Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Discipline
Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 24271 - 24300 of 302419

Full-Text Articles in Physical Sciences and Mathematics

An Empirical Study Of Blockchain System Vulnerabilities: Modules, Types, And Patterns, Xiao Yi, Daoyuan Wu, Lingxiao Jiang, Yuzhou Fang, Kehuan Zhang, Wei Zhang Nov 2022

An Empirical Study Of Blockchain System Vulnerabilities: Modules, Types, And Patterns, Xiao Yi, Daoyuan Wu, Lingxiao Jiang, Yuzhou Fang, Kehuan Zhang, Wei Zhang

Research Collection School Of Computing and Information Systems

Blockchain, as a distributed ledger technology, becomes increasingly popular, especially for enabling valuable cryptocurrencies and smart contracts. However, the blockchain software systems inevitably have many bugs. Although bugs in smart contracts have been extensively investigated, security bugs of the underlying blockchain systems are much less explored. In this paper, we conduct an empirical study on blockchain’s system vulnerabilities from four representative blockchains, Bitcoin, Ethereum, Monero, and Stellar. Specifically, we first design a systematic filtering process to effectively identify 1,037 vulnerabilities and their 2,317 patches from 34,245 issues/PRs (pull requests) and 85,164 commits on GitHub. We thus build the first blockchain …


What Motivates Software Practitioners To Contribute To Inner Source?, Zhiyuan Wan, Xin Xia, Yun Zhang, David Lo, Daibing Zhou, Qiuyuan Chen, Ahmed E. Hassan Nov 2022

What Motivates Software Practitioners To Contribute To Inner Source?, Zhiyuan Wan, Xin Xia, Yun Zhang, David Lo, Daibing Zhou, Qiuyuan Chen, Ahmed E. Hassan

Research Collection School Of Computing and Information Systems

Software development organizations have adopted open source development practices to support or augment their software development processes, a phenomenon referred to as inner source. Given the rapid adoption of inner source, we wonder what motivates software practitioners to contribute to inner source projects. We followed a mixed-methods approach--a qualitative phase of interviews with 20 interviewees, followed by a quantitative phase of an exploratory survey with 124 respondents from 13 countries across four continents. Our study uncovers practitioners' motivation to contribute to inner source projects, as well as how the motivation differs from what motivates practitioners to participate in open source …


Codematcher: A Tool For Large-Scale Code Search Based On Query Semantics Matching, Chao Liu, Xuanlin Bao, Xin Xia, Meng Yan, David Lo, Ting Zhang Nov 2022

Codematcher: A Tool For Large-Scale Code Search Based On Query Semantics Matching, Chao Liu, Xuanlin Bao, Xin Xia, Meng Yan, David Lo, Ting Zhang

Research Collection School Of Computing and Information Systems

Due to the emergence of large-scale codebases, such as GitHub and Gitee, searching and reusing existing code can help developers substantially improve software development productivity. Over the years, many code search tools have been developed. Early tools leveraged the information retrieval (IR) technique to perform an efficient code search for a frequently changed large-scale codebase. However, the search accuracy was low due to the semantic mismatch between query and code. In the recent years, many tools leveraged Deep Learning (DL) technique to address this issue. But the DL-based tools are slow and the search accuracy is unstable.In this paper, we …


Artificial Intelligence For Natural Disaster Management, Guansong Pang Nov 2022

Artificial Intelligence For Natural Disaster Management, Guansong Pang

Research Collection School Of Computing and Information Systems

Artificial intelligence (AI) can leverage massive amount of diverse types of data, such as geospatial data, social media data, and wireless network sensor data, to enhance our understanding of natural disasters, their forecasting and detection, and humanitarian assistance in natural disaster management (NDM). Due to this potential, different communities have been dedicating enormous efforts to the development and/or adoption of AI technologies for NDM. This article provides an overview of these efforts and discusses major challenges and opportunities in this topic.


