Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Discipline
Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 35611 - 35640 of 302511

Full-Text Articles in Physical Sciences and Mathematics

A Kinetic Analysis Of Bleaching Synthetic Indigo In Solution, Emily Fry Jan 2022

A Kinetic Analysis Of Bleaching Synthetic Indigo In Solution, Emily Fry

Belmont University Research Symposium (BURS)

Indigo's ability to dye a wide variety of fabric types gives it a prominent place in the textile industry. As a vat dye, indigo must be reduced to leuco-indigo to dissolve in water and dye fabric. It is common practice in the textile industry to bleach indigo-dyed denim to alter the final appearance of the garment. This research aims to determine the kinetic order of this bleaching process, using hydrogen peroxide as a bleaching agent for synthetic indigo. Vat solutions of synthetic indigo were made using fructose as the reducing agent and sodium hydroxide to create a reducing environment. Four …


Covidalert - A Wristwatch-Based System To Alert Users From Face Touching, Mrinmoy Roy Jan 2022

Covidalert - A Wristwatch-Based System To Alert Users From Face Touching, Mrinmoy Roy

Graduate Research Theses & Dissertations

Worldwide 219 million people have been infected and 4.5 million have lost their lives in ongoing Covid-19 pandemic. Until vaccines became widely available, precautions and safety measures like wearing masks, physical distancing, avoiding face touching were some of the primary means to curb the spread of virus. Face touching is a compulsive human behavior that can not be prevented without constantly making a conscious effort, even then it is inevitable. To address this problem, we have designed a smartwatch-based solution, CovidAlert, that leverages Random Forest algorithm trained on accelerometer and gyroscope data from the smartwatch to detect hand transition to …


Conductors For Maximal Orders Of Group Rings Over Local Fields, Brooke Randazzo Jan 2022

Conductors For Maximal Orders Of Group Rings Over Local Fields, Brooke Randazzo

Graduate Research Theses & Dissertations

This dissertation examines conductors for maximal orders of group rings, $FD$, contained in integral group rings, $\mathcal{O}_F D$, where $D$ is a finite group, $F$ a local field, and $\mathcal{O}_F$ its discrete valuation ring. (Given two rings $R \subseteq S$, the conductor of $S$ in $R$, if it exists, is the largest ideal of $S$ contained in $R$.) First, we use a theorem of Jacobinski to make this conductor explicit where $F$ is a particular extension of $\mathbb{Q}_p$ of varying ramification index and $D$ is any elementary abelian $p$-group. Next, we examine this conductor problem for this same $F$ within …


A Data Repository For Clarifying Water Clarity: A Call To Use Metrics Best Suited To Corresponding Research And Management Goals In Aquatic Ecosystems (York River Estuary Case Study Dataset), Jessica S. Turner, Kelsey A. Fall, Carl T. Friedrichs Jan 2022

A Data Repository For Clarifying Water Clarity: A Call To Use Metrics Best Suited To Corresponding Research And Management Goals In Aquatic Ecosystems (York River Estuary Case Study Dataset), Jessica S. Turner, Kelsey A. Fall, Carl T. Friedrichs

Data

This data repository is a permanent archive of the results presented in the associated publication (Turner et al. 2022, Limnology & Oceanography Letters, doi.xxxx). The objective of this study was to illustrate a water clarity phenomenon in the lower York River Estuary of the Chesapeake Bay. The data include light attenuation, Secchi depth, turbidity, and salinity from the lower York River Estuary in western Chesapeake Bay, Virginia, USA from the years 2014-2016.


Password Managers: Secure Passwords The Easy Way, Alexander Master Jan 2022

Password Managers: Secure Passwords The Easy Way, Alexander Master

CERIAS Technical Reports

Poor passwords are often the central problem identified when data breaches, ransomware attacks, and identity fraud cases occur. This Purdue Extension publication provides everyday users of Internet websites and computer systems with tools and strategies to protect their online accounts. Securing information access with password managers can be convenient and often free of cost, on a variety of devices and platforms. “Do’s and Don’ts” of password practices are highlighted, as well as the benefits of multi-factor authentication. The content is especially applicable for small businesses or non-profits, where employees often share access to systems or accounts.


