Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Discipline
Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 60211 - 60240 of 302619

Full-Text Articles in Physical Sciences and Mathematics

Adhering Homogeneous Molecular Electrocatalysts Entrapped In Micelles To Electrode Surfaces, Emily Kuhlmann Apr 2021

Adhering Homogeneous Molecular Electrocatalysts Entrapped In Micelles To Electrode Surfaces, Emily Kuhlmann

Honors Theses

Heterogeneous catalysts are important to industrial use; however, mechanistic studies are difficult because they lack the easy tunability of homogeneous catalysts. One solution could be to immobilize homogeneous catalysts using micelles while maintaining catalytic properties and activities.


Effectiveness Of Plastic Ordinances In Santa Monica, Ca: Do Regulations At The Municipal Level Reduce Plastic Waste?, John W. Hayes Apr 2021

Effectiveness Of Plastic Ordinances In Santa Monica, Ca: Do Regulations At The Municipal Level Reduce Plastic Waste?, John W. Hayes

School of Public Policy Capstones

Plastic is a cheap, robust and versatile material with numerous practical uses that contribute to the convenience of modern day life. However the very same properties that make it uniquely diverse and hardy also contribute to the hazards it poses to the ecosystems and human health. If current consumption and manufacturing practices remain unchanged, there will be hundreds of millions of additional tons of plastic introduced into the environment over the coming decades. To mitigate this issue, some cities, such as Santa Monica, have implemented ordinances and policies directly aimed at this growing problem, albeit with ambiguous results. To better …


Equation Of State For Natural Almandine, Spessartine, Pyrope Garnet: Implications For Quartz-In-Garnet Elastic Geobarometry, Suzanne R. Mulligan, Elissaios Stavrou, Stella Chariton, Oliver Tschauner, Ashkan Salamat, Michael Wells, Alexander G. Smith, Thomas D. Hoisch, Vitali Prakapenka Apr 2021

Equation Of State For Natural Almandine, Spessartine, Pyrope Garnet: Implications For Quartz-In-Garnet Elastic Geobarometry, Suzanne R. Mulligan, Elissaios Stavrou, Stella Chariton, Oliver Tschauner, Ashkan Salamat, Michael Wells, Alexander G. Smith, Thomas D. Hoisch, Vitali Prakapenka

Geoscience Faculty Research

The equation of state (EoS) of a natural almandine74spessartine13pyrope10grossular3 garnet of a typical composition found in metamorphic rocks in Earth’s crust was obtained using single crystal synchrotron X-ray diffraction under isothermal room temperature compression. A third-order Birch-Murnaghan EoS was fitted to P-V data and the results are compared with published EoS for iron, manganese, magnesium, and calcium garnet compositional end-members. This comparison reveals that ideal solid solution mixing can reproduce the EoS for this intermediate composition of garnet. Additionally, this new EoS was used to calculate geobarometry on a garnet sample from the same rock, which was collected from the …


Uc-20 Analyzing Concentration Levels In Online Education Using Machine Learning, Gray Daugherty, Rachel W Lawson, Kyle C. Ensley, Michael Chann, Tobi Adams Apr 2021

Uc-20 Analyzing Concentration Levels In Online Education Using Machine Learning, Gray Daugherty, Rachel W Lawson, Kyle C. Ensley, Michael Chann, Tobi Adams

C-Day Computing Showcase

These past few years have introduced the most important time in history to study new faucets of online learning. Due to COVID's impact, online learning became a staple in millions of homes across the country. Guided by the research question, “Can a machine learning model be created and trained to detect student concentration level based on eye and facial data?”, we set out to contribute to society’s understanding of online learning under the guidance of Dr. Ying Xie and Dr. Linh Le. Our process involved recording ourselves participating in online classes to garnish eye and facial data. Each student recorded …


Uc-57 Cultiva- The Plant Companion, Travis R Hescox, Kat Branham, Ahsan Jamal, Joseph Henggeler, Erick Reyes, Andy Alcaraz, Momodou Mbye Apr 2021

