Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Science

Discipline
Institution
Publication Year
Publication
Publication Type
File Type

Articles 391 - 420 of 667

Full-Text Articles in Physical Sciences and Mathematics

18. Statistics, Northeastern State University Jan 2015

18. Statistics, Northeastern State University

Oklahoma Research Day Abstracts

No abstract provided.


02. Animal Science, Northeastern State University Jan 2015

02. Animal Science, Northeastern State University

Oklahoma Research Day Abstracts

No abstract provided.


05. Chemistry, Northeastern State University Jan 2015

05. Chemistry, Northeastern State University

Oklahoma Research Day Abstracts

No abstract provided.


09. Environmental Science, Northeastern State University Jan 2015

09. Environmental Science, Northeastern State University

Oklahoma Research Day Abstracts

No abstract provided.


12. Kinesiology, Northeastern State University Jan 2015

12. Kinesiology, Northeastern State University

Oklahoma Research Day Abstracts

No abstract provided.


15. Pharmacy, Northeastern State University Jan 2015

15. Pharmacy, Northeastern State University

Oklahoma Research Day Abstracts

No abstract provided.


19. Zoology, Northeastern State University Jan 2015

19. Zoology, Northeastern State University

Oklahoma Research Day Abstracts

No abstract provided.


The Future Of Ios Development: Evaluating The Swift Programming Language, Garrett Wells Jan 2015

The Future Of Ios Development: Evaluating The Swift Programming Language, Garrett Wells

CMC Senior Theses

Swift is a new programming language developed by Apple for creating iOS and Mac OS X applications. Intended to eventually replace Objective-C as Apple’s language of choice, Swift needs to convince developers to switch over to the new language. Apple has promised that Swift will be faster than Objective-C, as well as offer more modern language features, be very safe, and be easy to learn and use. In this thesis I test these claims by creating an iOS application entirely in Swift as well as benchmarking two different algorithms. I find that while Swift is faster than Objective-C, it does …


Creating A Mobile Game, Timothy Jasany Jan 2015

Creating A Mobile Game, Timothy Jasany

Williams Honors College, Honors Research Projects

The world we live in today is one that revolves around technology. Whether you are checking your email or paying a bill, most of these actions can be accomplished through the use of technology. One of the most powerful pieces of technology is a cell phone, which can accomplish most tasks any other device can do. Since this piece of technology is growing better and better each day I decided to learn how to program android devices. Cell phones are becoming more widely used by the general public, which I think means that in the near future that cell phones …


Evaluation Of The Signature Molecular Descriptor With Blosum62 And An All-Atom Description For Use In Sequence Alignment Of Proteins, Lindsay M. Aichinger Jan 2015

Evaluation Of The Signature Molecular Descriptor With Blosum62 And An All-Atom Description For Use In Sequence Alignment Of Proteins, Lindsay M. Aichinger

Williams Honors College, Honors Research Projects

This Honors Project focused on a few aspects of this topic. The second is comparing the molecular signature kernels to three of the BLOSUM matrices (30, 62, and 90) to test the accuracy of the mathematical model. The kernel matrix was manipulated in order to improve the relationship by focusing on side groups and also by changing how the structure was represented in the matrix by increasing the initial height distance from the central atom (Height 1 and Height 2 included).

There were multiple design constraints for this project. The first was the comparison with the BLOSUM matrices (30, 62, …


Evaluation Of Tcp Header Fields For Data Overhead Efficiency, Justin K. Yirka Jan 2015

Evaluation Of Tcp Header Fields For Data Overhead Efficiency, Justin K. Yirka

Undergraduate Research Posters

Bandwidth across the internet is constricted by monetary factors and hardware development, so researchers are left to improve the efficiency of data transmitted in order to improve internet speeds. The transmission control protocol (TCP) is the primary transport protocol on the modern internet, ensuring reliable delivery of the majority of data transmitted. I evaluated the TCP header fields for efficient use of data overhead so as to determine current waste and to suggest possible areas for revision. I examined original specifications for TCP mechanisms, comparing them to modern implementations as determined by updated standards and modern practices in the networking …


Features For Ranking Tweets Based On Credibility And Newsworthiness, Jacob W. Ross Jan 2015

Features For Ranking Tweets Based On Credibility And Newsworthiness, Jacob W. Ross

