Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

2017

Discipline
Institution
Keyword
Publication
Publication Type
File Type

Articles 2161 - 2190 of 12521

Full-Text Articles in Physical Sciences and Mathematics

The Effect Of Warming On Wind Speed And Potential Wind Power In Iceland, Alexei Smith Oct 2017

The Effect Of Warming On Wind Speed And Potential Wind Power In Iceland, Alexei Smith

Independent Study Project (ISP) Collection

Climate change is causing a shift in the temperature and pressure gradient between the Arctic and the Equator, with the Arctic warming at a faster rate than the Equator. This shift has the potential to alter the seasonal wind speeds in the Northern Hemisphere, which could in turn affect the wind power density potential. In this study, a wind model was created to predict future wind speeds and wind power density for 6 weather stations in Iceland. According to the model, winter wind speeds and wind power density potential will either stay the same or increase slightly (0 – 4%), …


Asean And The South China Sea: Approaches To Resolving The Conflict, Jennifer Jie Li Oct 2017

Asean And The South China Sea: Approaches To Resolving The Conflict, Jennifer Jie Li

Independent Study Project (ISP) Collection

In recent years, tensions have escalated between actors in the South China Sea, one of which is the Association for Southeast Asian Nations (ASEAN), the region’s primary intergovernmental organization. The purpose of this report is to determine the effectiveness of ASEAN in resolving the South China Sea disputes and to clarify how geopolitical factors have impacted the organization’s actions. Through an analysis of evolving maritime claims and the current state of affairs, this paper suggests that ASEAN must be involved in any attempt to resolve the conflict peacefully. Acknowledging the importance of the diplomatic channels that ASEAN has created to …


Bacteria Mitigation In Sponge Mariculture, Jambiani Zanzibar, Claire Johnston Oct 2017

Bacteria Mitigation In Sponge Mariculture, Jambiani Zanzibar, Claire Johnston

Independent Study Project (ISP) Collection

The declining seaweed industry coupled with efforts by the NGO Marine Cultures have led to the establishment of sponge mariculture in Jambiani, Zanzibar. However, growing cyanobacteria levels have substantially increased sponge mortality rates. In order to determine successful cyanobacteria mitigation treatments, six populations of farm ropes, support lines, and sponges were (a) untreated, (b) manually cleaned or submerged in solutions of (c) 2% hydrogen peroxide, (d) 4% hydrogen peroxide, (e) 50 g/L salt, or (f) 70 g/L salt. No conclusions were drawn from rope treatments, no techniques were effective for support line treatments, and both concentrations of hydrogen peroxide were …


Climate Change And Migration: The Intersection Of Climate Change, Migration, And Gender Through Policy, Bridget E. Mccallum Oct 2017

Climate Change And Migration: The Intersection Of Climate Change, Migration, And Gender Through Policy, Bridget E. Mccallum

Student Publications

This article explores the intersectional nature of the issue of climate change, especially as it relates to migration. Both migration and climate change are issues of global significance, with benefits and burdens distributed unevenly across gender, racial, and class lines. This intersectional approach takes note of the unequal power structures at play when attempting to combat these issues with policy.


Global Warming: Why Is There Debate?, Mackenzie E. Smith Oct 2017

Global Warming: Why Is There Debate?, Mackenzie E. Smith

Student Publications

Previous studies have produced conflicting results for the determining factors of acceptance or rejection of the science behind the global warming phenomenon; some cite religion as a hindrance to the acceptance of this scientific theory [Kilburn 2008], some conclude lack of education is the driving force [Brechin 2003], and some deduce that party affiliation plays the most significant role in determining belief in global warming. In this study, the National Election Survey of 2012 dataset, consisting of 5,916 individual data points from the United States of America, is analyzed to determine the effects of party affiliation on one’s belief in …


Spectral Characterization Of Cytochromes P450 Active Sites Using Nmr And Resonance Raman Spectroscopy, Remigio Usai Oct 2017

Spectral Characterization Of Cytochromes P450 Active Sites Using Nmr And Resonance Raman Spectroscopy, Remigio Usai

Dissertations (1934 -)