Uc-57 Cultiva- The Plant Companion, Travis R Hescox, Kat Branham, Ahsan Jamal, Joseph Henggeler, Erick Reyes, Andy Alcaraz, Momodou Mbye

C-Day Computing Showcase

The goal of this project is to improve the lives of gardeners or everyday people with a green thumb by providing them with a planter that will not only hold their plant of choice, but also give them information about the health and growth of their plant without them having to interact with it directly. This project will provide the user with a planter containing sensors that communicate with an application from which the user can monitor the environment of the plant. This project can serve a wide range of people from first-time gardeners to seasoned veterans. Users will no …


Uc-14 Teleclinic, Jay P Bhatt, Lucius Burch, Zekai Fei, Bijoy Shah, Hao Zhang Apr 2021

Uc-14 Teleclinic, Jay P Bhatt, Lucius Burch, Zekai Fei, Bijoy Shah, Hao Zhang

C-Day Computing Showcase

TeleClinic is a telemedicine web application that provides ease of access and a medium for interaction between patients and their respective doctors and administrators. In particular, this web portal includes a chat feature, an area for medical reports, an area for appointment requests, and an area for video recordings. Additionally, TeleClinic meets the requirements prescribed by the Health Insurance Portability and Accountability Act (H.I.P.A.A.) via upholding data privacy and safeguarding medical information. To maximize its overall utility, TeleClinic utilizes the React and React Redux libraries for its front-end and a NoSQL database in Google Firebase for its back-end.Advisors(s): Dr. Ken …


Gr-53 An Investigation On Non-Invasive Brain-Computer Interfaces: Emotiv Epoc+ Neuroheadset And Its Effectiveness, Md Jobair Hossain Faruk Apr 2021

Gr-53 An Investigation On Non-Invasive Brain-Computer Interfaces: Emotiv Epoc+ Neuroheadset And Its Effectiveness, Md Jobair Hossain Faruk

C-Day Computing Showcase

Neurotechnology describes as one of the focal points of today’s research around the domain of Brain-Computer Interfaces (BCI). The primary attempts of BCI research are to decoding human speech from brain signals and controlling neuro-psychological patterns that would benefit people suffering from neurological disorders. In this study, we illustrate the progress of BCI research and present scores of unveiled contemporary approaches. First, we explore a decoding natural speech approach that is designed to decode human speech directly from the human brain onto a digital screen introduced by Facebook Reality Lab and University of California San Francisco. Then, we study a …


Gc-47 Key Professional Dataset - Dataspider, Janell Westmoreland, Vy Duong, Nyong Nkereuwem, Kajal S Vaghani, Ritu Choudhary Apr 2021

Gc-47 Key Professional Dataset - Dataspider, Janell Westmoreland, Vy Duong, Nyong Nkereuwem, Kajal S Vaghani, Ritu Choudhary

C-Day Computing Showcase

The purpose of this project is to build a Web Crawler to extract personal information from a public website like Reddit and LinkedIn. We completed the Instagram crawling as a bonus for the project. The team will be using MySQL or any other open source relational database to organize the data and conduct a quantitative data analysis on it.Advisors(s): Dr. Han - Professor IT7993 Capstone Jing Wang -Project SponsorTopic(s): Data/Data AnalyticsIT7993


Gr-1 Compare Two Off Angle Normalization, Emily Ehrlich Apr 2021

Gr-1 Compare Two Off Angle Normalization, Emily Ehrlich

C-Day Computing Showcase

This work investigates different iris normalization techniques to compare their performance including elliptical normalization and circular normalization after frontal projection of off-angle iris recognition. Elliptical normalization samples the iris texture using elliptical segmentation parameters. For circular unwrapping, we first estimate the gaze deviation using ellipse parameters and the image will be projected back to frontal view using perspective transformation. Then, we segment the transformed image and normalize using circular parameters. We further investigate if: (i) elliptical normalization or circular unwrapping recognition performance is higher, and (ii) the two segmentations methods in circular unwrapping increase the recognition efficiency. Based on the …


