Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

206,324 Full-Text Articles 255,700 Authors 47,230,550 Downloads 403 Institutions

All Articles in Physical Sciences and Mathematics

Faceted Search

206,324 full-text articles. Page 1 of 5681.

An Enticing Study Of Prime Numbers Of The Shape ?? = ??^2 + ??^2, Xiaona Zhou 2020 CUNY New York City College of Technology

An Enticing Study Of Prime Numbers Of The Shape ?? = ??^2 + ??^2, Xiaona Zhou

Publications and Research

We will study and prove important results on primes of the shape ??2 + ??2 using number theoretic techniques. Our analysis involves maps, actions over sets, fixed points and involutions. This presentation is readily accessible to an advanced undergraduate student and lay the groundwork for future studies.


Practical Server-Side Indoor Localization: Tackling Cardinality & Outlier Challenges, Anuradha RAVI, Archan MISRA 2020 Singapore Management University

Practical Server-Side Indoor Localization: Tackling Cardinality & Outlier Challenges, Anuradha Ravi, Archan Misra

Research Collection School Of Information Systems

In spite of many advances in indoor localization techniques, practical implementation of robust deviceindependent, server-side Wi-Fi localization (i.e., without any active participation of client devices) remains a challenge. This work utilizes an operationally-deployed Wi-Fi based indoor location infrastructure, based on the classical RADAR algorithm, to tackle two such practical challenges: (a) low cardinality, whereby only the associated AP generates sufficient RSSI reports and (b) outlier identification, which requires explicit identification of mobile clients that are attached to the Wi-Fi network but outside the fingerprinted region. To tackle the low-cardinality problem, we present a technique that uses cardinality changes to ...


Learning-Guided Network Fuzzing For Testing Cyber-Physical System Defences, Yuqi CHEN, Christopher M. POSKITT, Jun SUN, Sridhar ADEPU, Fan ZHANG 2020 Singapore Management University

Learning-Guided Network Fuzzing For Testing Cyber-Physical System Defences, Yuqi Chen, Christopher M. Poskitt, Jun Sun, Sridhar Adepu, Fan Zhang

Research Collection School Of Information Systems

The threat of attack faced by cyber-physical systems (CPSs), especially when they play a critical role in automating public infrastructure, has motivated research into a wide variety of attack defence mechanisms. Assessing their effectiveness is challenging, however, as realistic sets of attacks to test them against are not always available. In this paper, we propose smart fuzzing, an automated, machine learning guided technique for systematically finding 'test suites' of CPS network attacks, without requiring any knowledge of the system's control programs or physical processes. Our approach uses predictive machine learning models and metaheuristic search algorithms to guide the fuzzing ...


Children In 2077: Designing Children’S Technologies In The Age Of Transhumanism, O?uz Oz Buruk, O?uzhan ?zcan, G?k?e Elif Baykal, Tilbe G?ksun, Sel?uk Acar, Güler Akduman, Mehmet Ayd?n Bayta?, Ceylan Be?evli, Joe Best, Aykut Co?kun, Hüseyin U?ur Gen?, Baki Kocaballi, Samuli Laato, Cássia Mota, Konstantinos Papangelis, Marigo Raftopoulos, Richard Ramchurn, Juan Sádaba, Mattia Thibault, Annika Wolff, Mert Y?ld?z 2020 Tampere University of Technology

Children In 2077: Designing Children’S Technologies In The Age Of Transhumanism, O?uz Oz Buruk, O?uzhan ?zcan, G?k?e Elif Baykal, Tilbe G?ksun, Sel?uk Acar, Güler Akduman, Mehmet Ayd?n Bayta?, Ceylan Be?evli, Joe Best, Aykut Co?kun, Hüseyin U?ur Gen?, Baki Kocaballi, Samuli Laato, Cássia Mota, Konstantinos Papangelis, Marigo Raftopoulos, Richard Ramchurn, Juan Sádaba, Mattia Thibault, Annika Wolff, Mert Y?ld?z

Presentations and other scholarship

What for and how will we design children’s technologies in the transhumanism age, and what stance will we take as designers? This paper aims to answer this question with 13 fictional abstracts from sixteen authors of different countries, institutions and disciplines. Transhumanist thinking envisions enhancing human body and mind by blending human biology with technological augmentations. Fundamentally, it seeks to improve the human species, yet the impacts of such movement are unknown and the implications on children’s lives and technologies were not explored deeply. In an age, where technologies can clearly be defined as transhumanist, such as under-skin ...