The Cytochrome P450 (P450s) has been the subject of intense research for over six decades. An efficient approach for isotopic labeling of the prosthetic group in heme proteins was exploited to produce an analogue of the soluble bacterial cytochrome P450cam (P450cam) that contains a 13C labeled-protoheme prosthetic group. HU227 strain of E. coli, which lacks the δ-aminolevulinic acid (δ-ALA) synthase gene, was employed in the heterologous expression of P450cam harboring a prosthetic group labeled with 13C at the Cm and Cα positions by growing cells in the presence of [5-13C] δ-ALA, which was synthesized in four steps from [2-13C] glycine. …


Agricultural Responses To Climate Change: A Study Of Adaptive Farming Methods In Kizanda Village, Bailey Smith-Helman Oct 2017

Agricultural Responses To Climate Change: A Study Of Adaptive Farming Methods In Kizanda Village, Bailey Smith-Helman

Independent Study Project (ISP) Collection

Agriculture is vital to the economic and social systems in Tanzania, composing 30% of the country’s GDP as well as 80% of employment (FAO, 2014). Despite agriculture’s important role, it remains one of the most vulnerable sectors to climate change. Current trends project global average temperature to increase by 0.8-2.6 degrees Celsius, leaving farmers to face changes in rainfall, soil quality, and new pests and diseases (IPCC, 2007). Farmers will be forced to adapt to the changing climate if they are to sustain their livelihoods and the Tanzanian economy. For these reasons, it is important to understand the types of …


A Critical Examination Of The Climate Change Vulnerability And Adaptation Literature In Nunavut, Canada, Sarah Prentice Oct 2017

A Critical Examination Of The Climate Change Vulnerability And Adaptation Literature In Nunavut, Canada, Sarah Prentice

Independent Study Project (ISP) Collection

This paper attempts to study the climate change vulnerability and adaptation literature in Nunavut, a province in the Canadian Arctic. The paper begins with a review of literature produced by Inuit organizations on colonization in the Canadian Arctic and Nunavut specifically, then systematically reviews the literature on climate change vulnerability and adaptation. Using a post-colonial analysis, this study found that while the climate change vulnerability and adaptation literature attempts to attend to colonial histories and legacies, it often falls short. Climate change vulnerability and adaptation literature had minimal representation of colonization, residential schooling, sanatoria, and Inuit Qaujimajatuqangit. This may perpetuate …


Shift In Icelandic Plant Populations Due To Climate Change: Through The Lens Of Natural Dyes, Molly Pluenneke Oct 2017

Shift In Icelandic Plant Populations Due To Climate Change: Through The Lens Of Natural Dyes, Molly Pluenneke

Independent Study Project (ISP) Collection

Northern residing plant species are at the highest risk for extinction due to temperature rise related to climate change (Schöb, Manuel, Choler & Veit, 2009). Climate change has also led to a northern shift in the geographic distribution of plant species (Parmesan & Yohe, 2003). This could lead to a necessary alteration in the way natural resources are utilized in arctic countries like Iceland (Lim-Camacho et al, 2017). The purpose of this study is to analyze the way in which Icelandic plant species used in natural dye practices may shift in distribution due to climate change and the potential impact …


A Validated Set Of Smells In Model-View-Controller Architectures, Maurício Aniche, Gabriele Bavota, Christoph Treude, Arie Van Deursen, Marco Aurélio Gerosa Oct 2017

A Validated Set Of Smells In Model-View-Controller Architectures, Maurício Aniche, Gabriele Bavota, Christoph Treude, Arie Van Deursen, Marco Aurélio Gerosa

Research Collection School Of Computing and Information Systems

Code smells are symptoms of poor design and implementation choices that may hinder code comprehension, and possibly increase change-and defect-proneness. A vast catalogue of smells has been defined in the literature, and it includes smells that can be found in any kind of system (e.g., God Classes), regardless of their architecture. On the other hand, software systems adopting specific architectures (e.g., the Model-View-Controller pattern) can be also affected by other types of poor practices. We surveyed and interviewed 53 MVC developers to collect bad practices to avoid while working on Web MVC applications. Then, we followed an open coding procedure …


