liberty University
Software-Based Side Channel Attacks And The Future Of Hardened Microarchitecture, Nathaniel Hatfield
Senior Honors Theses
Side channel attack vectors found in microarchitecture of computing devices expose systems to potentially system-level breaches. This thesis consists of a comprehensive report on current exploits of this nature, describing their fundamental basis and usage, paving the way to further research into hardware mitigations that may be utilized to combat these and future vulnerabilities. It will discuss several modern software-based side channel attacks, describing the mechanisms they utilize to gain access to privileged information. Attack vectors will be exemplified, along with applicability to various architectures utilized in modern computing. Finally, discussion of how future architectural changes must successfully harden chips ...