Sok: Analysis Of Software Supply Chain Security By Establishing Secure Design Properties, Chinenye Okafor, Taylor R. Schorlemmer, Santiao Torres-Arias, James C. Davis Jan 2022

Sok: Analysis Of Software Supply Chain Security By Establishing Secure Design Properties, Chinenye Okafor, Taylor R. Schorlemmer, Santiao Torres-Arias, James C. Davis

Department of Electrical and Computer Engineering Faculty Publications

This paper systematizes knowledge about secure software supply chain patterns. It identifies four stages of a software supply chain attack and proposes three security properties crucial for a secured supply chain: transparency, validity, and separation. The paper describes current security approaches and maps them to the proposed security properties, including research ideas and case studies of supply chains in practice. It discusses the strengths and weaknesses of current approaches relative to known attacks and details the various security frameworks put out to ensure the security of the software supply chain. Finally, the paper highlights potential gaps in actor and operation-centered …


Reflecting On Recurring Failures In Iot Development, Dharun Anandayuvaraj, James C. Davis Jan 2022

Reflecting On Recurring Failures In Iot Development, Dharun Anandayuvaraj, James C. Davis

Department of Electrical and Computer Engineering Faculty Publications

As IoT systems are given more responsibility and autonomy, they offer greater benefits, but also carry greater risks. We believe this trend invigorates an old challenge of software engineering: how to develop high-risk software-intensive systems safely and securely under market pressures? As a first step, we conducted a systematic analysis of recent IoT failures to identify engineering challenges. We collected and analyzed 22 news reports and studied the sources, impacts, and repair strategies of failures in IoT systems. We observed failure trends both within and across application domains. We also observed that failure themes have persisted over time. To alleviate …


Exploiting Input Sanitization For Regex Denial Of Service, Efe Barlas, Xin Du, James C. Davis Jan 2022

Exploiting Input Sanitization For Regex Denial Of Service, Efe Barlas, Xin Du, James C. Davis

Department of Electrical and Computer Engineering Faculty Publications

Web services use server-side input sanitization to guard against harmful input. Some web services publish their sanitization logic to make their client interface more usable, e.g., allowing clients to debug invalid requests locally. However, this usability practice poses a security risk. Specifically, services may share the regexes they use to sanitize input strings — and regex-based denial of service (ReDoS) is an emerging threat. Although prominent service outages caused by ReDoS have spurred interest in this topic, we know little about the degree to which live web services are vulnerable to ReDoS.

In this paper, we conduct the first black-box …


Discrepancies Among Pre-Trained Deep Neural Networks: A New Threat To Model Zoo Reliability, Diego Montes, Pongpatapee Peerapatanapokin, Jeff Schultz, Chengjun Guo, Wenxin Jiang, James C. Davis Jan 2022

Discrepancies Among Pre-Trained Deep Neural Networks: A New Threat To Model Zoo Reliability, Diego Montes, Pongpatapee Peerapatanapokin, Jeff Schultz, Chengjun Guo, Wenxin Jiang, James C. Davis

Department of Electrical and Computer Engineering Faculty Publications

Training deep neural networks (DNNs) takes significant time and resources. A practice for expedited deployment is to use pre-trained deep neural networks (PTNNs), often from model zoos.collections of PTNNs; yet, the reliability of model zoos remains unexamined. In the absence of an industry standard for the implementation and performance of PTNNs, engineers cannot confidently incorporate them into production systems. As a first step, discovering potential discrepancies between PTNNs across model zoos would reveal a threat to model zoo reliability. Prior works indicated existing variances in deep learning systems in terms of accuracy. However, broader measures of reliability for PTNNs from …


An Empirical Study On The Impact Of Deep Parameters On Mobile App Energy Usage, Qiang Xu, James C. Davis, Y Charlie Hu, Abhilash Jindal Jan 2022

An Empirical Study On The Impact Of Deep Parameters On Mobile App Energy Usage, Qiang Xu, James C. Davis, Y Charlie Hu, Abhilash Jindal

Department of Electrical and Computer Engineering Faculty Publications

Improving software performance through configuration parameter tuning is a common activity during software maintenance. Beyond traditional performance metrics like latency, mobile app developers are interested in reducing app energy usage. Some mobile apps have centralized locations for parameter tuning, similar to databases and operating systems, but it is common for mobile apps to have hundreds of parameters scattered around the source code. The correlation between these "deep" parameters and app energy usage is unclear. Researchers have studied the energy effects of deep parameters in specific modules, but we lack a systematic understanding of the energy impact of mobile deep parameters. …


