Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 691 - 720 of 57924

Full-Text Articles in Physical Sciences and Mathematics

Formalization Of A Security Framework Design For A Health Prescription Assistant In An Internet Of Things System, Thomas Rolando Mellema May 2024

Formalization Of A Security Framework Design For A Health Prescription Assistant In An Internet Of Things System, Thomas Rolando Mellema

Electronic Theses and Dissertations

Security system design flaws will create greater risks and repercussions as the systems being secured further integrate into our daily life. One such application example is incorporating the powerful potential of the concept of the Internet of Things (IoT) into software services engineered for improving the practices of monitoring and prescribing effective healthcare to patients. A study was performed in this application area in order to specify a security system design for a Health Prescription Assistant (HPA) that operated with medical IoT (mIoT) devices in a healthcare environment. Although the efficiency of this system was measured, little was presented to …


Exploring Graph Neural Networks In Reinforcement Learning: A Comparative Study On Architectures For Locomotion Tasks, Gaukhar Nurbek May 2024

Exploring Graph Neural Networks In Reinforcement Learning: A Comparative Study On Architectures For Locomotion Tasks, Gaukhar Nurbek

Theses and Dissertations

Deep Reinforcement learning (DRL) has gained importance in optimizing control policies, while Graph Neural Networks (GNNs) offer a robust approach for modeling complex relationships within systems represented as graphs. This thesis investigates the integration of DRL and GNNs to optimize control policies for robotic tasks, with a focus on locomotion. It compares static and dynamic GNN architectures for control policy predictions, revealing their strengths and limitations in adapting to locomotion predictions. The study assesses the impact of model structure complexity on GNNs' predictive capabilities, showcasing how intricate model structure can maximize GNNs' potential in capturing spatial and relational dependencies when …


Advancing Sentiment Analysis Through Emotionally-Agnostic Text Mining In Large Language Models (Llms), Jay Ratican, James Hutson May 2024

Advancing Sentiment Analysis Through Emotionally-Agnostic Text Mining In Large Language Models (Llms), Jay Ratican, James Hutson

Faculty Scholarship

The conventional methodology for sentiment analysis within large language models (LLMs) has predominantly drawn upon human emotional frameworks, incorporating physiological cues that are inherently absent in text-only communication. This research proposes a paradigm shift towards an emotionallyagnostic approach to sentiment analysis in LLMs, which concentrates on purely textual expressions of sentiment, circumventing the confounding effects of human physiological responses. The aim is to refine sentiment analysis algorithms to discern and generate emotionally congruent responses strictly from text-based cues. This study presents a comprehensive framework for an emotionally-agnostic sentiment analysis model that systematically excludes physiological indicators whilst maintaining the analytical depth …


Learning, Optimizing, And Simulating Fermions With Quantum Computers, Andrew Zhao May 2024

Learning, Optimizing, And Simulating Fermions With Quantum Computers, Andrew Zhao

Physics & Astronomy ETDs

Fermions are fundamental particles which obey seemingly bizarre quantum-mechanical principles, yet constitute all the ordinary matter that we inhabit. As such, their study is heavily motivated from both fundamental and practical incentives. In this dissertation, we will explore how the tools of quantum information and computation can assist us on both of these fronts. We primarily do so through the task of partial state learning: tomographic protocols for acquiring a reduced, but sufficient, classical description of a quantum system. Developing fast methods for partial tomography addresses a critical bottleneck in quantum simulation algorithms, which is a particularly pressing issue for …


Enabling And Optimizing Multi-Modal Sense-Making For Human-Ai Interaction Tasks, Dulanga Kaveesha Weerakoon Weerakoon Mudiyanselage May 2024

Enabling And Optimizing Multi-Modal Sense-Making For Human-Ai Interaction Tasks, Dulanga Kaveesha Weerakoon Weerakoon Mudiyanselage

Dissertations and Theses Collection (Open Access)