Browse all Theses and Dissertations

We create a robust and general feature set for learning to rank algorithms that rank tweets based on credibility and newsworthiness. In previous works, it has been demonstrated that when the training and testing data are from two distinct time periods, the ranker performs poorly. We improve upon previous work by creating a feature set that does not over fit a particular year or set of topics. This is critical given how people utilize social media changes as time progresses, and the topics discussed vary. In addition, we are constantly gaining new tweet data. Thus, it is important to be …


Learning Emotions: A Software Engine For Simulating Realistic Emotion In Artificial Agents, Douglas Code Jan 2015

Learning Emotions: A Software Engine For Simulating Realistic Emotion In Artificial Agents, Douglas Code

Senior Independent Study Theses

This paper outlines a software framework for the simulation of dynamic emotions in simulated agents. This framework acts as a domain-independent, black-box solution for giving actors in games or simulations realistic emotional reactions to events. The emotion management engine provided by the framework uses a modified Fuzzy Logic Adaptive Model of Emotions (FLAME) model, which lets it manage both appraisal of events in relation to an individual’s emotional state, and learning mechanisms through which an individual’s emotional responses to a particular event or object can change over time. In addition to the FLAME model, the engine draws on the design …


Electronic Health Record Simulator, Samuel M. Brown Jan 2015

Electronic Health Record Simulator, Samuel M. Brown

Williams Honors College, Honors Research Projects

The Electronic Health Record Simulator is exactly that; it is meant to simulate an EHR (like those found in hospitals and clinics) for use in an academic setting. Its purpose is to familiarize students with the operation of real-world EHRs in order to better prepare them for the workforce. It allows instructors to create fictional patients (with full lab values), and allows students to fill in information as in a real EHR.


Design Of A Novel Low - Cost, Portable, 3d Ultrasound System With Extended Imaging Capabilities For Point-Of-Care Applications, Michail Tsakalakis Jan 2015

Design Of A Novel Low - Cost, Portable, 3d Ultrasound System With Extended Imaging Capabilities For Point-Of-Care Applications, Michail Tsakalakis

Browse all Theses and Dissertations

Ultrasound Imaging (USI) or Medical Sonography (MS), as it is formally called, has been widely used in biomedical applications over the last decades. USI can provide clinicians with a thorough view of the internal parts of the human body, making use of sound waves of higher frequencies than humans can perceive. USI systems are considered highly portable and of low-cost, compared to other imaging modalities. However, despite those advantages, Ultrasound Systems (US) and especially 3D ones, have not been yet extensively utilized for Point-of-Care (POC) applications, due to numerous restrictions and artifacts that they currently present.

Hardware complexity and real-time …


Isolation In Synchronized Drone Formations, Andrew P. Brunner Jan 2015

Isolation In Synchronized Drone Formations, Andrew P. Brunner

Electronic Theses and Dissertations

This paper expands on a theoretical model that is used for aerial robots that are working cooperatively to complete a task. In certain situations, such as when multiple robots have catastrophic failures, the surviving robots could become isolated so that they never again communicate with another robot. We prove some properties about isolated robots flying in a grid formation, and we present an algorithm that determines how many robots need to fail to isolate at least one robot. Finally, we propose a strategy that eliminates the possibility of isolation altogether.


Fail-Safe Testing Of Web Applications, Salah Boukhris Jan 2015

Fail-Safe Testing Of Web Applications, Salah Boukhris

Electronic Theses and Dissertations

This dissertation introduces an approach to generate tests to test fail-safe behavior for web applications. We apply the approach to a commercial web application. We build models for both behavioral and mitigation requirements. We create mitigation tests from an existing functional black box test suite by determining failure type and points of failure in the test suite and weaving required mitigation based on weaving rules to generate a test suite that tests proper mitigation of failures. A genetic algorithm (GA) is used to determine points of failure and type of failure that needs to be tested. Mitigation test paths are …


Characterization Of Prose By Rhetorical Structure For Machine Learning Classification, James Java Jan 2015

Characterization Of Prose By Rhetorical Structure For Machine Learning Classification, James Java

CCE Theses and Dissertations

Measures of classical rhetorical structure in text can improve accuracy in certain types of stylistic classification tasks such as authorship attribution. This research augments the relatively scarce work in the automated identification of rhetorical figures and uses the resulting statistics to characterize an author's rhetorical style. These characterizations of style can then become part of the feature set of various classification models.