"A Comparison Of Variable Selection Methods Using Bootstrap Samples From Environmental Metal Mixture Data", Paul-Yvann Djamen 4785403, Paul-Yvann Djamen 2020 University Of New Mexico

"A Comparison Of Variable Selection Methods Using Bootstrap Samples From Environmental Metal Mixture Data", Paul-Yvann Djamen 4785403, Paul-Yvann Djamen

Mathematics & Statistics ETDs

In this thesis, I studied a newly developed variable selection method SODA, and three customarily used variable selection methods: LASSO, Elastic net, and Random forest for environmental mixture data. The motivating datasets have neuro-developmental status as responses and metal measurements and demographic variables as covariates. The challenges for variable selections include (1) many measured metal concentrations are highly correlated, (2) there are many possible ways of modeling interactions among the metals, (3) the relationships between the outcomes and explanatory variables are possibly nonlinear, (4) the signal to noise ratio in the real data may be low. To compare these methods ...


Passive Quadrupedal Gait Synchronization For Extra Robotic Legs Using A Dynamically Coupled Double Rimless Wheel Model, Daniel J. Gonzalez, Harry Asada 2020 USMA West Point & MIT

Passive Quadrupedal Gait Synchronization For Extra Robotic Legs Using A Dynamically Coupled Double Rimless Wheel Model, Daniel J. Gonzalez, Harry Asada

West Point Research Papers

The Extra Robotic Legs (XRL) system is a robotic augmentation worn by a human operator consisting of two articulated robot legs that walk with the operator and help bear a heavy backpack payload. It is desirable for the Human-XRL quadruped system to walk with the rear legs lead the front by 25% of the gait period, minimizing the energy lost from foot impacts while maximizing balance stability. Unlike quadrupedal robots, the XRL cannot command the human's limbs to coordinate quadrupedal locomotion. Connecting the XRL to the human using a passive coupler, we have found that the two bipeds converge ...


Does Updating Natural Hazard Maps To Reflect Best Practices Increase Viewer Comprehension Of Risk?, Carson C. MacPherson-Krutsky, Brittany D. Brand, Michael K. Lindell 2020 Boise State University

Does Updating Natural Hazard Maps To Reflect Best Practices Increase Viewer Comprehension Of Risk?, Carson C. Macpherson-Krutsky, Brittany D. Brand, Michael K. Lindell

Geosciences Faculty Publications and Presentations

In this study, we examine whether updating an interactive hazard map using recommendations from the literature improves user map comprehension. Analyses of experimental data collected from 75 university students revealed that map comprehension scores were not significantly better for those who viewed a “best practices” map compared to those who viewed an existing version. This may be because the existing map was itself better than most other interactive maps. Additionally, we found map comprehension levels to have significant positive relationships with objective tests, but not self-reported measures of spatial ability. Moreover, self-reported spatial ability had statistically significant, but only moderately ...


Singular Value Decomposition, Krystal Bonaccorso, Andrew Incognito 2020 Coastal Carolina University

Singular Value Decomposition, Krystal Bonaccorso, Andrew Incognito

Honors Theses

A well-known theorem is Diagonalization, where one of the factors is a diagonal matrix. In this paper we will be describing a similar way to factor/decompose a non-square matrix. The key to both of these ways to factor is eigenvalues and eigenvectors.


Hplc Detection Of Organic Gunshot Residues With Silicone Wristbands, Yelyzaveta Zuy 2020 University of Tennessee at Chattanooga

Hplc Detection Of Organic Gunshot Residues With Silicone Wristbands, Yelyzaveta Zuy

Honors Theses

The analysis of gunshot residue (GSR) is frequently used to aid in investigating firearm-related crimes. Typically, Scanning Electron Microscopy (SEM) is applied for inorganic analysis of elements such as lead, barium, and antimony to study GSR. However, heavy metal-free ammunition creates the need for a different type of approach. This research focuses on studying the potential of detecting organic gunshot residue (OGSR) collected with silicone wristbands through passive sampling. This study has been directed towards the development of an optimal High Performance Liquid Chromatography (HPLC) procedure for the detection and separation of five selected compounds typically found in OGSR. The ...


Molecular Dynamics Simulations Of Apolipoprotein A1 In Ionic Liquids, Benjamin Smith 2020 University of Tennessee at Chattanooga

Molecular Dynamics Simulations Of Apolipoprotein A1 In Ionic Liquids, Benjamin Smith

Honors Theses

High-density lipoprotein function is essential for the healthy processing of fats in the blood. The function of these proteins is determined by their conformational structure of chains of amino acids. Certain ionic liquids have been shown to interact with individual amino acids to affect the tertiary shape of the protein. These interactions can disrupt the native hydrogen bonds between amino acids which can either promote folding or denaturing of the protein. Our work focused on apoA-1, a high-density lipoprotein that binds to cholesterol for efflux from the body. We studied this protein in different ion-based liquids with sodium, chloride, and ...