The rapid pace of adoption of mixed-reality in tandem with advances in NLP and computer vision have opened up unprecedented opportunities for more naturalistic interaction interfaces which underpin Human-AI collaborative applications such as spatial computing and interactive conversational agents. One notable example is the emergence of interactive virtual assistants, which facilitate more natural communication of instructions and queries through modalities like voice and text. This trend is driving the development of innovative ubiquitous, mixed-reality computing applications. Such interactive, natural communication is also critical to support advances in human-robot interactive co-working, across a variety of industrial, commercial and home environments. Conventional …


Enabling Criticality-Aware Optimized Machine Perception At The Edge, Ila Nitin Gokarn May 2024

Enabling Criticality-Aware Optimized Machine Perception At The Edge, Ila Nitin Gokarn

Dissertations and Theses Collection (Open Access)

Cyber-physical systems and applications have fundamentally changed people and processes in the way they interact with the physical world, ushering in the fourth industrial revolution. Supported by a variety of sensors, hardware platforms, artificial intelligence and machine learning models, and systems frameworks, CPS applications aim to automate and ease the burden of repetitive, laborious, or unsafe tasks borne by humans. Machine visual perception, encompassing tasks such as object detection, object tracking and activity analysis, is a key technical enabler of such CPS applications. Efficient execution of such machine vision perception tasks on resource-constrained edge devices, especially in terms of ensuring …


Improving The Performance Of Wi-Fi Indoor Localization In Both Dense And Unknown Environments, Quang Truong Hai May 2024

Improving The Performance Of Wi-Fi Indoor Localization In Both Dense And Unknown Environments, Quang Truong Hai

Dissertations and Theses Collection (Open Access)

Indoor localization is important for various pervasive applications, garnering considerable research attention over recent decades. Despite numerous proposed solutions, the practical application of these methods in real-world environments with high applicability remains challenging. One compelling use case for building owners is the ability to track individuals as they navigate through the building, whether for security, customer analytics, space utilization planning, or other management purposes. However, this task becomes exceedingly difficult in environments with hundreds or thousands of people in motion. Conversely, the need to track oneself’s location is also meaningful from the perspective of individuals traversing in crowded spaces. These …


Genetic Algorithm Optimization Of Experiment Design For Targeted Uncertainty Reduction, Alexander Amedeo Depillis May 2024

Genetic Algorithm Optimization Of Experiment Design For Targeted Uncertainty Reduction, Alexander Amedeo Depillis

Masters Theses

Nuclear cross sections are a set of parameters that capture probability information about various nuclear reactions. Nuclear cross section data must be experimentally measured, and this results in simulations with nuclear data-induced uncertainties on simulation outputs. This nuclear data-induced uncertainty on most parameters of interest can be reduced by adjusting the nuclear data based on the results from an experiment. Integral nuclear experiments are experiments where the results are related to many different cross sections. Nuclear data may be adjusted to have less uncertainty by adjusting them to match the results obtained from integral experiments. Different integral experiments will adjust …


Advancing Compact Modeling Of Electronic Devices: Machine Learning Approaches With Neural Networks, Mixture Density Networks, And Deep Symbolic Regression, Jack Robert Hutchins May 2024

Advancing Compact Modeling Of Electronic Devices: Machine Learning Approaches With Neural Networks, Mixture Density Networks, And Deep Symbolic Regression, Jack Robert Hutchins

Masters Theses

This thesis pioneers the integration of deep learning techniques into the realm of compact modeling, presenting three distinct approaches that enhance the precision, efficiency, and adaptability of compact models for electronic devices. The first method introduces a Generalized Multilayer Perception Compact Model, leveraging the function approximation capabilities of neural networks through a multilayer perception (MLP) framework. This approach utilizes hyperband tuning to optimize network hyperparameters, demonstrating its effectiveness on a HfOx memristor and establishing a versatile modeling strategy for both single-state and multistate devices.