Which Packages Would Be Affected By This Bug Report?, Qiao Huang, David Lo, Xin Xia, Qingye Wang, Shanping Li Oct 2017

Which Packages Would Be Affected By This Bug Report?, Qiao Huang, David Lo, Xin Xia, Qingye Wang, Shanping Li

Research Collection School Of Computing and Information Systems

A large project (e.g., Ubuntu) usually contains a large number of software packages. Sometimes the same bug report in such project would affect multiple packages, and developers of different packages need to collaborate with one another to fix the bug. Unfortunately, the total number of packages involved in a project like Ubuntu is relatively large, which makes it time-consuming to manually identify packages that are affected by a bug report. In this paper, we propose an approach named PkgRec that consists of 2 components: a name matching component and an ensemble learning component. In the name matching component, we assign …


Target Material Identification With Commodity Rfid Devices, Xinyi Li, Chao Feng, Nana Ding, Ju Wang, Jie Xiong, Yuhui Ren, Xiaojiang Chen, Dingyi Fang Oct 2017

Target Material Identification With Commodity Rfid Devices, Xinyi Li, Chao Feng, Nana Ding, Ju Wang, Jie Xiong, Yuhui Ren, Xiaojiang Chen, Dingyi Fang

Research Collection School Of Computing and Information Systems

Target material identification plays an important role in many reallife applications. This paper introduces a system that can identify the material type with cheap commercial off-the-shelf (COTS) RFID devices. The key intuition is that different materials cause different amounts of phase and RSS (Received Signal Strength) changes when radio frequency (RF) signal penetrates through the target. However, without knowing either material type, trying to obtain the information is challenging. We propose a method to address this challenge and evaluate the method's performance in real-world environment. The results show that we achieve higher than 94% material identification accuracies for 10 liquids …


Interactive Visual Analytics Application For Spatiotemporal Movement Data Vast Challenge 2017 Mini-Challenge 1: Award For Actionable And Detailed Analysis, Yifei Guan, Tin Seong Kam Oct 2017

Interactive Visual Analytics Application For Spatiotemporal Movement Data Vast Challenge 2017 Mini-Challenge 1: Award For Actionable And Detailed Analysis, Yifei Guan, Tin Seong Kam

Research Collection School Of Computing and Information Systems

The Visual Analytics Science and Technology (VAST) Challenge 2017 Mini-Challenge 1 dataset mirrored the challenging scenarios in analysing large spatiotemporal movement tracking datasets. The datasets provided contains a 13-month movement data generated by five types of sensors, for six types of vehicles passing through the Boonsong Lekagul Nature Preserve. We present an application developed with the market leading visualisation software Tableau to provide an interactive visual analysis of the multi-dimensional spatiotemporal datasets. Our interactive application allows the user to perform an interactive analysis to observe movement patterns, study vehicle trajectories and identify movement anomalies while allowing them to customise the …


Tensor Factorization For Low-Rank Tensor Completion, Pan Zhou, Canyi Lu, Zhouchen Lin, Chao Zhang Oct 2017

Tensor Factorization For Low-Rank Tensor Completion, Pan Zhou, Canyi Lu, Zhouchen Lin, Chao Zhang

Research Collection School Of Computing and Information Systems

Recently, a tensor nuclear norm (TNN) based method [1] was proposed to solve the tensor completion problem, which has achieved state-of-the-art performance on image and video inpainting tasks. However, it requires computing tensor singular value decomposition (t-SVD), which costs much computation and thus cannot efficiently handle tensor data, due to its natural large scale. Motivated by TNN, we propose a novel low-rank tensor factorization method for efficiently solving the 3-way tensor completion problem. Our method preserves the lowrank structure of a tensor by factorizing it into the product of two tensors of smaller sizes. In the optimization process, our method …


Neutrosophic Commutative N-Ideals In Bck-Algebras, Florentin Smarandache, Seok-Zun Song, Young Bae Jun Oct 2017

Neutrosophic Commutative N-Ideals In Bck-Algebras, Florentin Smarandache, Seok-Zun Song, Young Bae Jun

Branch Mathematics and Statistics Faculty and Staff Publications

The notion of a neutrosophic commutative N -ideal in BCK-algebras is introduced, and several properties are investigated. Relations between a neutrosophic N -ideal and a neutrosophic commutative N -ideal are discussed. Characterizations of a neutrosophic commutative N -ideal are considered.