Hapticpuppet: A Kinesthetic Mid-Air Multidirectional Force-Feedback Drone-Based Interface, Martin Feick, Anthony Tang, Antonio Kruger Nov 2022

Hapticpuppet: A Kinesthetic Mid-Air Multidirectional Force-Feedback Drone-Based Interface, Martin Feick, Anthony Tang, Antonio Kruger

Research Collection School Of Computing and Information Systems

Providing kinesthetic force-feedback for human-scale interactions is challenging due to the relatively large forces needed. Therefore, robotic actuators are predominantly used to deliver this kind of haptic feedback; however, they offer limited flexibility and spatial resolution. In this work, we introduce HapticPuppet, a drone-based force-feedback interface which can exert multidirectional forces onto the human body. This can be achieved by attaching strings to different parts of the human body such as fingers, hands or ankles, which can then be affixed to multiple coordinated drones - puppeteering the user. HapticPuppet opens up a wide range of potential applications in virtual, augmented …


Towards Automated Safety Vetting Of Smart Contracts In Decentralized Applications, Yue Duan, Xin Zhao, Yu Pan, Shucheng Li, Minghao Li, Fengyuan Xu, Mu Zhang Nov 2022

Towards Automated Safety Vetting Of Smart Contracts In Decentralized Applications, Yue Duan, Xin Zhao, Yu Pan, Shucheng Li, Minghao Li, Fengyuan Xu, Mu Zhang

Research Collection School Of Computing and Information Systems

We propose VetSC, a novel UI-driven, program analysis guided model checking technique that can automatically extract contract semantics in DApps so as to enable targeted safety vetting. To facilitate model checking, we extract business model graphs from contract code that capture its intrinsic business and safety logic. To automatically determine what safety specifications to check, we retrieve textual semantics from DApp user interfaces. To exclude untrusted UI text, we also validate the UI-logic consistency and detect any discrepancies. We have implemented VetSC and applied it to 34 real-world DApps. Experiments have demonstrated that VetSC can accurately interpret smart contract code, …


Harmonized Gap-Filled Datasets From 20 Urban Flux Tower Sites, Matthew Lipson, Sue Grimmond, Martin Best, Winston T. L. Chow Nov 2022

Harmonized Gap-Filled Datasets From 20 Urban Flux Tower Sites, Matthew Lipson, Sue Grimmond, Martin Best, Winston T. L. Chow

Research Collection College of Integrative Studies

A total of 20 urban neighbourhood-scale eddy covariance flux tower datasets are made openly available after being harmonized to create a 50 site–year collection with broad diversity in climate and urban surface characteristics. Variables needed as inputs for land surface models (incoming radiation, temperature, humidity, air pressure, wind and precipitation) are quality controlled, gap-filled and prepended with 10 years of reanalysis-derived local data, enabling an extended spin up to equilibrate models with local climate conditions. For both gap filling and spin up, ERA5 reanalysis meteorological data are bias corrected using tower-based observations, accounting for diurnal, seasonal and local urban effects …


Large-Scale Analysis Of Non-Termination Bugs In Real-World Oss Projects, Xiuhan Shi, Xiaofei Xie, Yi Li, Yao Zhang, Sen Chen, Xiaohong Li Nov 2022

Large-Scale Analysis Of Non-Termination Bugs In Real-World Oss Projects, Xiuhan Shi, Xiaofei Xie, Yi Li, Yao Zhang, Sen Chen, Xiaohong Li

Research Collection School Of Computing and Information Systems

Termination is a crucial program property. Non-termination bugs can be subtle to detect and may remain hidden for long before they take effect. Many real-world programs still suffer from vast consequences (e.g., no response) caused by non-termination bugs. As a classic problem, termination proving has been studied for many years. Many termination checking tools and techniques have been developed and demonstrated effectiveness on existing wellestablished benchmarks. However, the capability of these tools in finding practical non-termination bugs has yet to be tested on real-world projects. To fill in this gap, in this paper, we conducted the first large-scale empirical study …


Forced Forward, Timo Nurmi Nov 2022

Forced Forward, Timo Nurmi

The Synapse: Intercollegiate science magazine

No abstract provided.


The Hidden Sadness Of Pregnancy: Postpartum Depression And The Effects Of Preventative Medicine, Daniel Etcheberrigaray Nov 2022

The Hidden Sadness Of Pregnancy: Postpartum Depression And The Effects Of Preventative Medicine, Daniel Etcheberrigaray

The Synapse: Intercollegiate science magazine

No abstract provided.


Sensitive Salamanders: How Salamanders Are Impacted By Climate Change And Water Pollution, Kristen Aldridge Nov 2022

Sensitive Salamanders: How Salamanders Are Impacted By Climate Change And Water Pollution, Kristen Aldridge

The Synapse: Intercollegiate science magazine

No abstract provided.