Gr-23 Machine Learning Techniques For Malware Network Traffic Detection, Jermaine Cameron Apr 2021

Gr-23 Machine Learning Techniques For Malware Network Traffic Detection, Jermaine Cameron

C-Day Computing Showcase

Persistent malware variants are a constant threat to computing infrastructure across all regions and business sectors. Traditional detection systems focus primarily on signature-based analysis but this approach cannot adequately keep pace with the velocity and volume of new malware variants that are continuously deployed onto the internet. Most network traffic detection techniques are focused on analyzing raw packets and have not deterred the surge of persistent malware. Therefore, it is important to develop new research techniques that are focused on optimized metadata from malware network traffic to effectively identify an ever-increasing expanse of malicious software. Recent research efforts by Letteri …


Gr-38 Energy Cost And Efficiency On Edge Computing: Challenges And Vision, Kousalya Banka Apr 2021

Gr-38 Energy Cost And Efficiency On Edge Computing: Challenges And Vision, Kousalya Banka

C-Day Computing Showcase

The Internet of Things (IoT) has been the key for many advancements in next-generation technologies for the past few years. With a conceptual grouping of ecosystem elements such as sensors, actuators, and smart objects connected to perform complex operations to perform environmental monitoring, intelligent transport system, smart building, smart cities, and endless other possibilities. Edge computing helps the IoT’s reach even further and be more robust by connecting multiple censored devices through the internet and forming powerful computational capabilities. Unfortunately, this computation level comes at a cost as the devices are constantly being used to communicate and perform specific actions. …


Gr-45 Framework For Collecting Data From Specialized Iot Devices., Md Saiful Islam Apr 2021

Gr-45 Framework For Collecting Data From Specialized Iot Devices., Md Saiful Islam

C-Day Computing Showcase

The Internet of Things (IoT) is the most significant and blooming technology in the 21st century. IoT has rapidly developed by covering hundreds of applications in the civil, health, military, and agriculture areas. IoT is based on the collection of sensor data through an embedded system, and this embedded system uploads the data on the internet. Devices and sensor technologies connected over a network can monitor and measure data in real-time. The main challenge is to collect data from IoT devices, transmit them to store in the Cloud, and later retrieve them at any time for visualization and data analysis. …


Gr-50 Predicting Users' Engagement During Interviews With Biofeedback, Voice, And Supervised Machine Learning, Thaide Huichapa Apr 2021

Gr-50 Predicting Users' Engagement During Interviews With Biofeedback, Voice, And Supervised Machine Learning, Thaide Huichapa

C-Day Computing Showcase

Studies show that the quality of the information collected during an elicitation interview, and consequently the quality of the software product that needs to be developed, highly depends on the interviewee's engagement. Because of social expectations, interviewees tend to hide if they are bored or not engaged. To overcome this problem and support the analyst during the interviews, this research uses biometric data and voice features, together with supervised machine learning algorithms, to predict the interviewee's engagement. We built our solution on an experiment consisted of interviewing 31 participants. We collected the data using an Empatica wristband and a default …


Uc-16 Understanding The Drivers Of Medication Nonadherence In The United States, Roman A Schwieterman, Austin Poole, Austin Kay, Muhammad Usman Mustafa, Issifou Ali Apr 2021

Uc-16 Understanding The Drivers Of Medication Nonadherence In The United States, Roman A Schwieterman, Austin Poole, Austin Kay, Muhammad Usman Mustafa, Issifou Ali

C-Day Computing Showcase

Medication nonadherence is generally defined as a patient’s inability to take their medications correctly as prescribed by their doctors. Medication nonadherence adversely affects patient outcomes and increases healthcare costs. Prior research found that health system-, condition-, patient- (older age is one factor), therapy- and social/economic-related factors have been identified to show effect on non-adherence. Our goal is to analyze the NHIS data to understand the sociodemographic and health causes of medication nonadherence, as well as answer the following questions about our selected topic: What variables are the most relevant drivers of nonadherence? Does the direction and strength of the associations …