On Negative Results When Using Sentiment Analysis Tools For Software Engineering Research, Robbert Jongeling, Proshanta Sarkar, Subhajit Datta, Alexander Serebrenik Oct 2017

On Negative Results When Using Sentiment Analysis Tools For Software Engineering Research, Robbert Jongeling, Proshanta Sarkar, Subhajit Datta, Alexander Serebrenik

Research Collection School Of Computing and Information Systems

Recent years have seen an increasing attention to social aspects of software engineering, including studies of emotions and sentiments experienced and expressed by the software developers. Most of these studies reuse existing sentiment analysis tools such as SentiStrength and NLTK. However, these tools have been trained on product reviews and movie reviews and, therefore, their results might not be applicable in the software engineering domain. In this paper we study whether the sentiment analysis tools agree with the sentiment recognized by human evaluators (as reported in an earlier study) as well as with each other. Furthermore, we evaluate the impact …


Benchmarking Single-Image Reflection Removal Algorithms, Renjie Wan, Boxin Shi, Ling-Yu Duan, Ah-Hwee Tan, Alex C. Kot Oct 2017

Benchmarking Single-Image Reflection Removal Algorithms, Renjie Wan, Boxin Shi, Ling-Yu Duan, Ah-Hwee Tan, Alex C. Kot

Research Collection School Of Computing and Information Systems

Removing undesired reflections from a photo taken in front of a glass is of great importance for enhancing the efficiency of visual computing systems. Various approaches have been proposed and shown to be visually plausible on small datasets collected by their authors. A quantitative comparison of existing approaches using the same dataset has never been conducted due to the lack of suitable benchmark data with ground truth. This paper presents the first captured Single-image Reflection Removal dataset `SIR 2 ' with 40 controlled and 100 wild scenes, ground truth of background and reflection. For each controlled scene, we further provide …


Design And Implementation Of An Enterprise Integrated Project Environment: Experience From An Information Systems Program, Swapna Gottipati, Venky Shankararaman Oct 2017

Design And Implementation Of An Enterprise Integrated Project Environment: Experience From An Information Systems Program, Swapna Gottipati, Venky Shankararaman

Research Collection School Of Computing and Information Systems

Real world information technology projects cut acrossmultiple business domains and processes, involve large amounts of data and anassortment of different technologies. Advancedcourses within an IS programs must include projects that help students gain aholistic view of an enterprise by exposing them to business domains,business processes and technical knowledge and skills that will help them design and deliver enterpriseprojects. In order to guide the instructor to effectively design and implementsuch enterprise project experiences, in this paper, we propose an enterpriseintegrated project environment (EIPE) framework based on business domains andbusiness processes. Additionally, we share our experience in implementing thisframework in the Data …


Aria A11y Analyzer: Helping Integrate Accessibility Into Websites, Jayashree Prabunathan Oct 2017

Aria A11y Analyzer: Helping Integrate Accessibility Into Websites, Jayashree Prabunathan

Master's Projects

Today, nearly 1 in 5 people have a disability that affects their daily life. These varied disabilities can include blindness, low vision or mobility impairments. When interacting with web content, users with such disabilities rely heavily on various assistive technologies, such as screen readers, keyboard, voice recognition software, etc. Here, assistive technologies are software applications or hardware devices that allows users with disabilities to interact with web and software applications. For instance, a screen reader is a software application that navigates through the page and speaks the content to users. Web accessibility is defined as the ability for assistive technology …


Measuring The Effectiveness Of Generic Malware Models, Naman Bagga Oct 2017

Measuring The Effectiveness Of Generic Malware Models, Naman Bagga

Master's Projects

Malware detection based on machine learning techniques is often treated as a problem specific to a particular malware family. In such cases, detection involves training and testing models for each malware family. This approach can generally achieve high accuracy, but it requires many classification steps, resulting in a slow, inefficient, and impractical process. In contrast, classifying samples as malware or be- nign based on a single model would be far more efficient. However, such an approach is extremely challenging—extracting common features from a variety of malware fam- ilies might result in a model that is too generic to be useful. …