Applications Of Blockchain In Business Processes: A Comprehensive Review, Wattana Viriyasitavat, Li Xu, Dusit Niyato, Zhuming Bi, Danupol Hoonsopon Nov 2022

Applications Of Blockchain In Business Processes: A Comprehensive Review, Wattana Viriyasitavat, Li Xu, Dusit Niyato, Zhuming Bi, Danupol Hoonsopon

Information Technology & Decision Sciences Faculty Publications

Blockchain (BC), as an emerging technology, is revolutionizing Business Process Management (BPM) in multiple ways. The main adoption is to serve as a trusted infrastructure to guarantee the trust of collaborations among multiple partners in trustless environments. Especially, BC enables trust of information by using Distributed Ledger Technology (DLT). With the power of smart contracts, BC enforces the obligations of counterparties that transact in a business process (BP) by programming the contracts as transactions. This paper aims to study the state-of-the-art of BC technologies by (1) exploring its applications in BPM with the focus on how BC provides the trust …


Delving Deep Into Pixelized Face Recovery And Defense, Zhixuan Zhong, Yong Du, Yang Zhou, Jiangzhong Cao, Shengfeng He Nov 2022

Delving Deep Into Pixelized Face Recovery And Defense, Zhixuan Zhong, Yong Du, Yang Zhou, Jiangzhong Cao, Shengfeng He

Research Collection School Of Computing and Information Systems

Pixelization is arguably one of the most well-adopted deterministic obfuscation techniques for privacy preservation purposes. Although the recovery of pixelized faces is underexplored, the powerful deep neural networks might combat this problem in a data-driven manner. As a consequence, an unbreakable pixelization approach is desired. To achieve this goal, in this paper, we delve into two contradictory problems of unrecoverable pixelization and its counterpart, depixelization, by leveraging the best recovery to strengthen the robustness of the unrecoverable pixelized patterns. In particular, on the offensive end of recovery, we combat the large and continuous nature of pixelized regions by proposing two …


Api-Related Developer Information Needs In Stack Overflow, Mingwei Liu, Xin Peng, Andrian Marcus, Shuangshuang Xing, Christoph Treude, Chengyuan Zhao Nov 2022

Api-Related Developer Information Needs In Stack Overflow, Mingwei Liu, Xin Peng, Andrian Marcus, Shuangshuang Xing, Christoph Treude, Chengyuan Zhao

Research Collection School Of Computing and Information Systems

Stack Overflow (SO) provides informal documentation for APIs in response to questions that express API related developer needs. Navigating the information available on SO and getting information related to a particular API and need is challenging due to the vast amount of questions and answers and the tag-driven structure of SO. In this paper we focus on identifying and classifying fine-grained developer needs expressed in sentences of API-related SO questions, as well as the specific information types used to express such needs, and the different roles APIs play in these questions and their answers. We derive a taxonomy, complementing existing …


Inception Transformer, Chenyang Si, Weihao Yu, Pan Zhou, Yichen Zhou, Xinchao Wang, Shuicheng Yan Nov 2022

Inception Transformer, Chenyang Si, Weihao Yu, Pan Zhou, Yichen Zhou, Xinchao Wang, Shuicheng Yan

Research Collection School Of Computing and Information Systems

Recent studies show that Transformer has strong capability of building long-range dependencies, yet is incompetent in capturing high frequencies that predominantly convey local information. To tackle this issue, we present a novel and general-purpose Inception Transformer, or iFormer for short, that effectively learns comprehensive features with both high- and low-frequency information in visual data. Specifically, we design an Inception mixer to explicitly graft the advantages of convolution and max-pooling for capturing the high-frequency information to Transformers. Different from recent hybrid frameworks, the Inception mixer brings greater efficiency through a channel splitting mechanism to adopt parallel convolution/max-pooling path and self-attention path …


2022 Final Butte Reduction Works (Brw) Smelter Area Mine Waste Remediation And Contaminated Groundwater Hydraulic Control Site Phase Iii Quality Assurance Project Plan (Qapp), Pioneer Technical Services, Inc. Nov 2022

2022 Final Butte Reduction Works (Brw) Smelter Area Mine Waste Remediation And Contaminated Groundwater Hydraulic Control Site Phase Iii Quality Assurance Project Plan (Qapp), Pioneer Technical Services, Inc.

Silver Bow Creek/Butte Area Superfund Site

No abstract provided.