Uc-37 Interactive Pdf File Editing For Online Classes, David J Hall, Chris J Stubbs, Justin Masters, Dalton G Parker, Rosendo Lopez Apr 2021

Uc-37 Interactive Pdf File Editing For Online Classes, David J Hall, Chris J Stubbs, Justin Masters, Dalton G Parker, Rosendo Lopez

C-Day Computing Showcase

This system aims to create an interactive environment for teachers to view/grade/edit student submission in virtual classes. Objectives for this project are to create independent component or logic model that includes the following functions. This component should be integrated with a .net core application easily. -Upload pdf files to the system and save files to the server; -Record audio online and save audio to the system; also, the audio can be played online; -Upload and play video or video link (YouTube); -Split file. When uploading a PDF file, the system will allow to split or crop the file (partial file …


Uc-56 Rendeview, James C Noltimier, Gyasi Igyan, Barrett Rose, Niyi Adekunle, Ashley Lowe Apr 2021

Uc-56 Rendeview, James C Noltimier, Gyasi Igyan, Barrett Rose, Niyi Adekunle, Ashley Lowe

C-Day Computing Showcase

Rendeview is a mobile application designed to allow users to find a physical meeting location equitable for 3+ people, taking into account drive time and traffic conditions.Advisors(s): Dr. Reza PariziTopic(s): Software EngineeringSWE 4724


Uc-6 Covid-19 Data Analysis - Regression, Noah Druss Apr 2021

Uc-6 Covid-19 Data Analysis - Regression, Noah Druss

C-Day Computing Showcase

Covid-19 has been arguably the most impactful event in the past century. SARS-Cov-2 is a viral respiratory illness discovered in late 2019 that has spread to almost every country in the world. It has directly or indirectly affected just about everybody in the world greatly, causing over 117 million cases and 2.59 million deaths as of March 2021. This project has focused on the use of different types of linear regression to both analyze and predict Covid-19 infection data based on different features. First, simple linear regression was used to predict total deaths based on infections both globally and by …


Uc-69 Team 10b Bchain, Jonathan D Lashgari, Carlos A Diaz, Jeffery Erhunse, Caleb T Goff, Giang T Nguyen Apr 2021

Uc-69 Team 10b Bchain, Jonathan D Lashgari, Carlos A Diaz, Jeffery Erhunse, Caleb T Goff, Giang T Nguyen

C-Day Computing Showcase

BChain is a new P2P file sharing system that is fully private, anonymous, globally self-verifying, and utilizes an automatic peer-maintained network of trust in data, accomplished through new methods of routing content over the whole network, encrypted, rather than per torrent download. Verification is done by adding file metadata to a blockchain giving the network consistent knowledge of each file it can transfer, and how to verify file received against the network. This enables a policy of zero trust against peers. This system is implemented by an app that interfaces with the network using the protocol, using it for upload, …


Uc-7 Software Engineer – Clarity Llc, Amy Mullins Apr 2021

Uc-7 Software Engineer – Clarity Llc, Amy Mullins

C-Day Computing Showcase

Clarity makes an app called CaptionMate that does closed captions for phone calls.. During the internship, a website was made to visualize metrics that are collected on users such as calls made, minutes used, time active, region, age, theme, font, and platform used. Bar charts are used to show minutes and calls used on days of the week. 100% bar charts are used to show how much a day contributes to the usage of the app; a user contributes to minutes, calls and platform usage; and show calls incoming vs. outgoing. Line graphs were created to show growth in app …


Ur-48 Using Semantic Segmentation In A Convoluted Neural Network For Vocal Localization In Music, Trevor E Stanca, Trinite, Noah Apr 2021

Ur-48 Using Semantic Segmentation In A Convoluted Neural Network For Vocal Localization In Music, Trevor E Stanca, Trinite, Noah