Time-Efficient Hybrid Approach For Facial Expression Recognition, Roshni Velluva Puthanidam Oct 2017

Time-Efficient Hybrid Approach For Facial Expression Recognition, Roshni Velluva Puthanidam

Master's Projects

Facial expression recognition is an emerging research area for improving human and computer interaction. This research plays a significant role in the field of social communication, commercial enterprise, law enforcement, and other computer interactions. In this paper, we propose a time-efficient hybrid design for facial expression recognition, combining image pre-processing steps and different Convolutional Neural Network (CNN) structures providing better accuracy and greatly improved training time. We are predicting seven basic emotions of human faces: sadness, happiness, disgust, anger, fear, surprise and neutral. The model performs well regarding challenging facial expression recognition where the emotion expressed could be one of …


Improve And Implement An Open Source Question Answering System, Salil Shenoy Oct 2017

Improve And Implement An Open Source Question Answering System, Salil Shenoy

Master's Projects

A question answer system takes queries from the user in natural language and returns a short concise answer which best fits the response to the question. This report discusses the integration and implementation of question answer systems for English and Hindi as part of the open source search engine Yioop. We have implemented a question answer system for English and Hindi, keeping in mind users who use these languages as their primary language. The user should be able to query a set of documents and should get the answers in the same language. English and Hindi are very different when …


Distributions Of Polychaetes As A Function Of Sediment Composition In A Subtropical Lagoon, Anthony William Cox Oct 2017

Distributions Of Polychaetes As A Function Of Sediment Composition In A Subtropical Lagoon, Anthony William Cox

Theses and Dissertations

Fine-grained organic-rich sediments (FGORS) in the Indian River Lagoon (IRL), Florida, the human activities and nutrient inputs and have a varied composition, including water content, silt-clay content, and organic matter. When these constituents reach, by weight, 75%, 60% dry, and 10% dry, respectively, this is sometimes referred to as IRL “muck”. Many polychaetes inhabit the benthic sediments of estuaries and must tolerate various degrees of FGORS. The Cox IRL Muck Index (CMI) is proposed as a mechanism for determining the organic sediment tolerances of infaunal species in a simple and direct manner. IRL muck will have a minimum CMI of …


Community Management And Governance Of Comatsa-Sud New Protected Area (Ambalamanasy Ii Commune), Allison Tennant Oct 2017

Community Management And Governance Of Comatsa-Sud New Protected Area (Ambalamanasy Ii Commune), Allison Tennant

Independent Study Project (ISP) Collection

Community-based natural resource management is an increasingly more popular choice for governments to delegate power back to local communities to conserve the resources they rely on. In Madagascar, where much of the rural population provides for their livelihoods by using natural resources, this governance structure, in cooperation with delegated manager for assistance, presents an opportunity for economic development in cooperation with conservation efforts. This paper aims to better understand the role of community, NGO, and governmental actors in creating and executing community management structures. Through Participatory Rural Analysis and structured and semi-structured interviews, it explores what management transfers look like …


Survey Of Invasive Lantana Camara At Makirovana-Tsihomanaomby Forest Complex, Eliza Pessereau Oct 2017

Survey Of Invasive Lantana Camara At Makirovana-Tsihomanaomby Forest Complex, Eliza Pessereau

Independent Study Project (ISP) Collection

Lantana camara is a shrub known globally as an invasive pest that grows primarily in degraded areas. The species is known to exist at Makirovana-Tsihomanaomby, a forest complex in northeastern Madagascar with 167 endemic species of flora and fauna, several of which are on the IUCN Red List. The complex, specifically Tsihomanaomby forest, is used as a resource for the three rural communes that live on its outskirts, meaning that it experiences much human activity. The objective of this study was to survey the population of L. camara at two sites: one just outside of the Tsihomanaomby forest and one …