Reflections On Software Failure Analysis, Paschal C. Amusuo, Aishwarya Sharma, Siddharth R. Rao, Abbey Vincent, James C. Davis Jan 2022

Reflections On Software Failure Analysis, Paschal C. Amusuo, Aishwarya Sharma, Siddharth R. Rao, Abbey Vincent, James C. Davis

Department of Electrical and Computer Engineering Faculty Publications

Failure studies are important in revealing the root causes, behaviors, and life cycle of defects in software systems. These studies either focus on understanding the characteristics of defects in specific classes of systems or the characteristics of a specific type of defect in the systems it manifests in. Failure studies have influenced various software engineering research directions, especially in the area of software evolution, defect detection, and program repair.

In this paper, we reflect on the conduct of failure studies in software engineering. We reviewed a sample of 52 failure study papers. We identified several recurring problems in these studies, …


Enhanced Study Of Complex Systems By Unveiling Hidden Symmetries With Dynamical Visibility, Nhat Vu Minh Nguyen Jan 2022

Enhanced Study Of Complex Systems By Unveiling Hidden Symmetries With Dynamical Visibility, Nhat Vu Minh Nguyen

2022 Symposium

One of the great challenges in complex and chaotic dynamics is to reveal its deterministic structures. These temporal dynamical structures are sometimes a consequence of hidden symmetries. Detecting and understanding them can allow the study of complex systems even without knowing the full underlying mathematical description of the system. Here we introduce a new technique, called Dynamical Visibility, that quantifies temporal correlations of the dynamics based upon some symmetry conditions. This visibility measures the departure of the dynamics from internal symmetries. We apply this technique to well-known chaotic systems, such as the logistic map and the circle map, as well …


Detrital Zircon Ages In Heavily Folded Quartzite Compared To Steptoe Butte, Travis A. Morton, Chad Pritchard Jan 2022

Detrital Zircon Ages In Heavily Folded Quartzite Compared To Steptoe Butte, Travis A. Morton, Chad Pritchard

2022 Symposium

Folded and altered quartzite along Interstate 90 and the Palouse to Cascades Trail out of Rosalia, WA preserves a record of the region’s tectonic past. The working hypothesis is that the sandstone is Cambrian (roughly 500 million years old) and was metamorphosed and deformed during the Sevier orogeny (roughly 150 to 50 million years ago), and then uplifted about 50 million years ago. The first step to address the hypothesis is to determine the age of the rocks using detrital zircon U/Pb analyses. The second step is for a detailed field study to identify relationships between metamorphic grades and geologic …


Deciphering Regional Geology Using The New Usgs-Ewu Mineral Separation Lab, Zachary Shimp, Katlin Gamache, Travis Morton, Chad Pritchard Jan 2022

Deciphering Regional Geology Using The New Usgs-Ewu Mineral Separation Lab, Zachary Shimp, Katlin Gamache, Travis Morton, Chad Pritchard

2022 Symposium

U/Pb radiometric dating of zircon is one of the most widely used methods to determine the crystallization ages of igneous and metamorphic rocks and the provenance of sedimentary rocks. Eastern Washington University (EWU) has collaborated with the U.S. Geological Survey (USGS) to build a mineral separation lab for isolating zircon (and other) minerals for analysis. This lab was completed in Fall 2022 and is currently being transferred to the new ISC for future use. Graphically illustrated below are the methods used for sampling and pulverizing the rock, as well as grain mount preparation techniques. One of the EWU projects that …


Strategies For The Reduction Of Cybersecurity Breaches In Hospitals, Donovan M. A. Pottinger Jan 2022

Strategies For The Reduction Of Cybersecurity Breaches In Hospitals, Donovan M. A. Pottinger

Walden Dissertations and Doctoral Studies

AbstractRecent cyberattacks in hospitals show the urgency of the need to enhance secure information technology (IT) infrastructure. Hospitals are statistically more at cyber risk than all the multiple industries against ransomware, malware, hacking and internal threats. Guided by routine activity theory, the purpose of this exploratory multiple case study was to explore strategies utilized by hospitals' IT security managers to reduce cybersecurity breaches associated with sensitive data. The participants were nine IT security managers from hospitals in the eastern United States. Data were collected via semistructured interviews and supporting documentation from the consenting participants and hospitals' websites. Through thematic analysis, …