C-Day Computing Showcase

I. PROJECT OVERVIEW A. Research Question In this project, the question was asked: ”Is there an easier way to extract vocals from music?” Many other works are able to extract vocals with Deep Neural Networks using Multitask Learning, which are large and take a long time to train. To rival this, we wish to present a method to identify vocals with a Convolutional U-Network (U-Net) for Semantic Segmentation of audio files. B. Project Description This project differs from other works by identifying vocal locations by converting audio files in Short Time Fourier Transforms(STFT), and treating them as images in the …


Ur-66 Image Segmentation With Machine Learning, Kedar A Johnson Apr 2021

Ur-66 Image Segmentation With Machine Learning, Kedar A Johnson

C-Day Computing Showcase

An experiment-based analysis of the performance of machine learning algorithms in image segmentation. The experiment is organized to test three experimental groups representing supervised, unsupervised and reinforcement machine learning. The three experimental groups are exposed to three datasets of images for training and testing. They’re performance results are recorded and compared for a statistically significant difference in mean performance values. These results are assumed to identify a trend in differences in performance if a statistically significant difference in performance statistics is discovered between any of the three groups. This experiment will follow a quasi-experimental design because of the absence of …


Gc-54 Covid-19 Mortality Prediction Using Machine Learning Techniques, Lindsay Schirato, Kennedy Makina, Dwayne Flanders Apr 2021

Gc-54 Covid-19 Mortality Prediction Using Machine Learning Techniques, Lindsay Schirato, Kennedy Makina, Dwayne Flanders

C-Day Computing Showcase

In late 2019, SARS-CoV2 also known as COVID-19 was first identified in the city of Wuhan, China. This virus can infect a person and without showing any signs of sickness, can spread of COVID-19 unknowingly. The World Health Organization declared it a global pandemic in March 2020 because of its far-reaching effects in every part of the world. Scientists have been working to leverage technology to prevent spread, detection and vaccine development. With machine learning, models can predict which patient will most likely have a higher mortality rate. Using WEKA, a machine learning tool and a data set based on …


Gr-29 Wrist Intent Recognition For Stroke Rehabilitation, Suman Bharti Apr 2021

Gr-29 Wrist Intent Recognition For Stroke Rehabilitation, Suman Bharti

C-Day Computing Showcase

Abstract Hand mentor robotic device is beneficial for stroke patients . This is rehabilitation technique used in stroke therapy. It strengthens and improves the range of motion which ultimately improves the quality of life for severely impaired stroke patients. It is easy to use without assistance and most importantly stroke survivors able to use independently. Usage of hand mentor device is quite expensive for stroke patients on hourly basis . Coming up with most efficient deep learning algorithm for sensor data is motivation to cut down the cost and easy availability usage for stroke patients. EMG signal is recorded using …


Gr-34 Defensive Neural Network, Hongkyu Lee Apr 2021

Gr-34 Defensive Neural Network, Hongkyu Lee

C-Day Computing Showcase

Machine learning (ML) algorithms require a massive amount of data. Firms such as Google and Facebook exploit user's data to deliver a more precise ML-based service. However, collecting users' data is a risky action because their private data can be leaked through the transmission. As a remedy, federated learning is introduced. In federated learning, a central server distributes a machine learning model to users. Each user trains the model to its data, and send the model back. Later the models are aggregated and distributed again. Federated learning is more secure in that it emancipates users from the risk of sending …


Uc-30 Malware Analysis Using Reverse Engineering, William K Pharr, Kelton Reid, Icyss M Strong, Michael R Lewis Apr 2021

Uc-30 Malware Analysis Using Reverse Engineering, William K Pharr, Kelton Reid, Icyss M Strong, Michael R Lewis