Exploring Rwanda's Continuing Education Capacity For Information Communications Technology (Ict) Skills, Li Keen Lim Oct 2017

Exploring Rwanda's Continuing Education Capacity For Information Communications Technology (Ict) Skills, Li Keen Lim

Independent Study Project (ISP) Collection

As Rwanda strives to become the ICT hub of the region, it will need to develop its greatest asset: its people, in ICT skills. This exploratory study used 30 semi-structured interviews, observation and secondary data from different sources, schools, students and NGOs, to answer a simple question: how does an everyday, working adult Rwandan learn new computers skills for a new computer age? This study found that a wide variety of suppliers fulfil different niches that give prospective students a range of prices, content, schedules, certification, practices, etc., and that demand is increasing for a host of different reasons. It …


Russia's Northern Rook: Nord Stream 2 On The European Energy Chessboard, David E. Wilson Oct 2017

Russia's Northern Rook: Nord Stream 2 On The European Energy Chessboard, David E. Wilson

Independent Study Project (ISP) Collection

The Nord Stream 2 pipeline proposes to connect Germany to the world’s largest natural gas reserves in Russia, allowing the state-owned Russian energy behemoth Gazprom to double its export capacity through the ‘Northern Corridor’ transit route to Europe. This project has been the subject of sharp disapproval from Central and Eastern European countries, as well as the United States, which fear the prospect of increasing dependence on gas imports from a Russia perceived as politically aggressive and unreliable. This paper will identify the geopolitical and geoeconomic implications involved in the construction of Nord Stream 2 by adopting a geostrategic worldview …


High-Order Relaxed Multirate Infinitesimal Step Methods For Multiphysics Applications, Jean Sexton Oct 2017

High-Order Relaxed Multirate Infinitesimal Step Methods For Multiphysics Applications, Jean Sexton

Mathematics Theses and Dissertations

In this work, we consider numerical methods for integrating multirate ordinary differential equations. We are interested in the development of new multirate methods with good stability properties and improved efficiency over existing methods. We discuss the development of multirate methods, particularly focusing on those that are based on Runge-Kutta theory. We introduce the theory of Generalized Additive Runge-Kutta methods proposed by Sandu and Günther. We also introduce the theory of Recursive Flux Splitting Multirate Methods with Sub-cycling described by Schlegel, as well as the Multirate Infinitesimal Step methods this work is based on. We propose a generic structure called Flexible …


Cybersecurity: Time Series Predictive Modeling Of Vulnerabilities Of Desktop Operating System Using Linear And Non-Linear Approach, Nawa Raj Pokhrel, Hansapani Rodrigo, Chris P. Tsokos Oct 2017

Cybersecurity: Time Series Predictive Modeling Of Vulnerabilities Of Desktop Operating System Using Linear And Non-Linear Approach, Nawa Raj Pokhrel, Hansapani Rodrigo, Chris P. Tsokos

School of Mathematical and Statistical Sciences Faculty Publications and Presentations

Vulnerability forecasting models help us to predict the number of vulnerabilities that may occur in the future for a given Operating System (OS). There exist few models that focus on quantifying future vulnerabilities without consideration of trend, level, seasonality and non linear components of vulnerabilities. Unlike traditional ones, we propose a vulnerability analytic prediction model based on linear and non-linear approaches via time series analysis. We have developed the models based on Auto Regressive Moving Average (ARIMA), Artificial Neural Network (ANN), and Support Vector Machine (SVM) settings. The best model which provides the minimum error rate is selected for prediction …


Time Reversed Smoke Simulation, Jeremy Michael Oborn Oct 2017

Time Reversed Smoke Simulation, Jeremy Michael Oborn

Theses and Dissertations

Physics-based fluid simulation often produces unpredictable behavior that is difficult for artists to control. We present a new method for art directing smoke animation using time reversed simulation. Given a final fluid configuration, our method steps backward in time generating a sequence that, when played forward, is visually similar to traditional forward simulations. This will give artists better control by allowing them to start from any timestep of the simulation. We address a number of challenges associated with time reversal including generating a believable final configuration and reversing entropy.