Our Rhetorica software identifies 14 classical rhetorical figures in free English text, with generally good precision and recall, and provides summary measures to use in descriptive or classification tasks. Classification models trained on Rhetorica's rhetorical measures paired with …


Exploring Algorithmic Musical Key Recognition, Nathan J. Levine Jan 2015

Exploring Algorithmic Musical Key Recognition, Nathan J. Levine

CMC Senior Theses

The following thesis outlines the goal and process of algorithmic musical key detection as well as the underlying music theory. This includes a discussion of signal-processing techniques intended to most accurately detect musical pitch, as well as a detailed description of the Krumhansl-Shmuckler (KS) key-finding algorithm. It also describes the Java based implementation and testing process of a musical key-finding program based on the KS algorithm. This thesis provides an analysis of the results and a comparison with the original algorithm, ending with a discussion of the recommended direction of further development.


A Cognitive Apprenticeship Approach For Teaching Abstract And Complex Skills In An Online Learning Environment, Reinaldo Fernandez Aug 2014

A Cognitive Apprenticeship Approach For Teaching Abstract And Complex Skills In An Online Learning Environment, Reinaldo Fernandez

CCE Theses and Dissertations

Undergraduate courses such as mathematics, science, and computer programming require high levels of decision making, concentration, and cognitive demand. Researchers in the field of instructional design are interested in effective instructional strategies that can aid practitioners in teaching such abstract and complex skills.

One example of an instructional strategy that has proven effective in teaching these skills is cognitive apprenticeship (CA). While CA has been applied to courses such as mathematics and computer programming in face-to-face and blended learning environments, there is little evidence of the advantages of applying CA in a fully online computer programming course. Specifically, the introductory …


Development Of Etsu Student Life Android Application, Tyler L. Cox May 2014

Development Of Etsu Student Life Android Application, Tyler L. Cox

Undergraduate Honors Theses

In this thesis, the author gives a description his journey creating and developing a Student Life Application for East Tennessee State University. This thesis will document his process with development as well as reflect on the struggles and victories in creation of this application.


Homology Modeling And Molecular Docking For The Science Curriculum, Owen M. Mcdougal, Nic Cornia, Chris Mallory, Julia Thom Oxford, Tim Andersen Mar 2014

Homology Modeling And Molecular Docking For The Science Curriculum, Owen M. Mcdougal, Nic Cornia, Chris Mallory, Julia Thom Oxford, Tim Andersen

Chemistry and Biochemistry Faculty Publications and Presentations

DockoMatic 2.0 is a powerful open source software program (downloadable from sourceforge.net) that allows users to utilize a readily accessible computational tool to explore biomolecules and their interactions. This manuscript describes a practical tutorial for use in the undergraduate curriculum that introduces students to macromolecular structure creation, ligand binding calculations, and visualization of docking results. A student procedure is provided that illustrates the use of DockoMatic to create a homology model for the amino propeptide region (223 amino acids with two disulfide bonds) of collagen α1 (XI), followed by molecular docking of the commercial drug Arixtra® to the …


Automatic Identification Of Interestingness In Biomedical Literature, Gaurish Anand Jan 2014

Automatic Identification Of Interestingness In Biomedical Literature, Gaurish Anand

Browse all Theses and Dissertations

This thesis presents research on automatically identifying interestingness in a graph of semantic predications. Interestingness represents a subjective quality of information that represents its value in meeting a user's known or unknown retrieval needs. The perception of information as interesting requires a level of utility for the user as well as a balance between significant novelty and sufficient familiarity. It can also be influenced by additional factors such as unexpectedness or serendipity with recent experiences. The ability to identify interesting information facilitates the development of user-centered retrieval, especially in information semantic summarization and iterative, step-wise searching such as in discovery …


Combating Integrity Attacks In Industrial Control Systems, Chad Arnold Jan 2014

Combating Integrity Attacks In Industrial Control Systems, Chad Arnold

Browse all Theses and Dissertations

Industrial Control Systems are vulnerable to integrity attacks because of connectivity to the external Internet and trusted internal networking components that can become compromised. Integrity attacks can be modeled, analyzed, and sometimes remedied by exploiting properties of physical devices and reasoning about the trust worthiness of ICS communication components.