Satdbailiff- Mining And Tracking Self-Admitted Technical Debt, Mohamed Wiem Mkaouer, Eman Abdullah Alomar, Ben Christians, Mihal Busho, Ahmed Hamad Alkhalid, Christian D. Newman Jan 2022

Satdbailiff- Mining And Tracking Self-Admitted Technical Debt, Mohamed Wiem Mkaouer, Eman Abdullah Alomar, Ben Christians, Mihal Busho, Ahmed Hamad Alkhalid, Christian D. Newman

Articles

Self-Admitted Technical Debt (SATD) is a metaphorical concept to describe the self-documented addition of technical debt to a software project in the form of source code comments. SATD can linger in projects and degrade source-code quality, but it can also be more visible than unintentionally added or undocumented technical debt. Understanding the implications of adding SATD to a software project is important because developers can benefit from a better understanding of the quality trade-offs they are making. However, empirical studies, analyzing the survivability and removal of SATD comments, are challenged by potential code changes or SATD comment updates that may …


Perception Of Health Care Access In Rural Georgia: Findings From A Community Health Needs Assessment Survey, Elisa M. Childs, Tiffany R. Washington Jan 2022

Perception Of Health Care Access In Rural Georgia: Findings From A Community Health Needs Assessment Survey, Elisa M. Childs, Tiffany R. Washington

Journal of the Georgia Public Health Association

Background: Limited access to health care services has been cited as a barrier to care for individuals who live in rural areas, contributing to significant health disparities in this population. While perception of services has been cited as a determinant of utilization of health services, it is unknown how perception of services influences health care access in rural areas. The paucity of studies specific to areas in the United States that are medically underserved, necessitated this study and its quantification of the issues that are relevant to individuals living in rural Georgia.

Methods: This study examined the perception of health …


Soils Project, Teagan Wuethrich Jan 2022

Soils Project, Teagan Wuethrich

Natural Sciences Student Research Presentations

With the mass production of plastic materials throughout the world there is not only significant impacts towards marine life, but also terrestrial environments because of plastic pollution. These plastic products are non-biodegradable and only break down into tiny microscopic pieces of plastic. These microscopic plastics pollute the grounds and soils us humans depend on.


Soil Project, Gabriella Hopkins Jan 2022

Soil Project, Gabriella Hopkins

Natural Sciences Student Research Presentations

What are soil-borne diseases?

- Soil-borne diseases are diseases that can infect plants, animals, and human via soil.

- There are multiple different pathogens that contaminate soil and cause disease including bacteria, fungi, and helminths (parasitic worms). Most of these lay dormant (inactive) in the soil until they come in contact with a host.

- A host such as an animal can become infected by inhaling dormant spores or eggs in the case of helminths or by the pathogen coming in contact with an open wound. These situations are also the case for humans, but humans can also become infected …


Functionalized Multimetal Oxideecarbon Nanotube-Based Nanocomposites And Their Properties, Mohamed Morsy Jan 2022

Functionalized Multimetal Oxideecarbon Nanotube-Based Nanocomposites And Their Properties, Mohamed Morsy

Nanotechnology Research Centre

No abstract provided.


Analysis Of Sex-Specific Prostanoid Production Using A Mouse Model Of Selective Cyclooxygenase-2 Inhibition, Rita K. Upmacis, Wendy L. Becker, Donna M. Rattendi, Raven S. Bell, Kelsey D. Jordan, Shayan Saniei, Elena Mejia Jan 2022

Analysis Of Sex-Specific Prostanoid Production Using A Mouse Model Of Selective Cyclooxygenase-2 Inhibition, Rita K. Upmacis, Wendy L. Becker, Donna M. Rattendi, Raven S. Bell, Kelsey D. Jordan, Shayan Saniei, Elena Mejia

Faculty Papers and Publications

Background: Prostanoids are a family of lipid mediators formed from arachidonic acid by cyclooxygenase enzymes and serve as biomarkers of vascular function. Prostanoid production may be different in males and females indicating that different therapeutic approaches may be required during disease.