The second approach explores the application of Mixture Density Networks (MDNs) to encapsulate the inherent stochasticity …


Understanding Student Experiences With Tls Client Authentication, Clay A. Shubert May 2024

Understanding Student Experiences With Tls Client Authentication, Clay A. Shubert

Masters Theses

This thesis presents a comprehensive investigation into student experiences with TLS client authentication, highlighting the usability challenges and learning curves associated with this long term key managament system. We designed a study that required future innovators in technology and security to use modern-day implementations of this certificate-based authentication system. From this study, we analyzed server logs, project reports, and survey responses from students enrolled in the applied cryptography course. We revealed significant hurdles in the initial setup and long-term key management of credentials used in TLS client authentication, emphasizing the gap between theoretical knowledge and practical implementation skills. Through quantitative …


Evaluation Of An End-To-End Radiotherapy Treatment Planning Pipeline For Prostate Cancer, Mohammad Daniel El Basha, Court Laurence, Carlos Eduardo Cardenas, Julianne Pollard-Larkin, Steven Frank, David T. Fuentes, Falk Poenisch, Zhiqian H. Yu May 2024

Evaluation Of An End-To-End Radiotherapy Treatment Planning Pipeline For Prostate Cancer, Mohammad Daniel El Basha, Court Laurence, Carlos Eduardo Cardenas, Julianne Pollard-Larkin, Steven Frank, David T. Fuentes, Falk Poenisch, Zhiqian H. Yu

Dissertations & Theses (Open Access)

Radiation treatment planning is a crucial and time-intensive process in radiation therapy. This planning involves carefully designing a treatment regimen tailored to a patient’s specific condition, including the type, location, and size of the tumor with reference to surrounding healthy tissues. For prostate cancer, this tumor may be either local, locally advanced with extracapsular involvement, or extend into the pelvic lymph node chain. Automating essential parts of this process would allow for the rapid development of effective treatment plans and better plan optimization to enhance tumor control for better outcomes.

The first objective of this work, to automate the treatment …


Artificial Intelligence's Ability To Detect Online Predators, Olatilewa Osifeso May 2024

Artificial Intelligence's Ability To Detect Online Predators, Olatilewa Osifeso

Electronic Theses, Projects, and Dissertations

Online child predators pose a danger to children who use the Internet. Children fall victim to online predators at an alarming rate, based on the data from the National Center of Missing and Exploited Children. When making online profiles and joining websites, you only need a name, an email and a password without identity verification. Studies have shown that online predators use a variety of methods and tools to manipulate and exploit children, such as blackmail, coercion, flattery, and deception. These issues have created an opportunity for skilled online predators to have fewer obstacles when it comes to contacting and …


Leveraging Blockchain Technology To Revamp The Vehicle Electrification Journey: Perspectives Of Accountability And Economic Circularity, Eva Escobar Brown May 2024

Leveraging Blockchain Technology To Revamp The Vehicle Electrification Journey: Perspectives Of Accountability And Economic Circularity, Eva Escobar Brown

Electronic Theses, Projects, and Dissertations

The automotive industry is undergoing a significant transition accelerated by global emission regulations for a phase out of internal combustion engines (ICEs) and a transition toward the adoption of electric vehicles (EVs). While regulatory measures and incentivized adoption for EVs presents opportunities for reducing emissions and promoting sustainability, it also poses complex challenges. The EV industry faces potential production challenges, particularly in the sourcing, manufacturing, and lifecycle management of critical minerals and raw materials for electric vehicle batteries (EVBs). With a heavy reliance on a steady and diversified supply of critical minerals such as lithium, cobalt and rare earth elements, …


Crash Detecting System Using Deep Learning, Yogesh Reddy Muddam May 2024

Crash Detecting System Using Deep Learning, Yogesh Reddy Muddam

Electronic Theses, Projects, and Dissertations

Accidents pose a significant risk to both individual and property safety, requiring effective detection and response systems. This work introduces an accident detection system using a convolutional neural network (CNN), which provides an impressive accuracy of 86.40%. Trained on diverse data sets of images and videos from various online sources, the model exhibits complex accident detection and classification and is known for its prowess in image classification and visualization.