Industrial control systems (ICS) monitor and control the processes of public utility that society depends on - the electric power grid, oil and gas pipelines, transportation, and water facilities. Attacks that impact the operations of these critical assets could have devastating consequences. The complexity and desire to interconnect ICS components have …


A Visualization And Simulation Tool That Will Generate Effective Patrolling Strategies To Protect The U.S. Borders From Illegal Intrusion Using Game Theoretic Methods And Models, Eric Gutierrez Jan 2014

A Visualization And Simulation Tool That Will Generate Effective Patrolling Strategies To Protect The U.S. Borders From Illegal Intrusion Using Game Theoretic Methods And Models, Eric Gutierrez

Open Access Theses & Dissertations

In the recent decade, the United States Border Patrol has increased the presence of border security officers at points of entry along the U.S.- Mexico border. In response to this increased presence of border security officials at ports of entries, illegal intruders have rerouted their intrusions in between ports of entry, in harsher terrain areas of the U.S. (e.g., the Arizona desert). The U.S. Border Patrol could benefit from a tool that plans effective border patrolling routes, and helps border security officials to make risk-based decisions for resource allocation. We are currently developing a tool called Genetic Algorithm for a …


Curated Reasoning By Formal Modeling Of Provenance, Kevin B. Shaw Dec 2013

Curated Reasoning By Formal Modeling Of Provenance, Kevin B. Shaw

University of New Orleans Theses and Dissertations

The core problem addressed in this research is the current lack of an ability to repurpose and curate scientific data among interdisciplinary scientists within a research enterprise environment. Explosive growth in sensor technology as well as the cost of collecting ocean data and airborne measurements has allowed for exponential increases in scientific data collection as well as substantial enterprise resources required for data collection. There is currently no framework for efficiently curating this scientific data for repurposing or intergenerational use.

There are several reasons why this problem has eluded solution to date to include the competitive requirements for funding and …


Forensic Analysis Of Whatsapp On Android Smartphones, Neha S. Thakur Aug 2013

Forensic Analysis Of Whatsapp On Android Smartphones, Neha S. Thakur

University of New Orleans Theses and Dissertations

Android forensics has evolved over time offering significant opportunities and exciting challenges. On one hand, being an open source platform Android is giving developers the freedom to contribute to the rapid growth of the Android market whereas on the other hand Android users may not be aware of the security and privacy implications of installing these applications on their phones. Users may assume that a password-locked device protects their personal information, but applications may retain private information on devices, in ways that users might not anticipate. In this thesis we will be concentrating on one such application called 'WhatsApp', a …


Simulating Inflation, Ryan M. Heathcote Apr 2013

Simulating Inflation, Ryan M. Heathcote

Senior Honors Theses

Inflation is a common problem in modern economics, and it seems to persist, requiring government financial policy intervention on a regular basis in order to properly manage. The mechanics of inflation are difficult to understand, since the best metric modern society has for inflation involves taking samples of prices across the country. A simulation can give deeper insight into more than the mere fact that prices rise over time: a simulation can help to answer the “why” question. The problem with this statement is that developing a simulation is not as simple as writing some code. A simulation is developed …


A Large Scale Distributed Syntactic, Semantic And Lexical Language Model For Machine Translation, Ming Tan Jan 2013

A Large Scale Distributed Syntactic, Semantic And Lexical Language Model For Machine Translation, Ming Tan

Browse all Theses and Dissertations

The n-gram model is the most widely used language model (LM) in statistical machine translation system, due to its simplicity and scalability. However, it only encodes the local lexical relation between adjacent words and clearly ignores the rich syntactic and semantic structures of the natural languages. Attempting to increase the order of an n-gram to describe longer range dependencies in natural language immediately runs into the curse of dimensionality. Although previous researches tried to increase the order of n-gram on a large corpus, they did not see obvious improvement beyond 6-gram. Meanwhile, other LMs, such as syntactic language models and …


A Federated Architecture For Managing Health Information In Ethiopia, Russell Gillen Ms Jan 2013

A Federated Architecture For Managing Health Information In Ethiopia, Russell Gillen Ms

All Student Scholarship

Electronic health systems can be leveraged to aid in the delivery and management of health care for patients in developing countries. The delivery of health information by mobile devices is playing an increasing role in health information management.