Objecti ves: We examined sex-dependent differences in COX-related metabolites in genetically modified mice that produce a cyclooxygenase- 2 (COX2) enzyme containing a tyrosine 385 to phenylalanine (Y385F) mutation. This mutation renders the COX2 enzyme unable to form a key intermediate radical required for complete arachidonic acid metabolism and provides a model of selective COX2 inhibition.

Design and …


Strategies For Information Technology Small Business Owners To Sustain Beyond The First 5 Years, Edward Alan Rodarte Jan 2022

Strategies For Information Technology Small Business Owners To Sustain Beyond The First 5 Years, Edward Alan Rodarte

Walden Dissertations and Doctoral Studies

Small businesses are the foundation of an economy and spawn innovation, but small business owners fail at an alarming rate because they lack strategies to sustain business operations. Since 50% of small businesses fail within the first 5 years, small business sustainability research is critical to support small business owners. Grounded in entrepreneurial theory, the purpose of this multiple case study was to identify strategies information technology (IT) small business owners use to sustain operation beyond the first 5 years. The participants included four IT small business owners in the Southwestern United States who sustained operations beyond the first 5 …


A Distinguished Subgroup Of Compact Abelian Groups, Dikran Dikranjan, Wayne Lewis, Peter Loth, Adolf Mader Jan 2022

A Distinguished Subgroup Of Compact Abelian Groups, Dikran Dikranjan, Wayne Lewis, Peter Loth, Adolf Mader

Mathematics Faculty Publications

Here “group” means additive abelian group. A compact group G contains δ" role="presentation" style="box-sizing: border-box; max-height: none; display: inline; line-height: normal; font-size: 13.2px; text-align: left; word-spacing: normal; overflow-wrap: normal; white-space: nowrap; float: none; direction: ltr; max-width: none; min-width: 0px; min-height: 0px; border: 0px; padding: 0px; margin: 0px; position: relative;">δ–subgroups, that is, compact totally disconnected subgroups Δ" role="presentation" style="box-sizing: border-box; max-height: none; display: inline; line-height: normal; font-size: 13.2px; text-align: left; word-spacing: normal; overflow-wrap: normal; white-space: nowrap; float: none; direction: ltr; max-width: none; min-width: 0px; min-height: 0px; border: 0px; padding: 0px; margin: 0px; position: relative;">Δ such that G/Δ" role="presentation" style="box-sizing: …


Evolutionary Kuramoto Dynamics, Elizabeth A. Tripp, Feng Fu, Scott D. Pauls Jan 2022

Evolutionary Kuramoto Dynamics, Elizabeth A. Tripp, Feng Fu, Scott D. Pauls

Mathematics Faculty Publications

Biological systems have a variety of time-keeping mechanisms ranging from molecular clocks within cells to a complex interconnected unit across an entire organism. The suprachiasmatic nucleus, comprising interconnected oscillatory neurons, serves as a master-clock in mammals. The ubiquity of such systems indicates an evolutionary benefit that outweighs the cost of establishing and maintaining them, but little is known about the process of evolutionary development. To begin to address this shortfall, we introduce and analyse a new evolutionary game theoretic framework modelling the behaviour and evolution of systems of coupled oscillators. Each oscillator is characterized by a pair of dynamic behavioural …


Synthesis And Characterization Of New Benzimidazole-Nitrone Derivatives And Study Of Their Effect As Anti-Fungal, Meaad A. Fadel, Dawood S. Ali, Hanaa K. Mousa Jan 2022

Synthesis And Characterization Of New Benzimidazole-Nitrone Derivatives And Study Of Their Effect As Anti-Fungal, Meaad A. Fadel, Dawood S. Ali, Hanaa K. Mousa

Al-Qadisiyah Journal of Pure Science

New benzimidazole derivatives (benzimidazole-nitrone) were synthesized from the condensation of o-phenylene diamine with p-amino benzaldehyde in the presence of (P-TSOH\EtOH) then the benzimidazole compounds that containing an imine group were oxidized to obtain a nitrone group by used peracetic acid and identified by FT-IR, H1-NMR spectra, and elemental analysis. all compounds applied to the candida and aspergillus fungi gave a different result. The compounds have Ph, OH and N(CH3)2 groups as substituted in synthesized benzimidazole derivatives were showed reactivity as anti-fungal.


Math Department 2021-2022 Newsletter, Mathematics Department Jan 2022

Math Department 2021-2022 Newsletter, Mathematics Department

Mathematics Newsletter

Welcome to our annual Mathematics Department Newsletter. As we are slowly coming out of the pandemic, we were able to resume many of our normal events.