Semisimple Subalgebras Of Semisimple Lie Algebras, Mychelle Parker 2020 Utah State University

Semisimple Subalgebras Of Semisimple Lie Algebras, Mychelle Parker

All Graduate Theses and Dissertations

Let g be a Lie algebra. The subalgebra classification problem is to create a list of all subalgebras of g up to equivalence. The purpose of this thesis is to provide a software toolkit within the Differential Geometry package of Maple for classifying subalgebras of In particular the thesis will focus on classifying those subalgebras which are isomorphic to the Lie algebra sl(2) and those subalgebras of which have a basis aligned with the root space decomposition (regular subalgebras).


'Lmshapemaker': Utilizing The 'Rmapshaper' R Package To Modify Shapefiles For Use In Linked Micromap Plots, Braden D. Probst 2020 Utah State University

'Lmshapemaker': Utilizing The 'Rmapshaper' R Package To Modify Shapefiles For Use In Linked Micromap Plots, Braden D. Probst

All Graduate Theses and Dissertations

In order to effectively create map-based visualizations, some map modifications need to be conducted to ensure the map is readable and interpretable. There are several issues that need to be addressed to achieve this. The boundaries of a country may be overly complex which is particularly true with coastal areas of countries. Regions may be small and not seen in the final plot, as is the case with many capital cities in the world’s countries such as Washington D.C. and the Federal District of Mexico City. In other countries, regions may geographically lie far away from the rest ...


Nanotextural And Nanochemical Constraints On The Role Of Heat In The Development Of Crystalline-Hosted, Silica-Rich Fault Mirrors In The Wasatch Fault Damage Zone, Utah, Usa, Leah M. Houser 2020 Utah State University

Nanotextural And Nanochemical Constraints On The Role Of Heat In The Development Of Crystalline-Hosted, Silica-Rich Fault Mirrors In The Wasatch Fault Damage Zone, Utah, Usa, Leah M. Houser

All Graduate Theses and Dissertations

Earthquakes occur on faults, or rock that has experienced displacement at depth. Experimental work on a range of rock types reveals that >90% of earthquake energy on fault surfaces is given off as heat. Heat weakens rock and promotes earthquake rupture propagation. Thin (<0.5mm), high-gloss, “polished”, light-reflective exposed fault surfaces are called fault mirrors (FMs). Fault mirrors may record rapid thermal, textural, and chemical changes that occur during an earthquake event.

The Wasatch Mountains are a N-S trending mountain range in Northern Utah that are the backdrop for Salt Lake City, Provo, Ogden, and Brigham City. This mountain range is currently built by the active Wasatch fault, and includes the exposed Wasatch fault damage zone. Many segments of the Wasatch fault are overdue for a potentially catastrophic earthquake ...


Predicting The Impact Of Weather On Rural Travel Times Using Now-Cast Weather Forecast Data, Manish Meshram 2020 Utah State University

Predicting The Impact Of Weather On Rural Travel Times Using Now-Cast Weather Forecast Data, Manish Meshram

All Graduate Theses and Dissertations

In the states which record extreme weather conditions and high snow in winters, the travel time to drive between cities can get highly affected due to these bad weather conditions. The present solutions to tackle this problem are largely flow or time related and do not take weather conditions into account while making the predictions about travel time. Also these solutions can mostly be used for real time travel and not the future travel. In addition to that, the studies that have been done in this space are mostly for urban travel times but most parts of the interstate highways ...


White-Box Fairness Testing Through Adversarial Sampling, Peixin ZHANG, Jingyi WANG, Jun SUN, Guoliang DONG, Xinyu WANG, Xingen WANG, Jin Song DONG, Dai TING 2020 Zhejiang University

White-Box Fairness Testing Through Adversarial Sampling, Peixin Zhang, Jingyi Wang, Jun Sun, Guoliang Dong, Xinyu Wang, Xingen Wang, Jin Song Dong, Dai Ting

Research Collection School Of Information Systems

Although deep neural networks (DNNs) have demonstrated astonishing performance in many applications, there are still concerns on their dependability. One desirable property of DNN for applications with societal impact is fairness (i.e., non-discrimination). In this work, we propose a scalable approach for searching individual discriminatory instances of DNN. Compared with state-of-the-art methods, our approach only employs lightweight procedures like gradient computation and clustering, which makes it significantly more scalable than existing methods. Experimental results show that our approach explores the search space more effectively (9 times) and generates much more individual discriminatory instances (25 times) using much less time ...