Interband Transitions And Critical Points Of Single-Crystal Thoria Compared With Urania, Christina Dugan, Lu Wang, Kai Zhang, James M. Mann, Martin M. Kimani, Wai-Ning Mei, Peter A. Dowben, James C. Petrosky Nov 2022

Interband Transitions And Critical Points Of Single-Crystal Thoria Compared With Urania, Christina Dugan, Lu Wang, Kai Zhang, James M. Mann, Martin M. Kimani, Wai-Ning Mei, Peter A. Dowben, James C. Petrosky

Faculty Publications

The interband transitions of UO2 are validated independently through cathode luminescence. A picture emerges consistent with density functional theory. While theory is generally consistent with experiment, it is evident from the comparison of UO2 and ThO2 that the choice of functional can significantly alter the bandgap and some details of the band structure, in particular at the conduction band minimum. Strictly ab initio predictions of the optical properties of the actinide compounds, based on density functional theory alone, continue to be somewhat elusive.


Generating Realistic Cyber Data For Training And Evaluating Machine Learning Classifiers For Network Intrusion Detection Systems, Marc W. Chalé, Nathaniel D. Bastian Nov 2022

Generating Realistic Cyber Data For Training And Evaluating Machine Learning Classifiers For Network Intrusion Detection Systems, Marc W. Chalé, Nathaniel D. Bastian

Faculty Publications

No abstract provided.


The Self-Disorder Model Of Schizophrenia, Sophie Nelson Nov 2022

The Self-Disorder Model Of Schizophrenia, Sophie Nelson

The Synapse: Intercollegiate science magazine

No abstract provided.


Using Nature To Protect Nature: How Environmental Arts Sheds Light On Environmental Issues, Khanh Do Nov 2022

Using Nature To Protect Nature: How Environmental Arts Sheds Light On Environmental Issues, Khanh Do

The Synapse: Intercollegiate science magazine

No abstract provided.


A Walk In The Woods: The Science Of Forest Bathing, Sionainn Rudek Nov 2022

A Walk In The Woods: The Science Of Forest Bathing, Sionainn Rudek

The Synapse: Intercollegiate science magazine

No abstract provided.


A Wonderful Fusion: A Mother, A Son, Gravitational Waves, And Our Native People, Abby Tejera Nov 2022

A Wonderful Fusion: A Mother, A Son, Gravitational Waves, And Our Native People, Abby Tejera

The Synapse: Intercollegiate science magazine

No abstract provided.


Water Quality Assessment For San Luis Obispo Creek And Stenner Creek, Jesse Stewart Nov 2022

Water Quality Assessment For San Luis Obispo Creek And Stenner Creek, Jesse Stewart

Master of Science in Environmental Sciences and Management Projects

Water quality was assessed in five stream segments in San Luis Obispo Creek and its tributary Stenner Creek in spring 2022. Two sites were selected along the San Luis Obispo Creek, and three sites along Stenner Creek. The stream segments were evaluated using the Surface Water Ambient Monitoring Program’s procedures for bioassessment of California streams. This procedure describes the collection of physical, chemical, and biological parameters including streamflow, substrate, flow habitat, and benthic macroinvertebrates toward a quantification of a California Stream Condition Index (CSCI). The California Polytechnic State University: San Luis Obispo, Stream Measurements and Water Quality course provided student …


Utah Growing Water Smart: The Water-Land Use Integration Guidebook, Kelly Kopp, Joanna Endter-Wada Nov 2022

Utah Growing Water Smart: The Water-Land Use Integration Guidebook, Kelly Kopp, Joanna Endter-Wada

Utah Growing Water Smart

The Utah Growing Water Smart workshops bring together teams of key community staff and water and land use planning decision makers to help build a more resilient and sustainable water future. The workshops use a range of public engagement, planning, communication, and policy implementation tools to help community teams realize their water efficiency, smart growth, watershed health, and water resiliency goals.