CNN ensures better accident detection in various scenarios and road conditions. This example shows its adaptability to a real-world accident scenario and enhances its effectiveness in detecting early events. A key …


Multi-Script Handwriting Identification By Fragmenting Strokes, Joshua Jude Thomas May 2024

Multi-Script Handwriting Identification By Fragmenting Strokes, Joshua Jude Thomas

<strong> Theses and Dissertations </strong>

This study tests the effectiveness of Multi-Script Handwriting Identification after simplifying character strokes, by segmenting them into sub-parts. Character simplification is performed through splitting the character by branching-points and end-points, a process called stroke fragmentation in this study. The resulting sub-parts of the character are called stroke fragments and are evaluated individually to identify the writer. This process shares similarities with the concept of stroke decomposition in Optical Character Recognition which attempts to recognize characters through the writing strokes that make them up. The main idea of this study is that the characters of different writing‑scripts (English, Chinese, etc.) may …


Exploring The Relationship Between Anxiety And Virtual Reality Sickness, David Wesley Woolverton May 2024

Exploring The Relationship Between Anxiety And Virtual Reality Sickness, David Wesley Woolverton

<strong> Theses and Dissertations </strong>

As virtual reality (VR) becomes more commonly used in education, it is important to understand the technology’s weakness and mitigate any potential negative effects on student success. One adverse side-effect of VR use is simulation-induced motion sickness, known in the context of VR as VR sickness. Previous research by Howard and Van Zandt (2021) found that possessing a phobia had a significant positive correlation with VR sickness, but only if the phobia is triggered by the simulation, suggesting that symptoms are actually connected to the anxiety the phobia induces. This study explored the hypothesized correlation between anxiety and VR sickness, …


Examining Outcomes Of Privacy Risk And Brand Trust On The Adoption Of Consumer Smart Devices, Marianne C. Loes May 2024

Examining Outcomes Of Privacy Risk And Brand Trust On The Adoption Of Consumer Smart Devices, Marianne C. Loes

<strong> Theses and Dissertations </strong>

With more connected devices on earth than there are people, Internet of Things (IoT) is arguably just as innovative as the original introduction of the Internet. Though much of the research on technology acceptance and adoption has been conducted in organizational settings, the consumer use of IoT technologies, such as smart devices, is becoming a fertile field of research. The merger of these research streams is especially relevant from a societal perspective as smart devices become more embedded in consumer’s daily lives, particularly with the introduction of the “meta verse.” While original technology acceptance research is limited to two system-specific …


Next-Generation Crop Monitoring Technologies: Case Studies About Edge Image Processing For Crop Monitoring And Soil Water Property Modeling Via Above-Ground Sensors, Nipuna Chamara May 2024

Next-Generation Crop Monitoring Technologies: Case Studies About Edge Image Processing For Crop Monitoring And Soil Water Property Modeling Via Above-Ground Sensors, Nipuna Chamara

Dissertations and Doctoral Documents from University of Nebraska-Lincoln, 2023–

Artificial Intelligence (AI) has advanced rapidly in the past two decades. Internet of Things (IoT) technology has advanced rapidly during the last decade. Merging these two technologies has immense potential in several industries, including agriculture.

We have identified several research gaps in utilizing IoT technology in agriculture. One problem was the digital divide between rural, unconnected, or limited connected areas and urban areas for utilizing images for decision-making, which has advanced with the growth of AI. Another area for improvement was the farmers' demotivation to use in-situ soil moisture sensors for irrigation decision-making due to inherited installation difficulties. As Nebraska …


Asteroidal Sets And Dominating Targets In Graphs, Oleksiy Al-Saadi May 2024

Asteroidal Sets And Dominating Targets In Graphs, Oleksiy Al-Saadi

Dissertations and Doctoral Documents from University of Nebraska-Lincoln, 2023–

The focus of this Ph.D. thesis is on various distance and domination properties in graphs. In particular, we prove strong results about the interactions between asteroidal sets and dominating targets. Our results add to or extend a plethora of results on these properties within the literature. We define the class of strict dominating pair graphs and show structural and algorithmic properties of this class. Notably, we prove that such graphs have diameter 3, 4, or contain an asteroidal quadruple. Then, we design an algorithm to to efficiently recognize chordal hereditary dominating pair graphs. We provide new results that describe the …


Aggregate Games: Computations And Applications, Jared Soundy May 2024

Aggregate Games: Computations And Applications, Jared Soundy

Dissertations and Doctoral Documents from University of Nebraska-Lincoln, 2023–

Existing computational game theory studies consider compact representations of games that capture agent interaction in real-world environments and examine computation aspects of computing equilibrium concepts to analyze or predict agent behavior.