Symbolic Verification Of Message Passing Interface Programs, Hengbiao YU, Zhenbang CHEN, Xianjin FU, Ji WANG, Zhendong SU, Jun SUN, Chun HUANG, Wei DONG 2020 National University of Defense Technology

Symbolic Verification Of Message Passing Interface Programs, Hengbiao Yu, Zhenbang Chen, Xianjin Fu, Ji Wang, Zhendong Su, Jun Sun, Chun Huang, Wei Dong

Research Collection School Of Information Systems

Message passing is the standard paradigm of programming in high-performance computing. However, verifying Message Passing Interface (MPI) programs is challenging, due to the complex program features (such as non-determinism and non-blocking operations). In this work, we present MPI symbolic verifier (MPI-SV), the first symbolic execution based tool for automatically verifying MPI programs with non-blocking operations. MPI-SV combines symbolic execution and model checking in a synergistic way to tackle the challenges in MPI program verification. The synergy improves the scalability and enlarges the scope of verifiable properties. We have implemented MPI-SV and evaluated it with 111 real-world MPI verification tasks. The ...


Key Regeneration-Free Ciphertext-Policy Attribute-Based Encryption And Its Application, Hui CUI, Robert H. DENG, Baodong QIN, Jian WENG 2020 Singapore Management University

Key Regeneration-Free Ciphertext-Policy Attribute-Based Encryption And Its Application, Hui Cui, Robert H. Deng, Baodong Qin, Jian Weng

Research Collection School Of Information Systems

Attribute-based encryption (ABE) provides a promising solution for enabling scalable access control over encrypted data stored in the untrusted servers (e.g., cloud) due to its ability to perform data encryption and decryption defined over descriptive attributes. In order to bind different components which correspond to different attributes in a user's attribute-based decryption key together, key randomization technique has been applied in most existing ABE schemes. This randomization method, however, also empowers a user the capability of regenerating a newly randomized decryption key over a subset of the attributes associated with the original decryption key. Because key randomization breaks ...


Design Of Submicron Structured Guided-Mode-Resonance Near-Infrared Polarizer, Marzia Zaman 2020 University of Arkansas, Fayetteville

Design Of Submicron Structured Guided-Mode-Resonance Near-Infrared Polarizer, Marzia Zaman

Theses and Dissertations

The objective of this research is to design a larger submicron linear polarizer in the near-infrared wavelength range with a wide bandwidth which can be fabricated using the conventional thin-film microfabrication technology to reduce cost. For this purpose, a gold (Au) wire-grid transmission-type transverse-magnetic (TM) polarizer and a silicon (Si) wire-grid reflection-type TM polarizer, were designed using the guided-mode-resonance filter. The Au wire-grid TM polarizer of 700nm grating width and 1200nm grating period has 95% transmittance at 2400nm, more than 1000nm resonance peak bandwidth, and an extinction ratio (ER) of around 300 with a moderated level of sidebands. The 700nm ...


An Empirical Study On The Use And Misuse Of Java 8 Streams, Raffi T. Khatchadourian, Yiming Tang, Mehdi Bagherzadeh, Baishakhi Ray 2020 CUNY Hunter College

An Empirical Study On The Use And Misuse Of Java 8 Streams, Raffi T. Khatchadourian, Yiming Tang, Mehdi Bagherzadeh, Baishakhi Ray

Publications and Research

Streaming APIs allow for big data processing of native data structures by providing MapReduce-like operations over these structures. However, unlike traditional big data systems, these data structures typically reside in shared memory accessed by multiple cores. Although popular, this emerging hybrid paradigm opens the door to possibly detrimental behavior, such as thread contention and bugs related to non-execution and non-determinism. This study explores the use and misuse of a popular streaming API, namely, Java 8 Streams. The focus is on how developers decide whether or not to run these operations sequentially or in parallel and bugs both specific and tangential ...


An Empirical Study On The Use And Misuse Of Java 8 Streams, Raffi T. Khatchadourian, Yiming Tang, Mehdi Bagherzadeh, Baishakhi Ray 2020 CUNY Hunter College

An Empirical Study On The Use And Misuse Of Java 8 Streams, Raffi T. Khatchadourian, Yiming Tang, Mehdi Bagherzadeh, Baishakhi Ray

Publications and Research

Streaming APIs allow for big data processing of native data structures by providing MapReduce-like operations over these structures. However, unlike traditional big data systems, these data structures typically reside in shared memory accessed by multiple cores. Although popular, this emerging hybrid paradigm opens the door to possibly detrimental behavior, such as thread contention and bugs related to non-execution and non-determinism. This study explores the use and misuse of a popular streaming API, namely, Java 8 Streams. The focus is on how developers decide whether or not to run these operations sequentially or in parallel and bugs both specific and tangential ...


Digital Commons powered by bepress

RB88 热博sbt体育| 热博rb88| rb88| 热博体育| rb88| BTI体育| 热博| 热博手机版| rb88热博电竞平台| 热博sbt体育| rb88| 热博随行版| 热博体育官网|