This 1st edition of the Utah Growing Water Smart curriculum guidebook was prepared for the inaugural Utah workshop focused on Wasatch Front communities and held at the Wheeler Historical Farm in Murray, Utah on November 15-17, 2022. This …


An Improved Bio-Based Activated Carbon For The Water Treatment Of A Lagoon In Northern Mexico Based On Life Cycle Assessment Methodology, Leticia Elizabeth Rodriguez Nov 2022

An Improved Bio-Based Activated Carbon For The Water Treatment Of A Lagoon In Northern Mexico Based On Life Cycle Assessment Methodology, Leticia Elizabeth Rodriguez

Open Access Theses & Dissertations

In this research, different options in the preparation of activated carbon are investigated looking at potential environmental impacts, production cost improvement and physical characteristics for water treatment. The activated carbon made with agricultural waste is compared to activated carbon made with hard coal. Life cycle assessment techniques follow ISO 14040 to 14044 standards are used and calculations were performed using GaBi _education 18® software and databases at mid-point TRACI impact categories. The results of the life cycle impact assessment show that, compared to activated carbon made with hard coal, activated carbon made with peanut shell and rice husk allows reductions …


Adaptive Fairness Improvement Based Causality Analysis, Mengdi Zhang, Jun Sun Nov 2022

Adaptive Fairness Improvement Based Causality Analysis, Mengdi Zhang, Jun Sun

Research Collection School Of Computing and Information Systems

Given a discriminating neural network, the problem of fairness improvement is to systematically reduce discrimination without significantly scarifies its performance (i.e., accuracy). Multiple categories of fairness improving methods have been proposed for neural networks, including pre-processing, in-processing and postprocessing. Our empirical study however shows that these methods are not always effective (e.g., they may improve fairness by paying the price of huge accuracy drop) or even not helpful (e.g., they may even worsen both fairness and accuracy). In this work, we propose an approach which adaptively chooses the fairness improving method based on causality analysis. That is, we choose the …


Aggressive Reality Docuseries And Cyberbullying: A Partial Test Of Glaser’S Differential Identification Theory, J. Ra’Chel Fowler, Darren R. Beneby, Kenethia L. Fuller Nov 2022

Aggressive Reality Docuseries And Cyberbullying: A Partial Test Of Glaser’S Differential Identification Theory, J. Ra’Chel Fowler, Darren R. Beneby, Kenethia L. Fuller

International Journal of Cybersecurity Intelligence & Cybercrime

Reality docuseries have dominated primetime airwaves for the greater part of three decades. However, little is known about how viewers who are enamored with the genre’s most aggressive characters are influenced. Using Glaser’s (1956) theory of differential identification, this study employs survey data from 210 college students at a historically Black college and university to explore whether identification with characters from aggressive reality docuseries (ARDs) and the frequency of viewing ARD are positively associated with cyberbullying. Results of multivariate analyses revealed that men were more likely than women to publicly shame others and air other’s dirty laundry online. Additionally, the …


Book Review: Digital Forensics And Cyber Investigation Nov 2022

Book Review: Digital Forensics And Cyber Investigation

International Journal of Cybersecurity Intelligence & Cybercrime

No abstract provided.


A Scientometric Review Of Artificial Intelligence In Tourism (2000-2021), Rujun Wang, Yu Mu, Ying Huang Nov 2022

A Scientometric Review Of Artificial Intelligence In Tourism (2000-2021), Rujun Wang, Yu Mu, Ying Huang

University of South Florida (USF) M3 Publishing

With the increase in the combination of artificial intelligence and the service industry, many applications of artificial intelligence in tourism have been gradually spawned. However, most of the existing research focuses on the algorithms and models of artificial intelligence, and few scholars have systematically reviewed the intersection of tourism and artificial intelligence, this study is based on scientometric, reviewing and sorting out 2689 relevant literature published in 2000-2021, and achieving the three purposes of status carding, hot spot snooping and trend prediction. First, through the participating locations, institutions and authors of collaborative networks, the main sources of AI-related research in …


Pattern Selection In The Schnakenberg Equations: From Normal To Anomalous Diffusion, Hatim K. Khudhair, Yanzhi Zhang, Nobuyuki Fukawa Nov 2022

Pattern Selection In The Schnakenberg Equations: From Normal To Anomalous Diffusion, Hatim K. Khudhair, Yanzhi Zhang, Nobuyuki Fukawa

Mathematics and Statistics Faculty Research & Creative Works

Pattern formation in the classical and fractional Schnakenberg equations is studied to understand the nonlocal effects of anomalous diffusion. Starting with linear stability analysis, we find that if the activator and inhibitor have the same diffusion power, the Turing instability space depends only on the ratio of diffusion coefficients (Formula presented.). However, smaller diffusive powers might introduce larger unstable wave numbers with wider band, implying that the patterns may be more chaotic in the fractional cases. We then apply a weakly nonlinear analysis to predict the parameter regimes for spot, stripe, and mixed patterns in the Turing space. Our numerical …