One of the most well-studied representations that capture many commonly studied real-world environments is aggregate games. Aggregate games, first systematically studied by Nobel laureate Reinhard Selten, have various applications in modeling the decision-making interdependence of agents, where each agent’s utility function depends on their own actions and the aggregations or summarizations of the actions of all agents. These applications include Cournot oligopoly competition, public good contribution, and voting, where …


From Bits To Beds: Design And Implementation Of A Hotel Booking System A Coding Project, Alexa Gilman May 2024

From Bits To Beds: Design And Implementation Of A Hotel Booking System A Coding Project, Alexa Gilman

University Honors College

This thesis presents a comprehensive hotel booking system designed and implemented to showcase the transition "From Bits to Beds". There are two main motivations behind this project: firstly, to provide users with a user-friendly and efficient platform for booking accommodations. Secondly, it serves as a great learning opportunity, providing hands-on practice with coding, collaboration with teammates, and exposure to real-world challenges. The system utilizes technologies such as JavaScript, Express.js, and HTML/CSS to offer features like browsing hotels, filtering options, user authentication, and booking management. The implementation of this project demonstrates a successful integration of backend and frontend components, ensuring reliability …


Sustainable Accounting: The Benefits And Challenges Of Its Implementation, Collin Eckstein May 2024

Sustainable Accounting: The Benefits And Challenges Of Its Implementation, Collin Eckstein

University Honors College

This thesis is centered around the idea that sustainability is a necessary component within the world. Environmental, social, and governance (ESG) factors are key components of analyzing sustainable practices. Although accountants have historically focused on financial reporting, they now have the added function of sustainable accounting as environmental implications are an area of concern for companies. A substantial component of this thesis centers around analyzing how ESG factors contribute to an organization’s financial performance. It also observes how comprehensive sustainability reports impact investor decisions and examines the challenges that auditors face when providing assurance for sustainability initiatives. Furthermore, it examines …


The Effects Of Using Machine Translators On The Performance Of Second Language Learners, Kasey Myer May 2024

The Effects Of Using Machine Translators On The Performance Of Second Language Learners, Kasey Myer

University Honors College

With the rise of technology has also come the development of various online language translators and artificial intelligence that are often utilized by individuals learning a second language. However, there is a wide range of quality between the different machine translation tools, and many people tend to be under the impression that it is inferior to the quality of interpretations provided by human translators. This paper considers the positives and negatives of machine translation as a tool for second language learning. Variations between the input and output languages on a grammatical and cultural level are analyzed. Machine translation is compared …


Ai: Is The Future Robots?, Ruthanne Fischer May 2024

Ai: Is The Future Robots?, Ruthanne Fischer

University Honors College

The goal of this thesis is to analyze how Artificial Intelligence is actively changing. The newly developed technology that is known as Artificial Intelligence can potentially have implications that are not yet known. Artificial Intelligence impacts the business world in many ways. Things such as ChatGPT and Deepfakes are some of the biggest forms of Artificial Intelligence today. It is important to know how Artificial Intelligence is changing every day because no one knows the true implications of a technology like this. It is crucial for companies to understand how this technology can potentially be harmful to their employees. Artificial …