Explainabilityaudit: An Automated Evaluation Of Local Explainability In Rooftop Image Classification, Duleep Rathgamage Don, Jonathan Boardman, Sudhashree Sayenju, Ramazan Aygun, Yifan Zhang, Bill Franks, Sereres Johnston, George Lee, Dan Sullivan, Girish Modgil Jan 2022

Explainabilityaudit: An Automated Evaluation Of Local Explainability In Rooftop Image Classification, Duleep Rathgamage Don, Jonathan Boardman, Sudhashree Sayenju, Ramazan Aygun, Yifan Zhang, Bill Franks, Sereres Johnston, George Lee, Dan Sullivan, Girish Modgil

Published and Grey Literature from PhD Candidates

Explainable Artificial Intelligence (XAI) is a key concept in building trustworthy machine learning models. Local explainability methods seek to provide explanations for individual predictions. Usually, humans must check these explanations manually. When large numbers of predictions are being made, this approach does not scale. We address this deficiency for a rooftop classification problem specifically with ExplainabilityAudit, a method that automatically evaluates explanations generated by a local explainability toolkit and identifies rooftop images that require further auditing by a human expert. The proposed method utilizes explanations generated by the Local Interpretable Model-Agnostic Explanations (LIME) framework as the most important superpixels of …


Chapter 3.2: Why Batteries Deliver A Fairly Constant Voltage Until They Suddenly Die: An Application Of Nernst Topo Surfaces, Garon C. Smith, Md Mainul Hossain, Patrick Maccarthy Jan 2022

Chapter 3.2: Why Batteries Deliver A Fairly Constant Voltage Until They Suddenly Die: An Application Of Nernst Topo Surfaces, Garon C. Smith, Md Mainul Hossain, Patrick Maccarthy

Water Topos: A 3-D Trend Surface Approach to Viewing and Teaching Aqueous Equilibrium Chemistry

Two characteristics of batteries, their delivery of nearly constant voltage and their rapid failure, are explained through a visual examination of the Nernst equation. Two Galvanic cells are described in detail: (1) a wet cell involving iron and copper salts and (2) a mercury oxide dry cell. A complete description of the wet cell requires a three-dimensional Nernst surface because the potential is a function of two variables: the activities of both the oxidized and reduced forms in each redox couple. Dry cell potentials, which utilize solid or pure liquid species, are functions of only one variable and can be …


Evaluating Restoration Outcomes: Red Spruce Reforestation In The West Virginia Highlands, Benjamin Rhodes Jan 2022

Evaluating Restoration Outcomes: Red Spruce Reforestation In The West Virginia Highlands, Benjamin Rhodes

Theses and Dissertations--Forestry and Natural Resources

Red spruce (Picea rubens) is the keystone species of the red spruce-northern hardwood forest, a unique high-elevation plant community that supports hundreds of animal species in the Central Appalachians. These forests were devastated by the Industrial Logging Era of the late 1800s and early 1900s, and they remain in a degraded and fragmented state. Current restoration efforts include red spruce plantings on old field sites and reclaimed coal mines. This project seeks to aid those efforts by evaluating restoration outcomes for vegetation and soils along a ten-year chronosequence. Specifically, the study aims to determine whether restoration site soils …


Reconstruction Of Sparse Recurrent Connectivity And Inputs From The Nonlinear Dynamics Of Neuronal Networks, Victor J. Barranca Jan 2022

Reconstruction Of Sparse Recurrent Connectivity And Inputs From The Nonlinear Dynamics Of Neuronal Networks, Victor J. Barranca

Mathematics & Statistics Faculty Works

Reconstructing the recurrent structural connectivity of neuronal networks is a challenge crucial to address in characterizing neuronal computations. While directly measuring the detailed connectivity structure is generally prohibitive for large networks, we develop a novel framework for reverse-engineering large-scale recurrent network connectivity matrices from neuronal dynamics by utilizing the widespread sparsity of neuronal connections. We derive a linear input-output mapping that underlies the irregular dynamics of a model network composed of both excitatory and inhibitory integrate-and-fire neurons with pulse coupling, thereby relating network inputs to evoked neuronal activity. Using this embedded mapping and experimentally feasible measurements of the firing rate …