C-Day Computing Showcase

Cybercrimes are a billion-dollar industry that is rapidly growing by the day. One of the biggest threats faced by companies is the infection of malware. New forms of malware are created daily and ever evolving to evade detection methods. Understanding how malware infects your system and how it eludes detection is crucial to keeping a company's network and devices safe. During this project we will be using reverse engineering methods to better understand the functionality of malware, as well as how it eludes detection. We will be using IDAPro and WiDbg to perform the reverse engineering. Using this knowledge, we …


Uc-59 Analyzing Concentration Levels In Online Learning With Facial Values, Elliott J Witherell, Jakeira Askew, Jonathan R Dicks, Steven C Mcguire, Jacob A Walton Apr 2021

Uc-59 Analyzing Concentration Levels In Online Learning With Facial Values, Elliott J Witherell, Jakeira Askew, Jonathan R Dicks, Steven C Mcguire, Jacob A Walton

C-Day Computing Showcase

Can deep learning models accurately predict whether an individual is focused or distracted on a task in order to improve learning efficiency? In the context of online learning with the use of a webcam, this project is aimed at detecting concentration levels of students to potentially assist with improving learning efficiency. Machine learning technologies have been utilized to evaluate students’ facial expression and eye movements to identify whether a student is focused or distracted. The machine learning branch that is employed is a supervised learning model. This supervised learning model makes predictions based on given input features. A total of …


Ur-41 The Accessibility Of The Mobile Gaming Platform For The Visually Impaired, Christian Thomas Jansen Apr 2021

Ur-41 The Accessibility Of The Mobile Gaming Platform For The Visually Impaired, Christian Thomas Jansen

C-Day Computing Showcase

The motivation for this project is to research mobile gaming interfaces with the goal of conceptualizing practices in game design that would create more accessible interfaces for the visual impairment community. Thus far, the project has focused on practices that mobile game designers can use to make their games more accessible to the visually impaired. These includes the use of plain text rather than graphics to be scannable by screen readers, the inclusion of audio-oriented support and instruction, the use of contrasting colors to make options more recognizable to those with partial visual impairments, and the implementation of game mechanics …


Ur-46 Breastnet;, Cora L Meador, Ryan Deem Apr 2021

Ur-46 Breastnet;, Cora L Meador, Ryan Deem

C-Day Computing Showcase

In the United states, 13% of women are diagnosed with breast cancer in their lifetime, and it is the second leading cause of death by cancer in women. Early detection and screening can result in an increase of life expectancy by 10 years on average. Unfortunately, breast cancer can be challenging to detect, since it can appear anywhere in the breast. Cancer that is detected in its early stages can give patients more options and save thousands of dollars in medical costs. Some of the most recent developments in computer science and machine learning are in the biomedical field, especially …


Ur-65 Cnn Cifar Image Identification, Matteo L Staciarine Apr 2021

Ur-65 Cnn Cifar Image Identification, Matteo L Staciarine

C-Day Computing Showcase

Reducing the learning rate of a CNN can positively affect the validation accuracy of a machine learning model. Dropping out nodes from different layers can further delay overfitting from happening. Validation loss decreases over more epochs, but it must be cut when it reaches its minimum value.Advisors(s): Dr. Dan LoTopic(s): Artificial Intelligence


Uc-11 Information Recall For Kids With Autism, Alex J Bechke, Elizabeth Burnside, Haiden Gembinski, Ross Murphy, Ryan Taylor, Henok Demisse Apr 2021

Uc-11 Information Recall For Kids With Autism, Alex J Bechke, Elizabeth Burnside, Haiden Gembinski, Ross Murphy, Ryan Taylor, Henok Demisse

C-Day Computing Showcase

Description: Our project "Information Recall For Kids With Autism" also known as the product name given by the client "Safe Kid" is an app to help children with autism understand basic contact information such as phone numbers, addresses, and names. This app is being created for our client Spectrum Behavioral Associates who specialize in helping kids and young adults who have autism, learning development delays, or other behavioral challenges. Motivation: To teach kids who have autism basic contact information in case of an emergency. Materials and Methods: The app we are creating is a local based app made within Unity. …