Cybervictimization And Depression: A Cultural Standpoint, Paige Heagy May 2024

Cybervictimization And Depression: A Cultural Standpoint, Paige Heagy

University Honors College

The author’s aim was to investigate the relationship between cybervictimization and depression, as well as using peer attachment and culture as moderators by giving questionnaires to 1347 participants (age range = 11-15 years) from India and the United States. Through four questionnaires, adolescents reported their levels of endorsement in either individualism or collectivism culture, levels of cybervictimization, levels of depression/depressive symptoms, and their levels of peer attachment. Adolescents reported that there is a significantly positive correlation between cybervictimization and depression. Differences were found according to culture and peer attachment, as well. Cybervictimization has begun to erupt worldwide as internet usage …


In-Between Frame Generation For 2d Animation Using Generative Adversarial Networks, Francisco Arriaga Pazos May 2024

In-Between Frame Generation For 2d Animation Using Generative Adversarial Networks, Francisco Arriaga Pazos

Open Access Theses & Dissertations

Traditional 2D animation remains a largely manual process where each frame in a video is hand-drawn, as no robust algorithmic solutions exist to assist in this process. This project introduces a system that generates intermediate frames in an uncolored 2D animated video sequence using Generative Adversarial Networks (GAN), a deep learning approach widely used for tasks within the creative realm. We treat the task as a frame interpolation problem, and show that adding a GAN dynamic to a system significantly improves the perceptual fidelity of the generated images, as measured by perceptual oriented metrics that aim to capture human judgment …


Monero: Powering Anonymous Digital Currency Transactions, Jake Braddy May 2024

Monero: Powering Anonymous Digital Currency Transactions, Jake Braddy

Theses/Capstones/Creative Projects

Cryptocurrencies rely on a distributed public ledger (record of transactions) in order to perform their intended functions. However, the public’s ability to audit the network is both its greatest strength and greatest weakness: Anyone can see what address sent currency, and to whom the currency was sent. If cryptocurrency is ever going to take some of the responsibility of fiat currency, then there needs to be a certain level of confidentiality. Thus far, Monero has come out on top as the preferred currency for embodying the ideas of privacy and confidentiality. Through numerous cryptographic procedures, Monero is able to obfuscate …


Creating Interpretable Deep Learning Models To Identify Species Using Environmental Dna Sequences, Samuel Waggoner May 2024

Creating Interpretable Deep Learning Models To Identify Species Using Environmental Dna Sequences, Samuel Waggoner

Honors College

This research aims to develop an interpretable and fast machine learning (ML) model for identifying species using environmental DNA (eDNA). eDNA is a technique used to detect the presence or absence of species in an ecosystem by analyzing the DNA that animals naturally leave behind in water or soil. However, there can be millions of sequences to classify and the reference databases are sizeable, so traditional methods such as BLAST are slow. Convolutional neural networks (CNNs) have been shown to be 150 times faster at classifying sequences. In this work, we create a CNN that achieves 92.5% accuracy, surpassing the …


Murmurations And Root Numbers, Alexey Pozdnyakov May 2024

Murmurations And Root Numbers, Alexey Pozdnyakov

University Scholar Projects

We report on a machine learning investigation of large datasets of elliptic curves and L-functions. This leads to the discovery of murmurations, an unexpected correlation between the root numbers and Dirichlet coefficients of L-functions. We provide a formal definition of murmurations, describe the connection with 1-level density, and provide three examples for which the murmuration phenomenon has been rigorously proven. Using our understanding of murmurations, we then build new machine learning models in search of a polynomial time algorithm for predicting root numbers. Based on our models and several heuristic arguments, we conclude that it is unlikely for …


Side Channel Detection Of Pc Rootkits Using Nonlinear Phase Space, Rebecca Clark May 2024

Side Channel Detection Of Pc Rootkits Using Nonlinear Phase Space, Rebecca Clark

Poster Presentations

Cyberattacks are increasing in size and scope yearly, and the most effective and common means of attack is through malicious software executed on target devices of interest. Malware threats vary widely in terms of behavior and impact and, thus, effective methods of detection are constantly being sought from the academic research community to offset both volume and complexity. Rootkits are malware that represent a highly feared threat because they can change operating system integrity and alter otherwise normally functioning software. Although normal methods of detection that are based on signatures of known malware code are the standard line of defense, …