An Agent Oriented Architecture to Supply Dynamic Document Generation in ERP Systems
SeyedehZahra Hosseini, Hassan Haghighi, Seyedeh Elaheh Jalambadani
Presented by: SeyedehZahra Hosseini, Iowa State University
One of the most important aspects expected from an ERP system is to manage user\administrator manual documents dynamically. Since an ERP package is frequently changed during its implementation in customer sites, it is often needed to add new documents and/or apply required changes to existing documents in order to cover new or changed capabilities. In this paper, we propose a new architecture which is based on the agent-oriented vision and supplies the dynamic document generation expected from ERP systems using several independent but cooperative agents. Besides that, the presented architecture will address some aspects of intelligence and learning capabilities existing in ERP.
Coe College Physics Department: Women in Computing
Presented by: Annie Ruckman, Coe College
Women are underrepresented in STEM careers, especially those involving computer literacy. The Coe College Physics Department offers women the opportunity to conduct research in hardware development in addition to computational simulation. Women are able to analyze protein structures, examine high-energy particle interactions, and develop models for biomedical applications. Computer science is vital when investigating nanoscale phenomena, organizing data, and modeling results. In addition to C++ and Python, it is critical to utilize programs including: MatLab, GROMACS, Geant4, VMD, NAMD, and ROOT. Research possibilities and technological advancements are limitless with women in computing.
Data mining in weather forecasting
Francoise Umubyeyi, Francoise Umubyeyi
Presented by: Francoise Umubyeyi, William Penn University
Weather forecasting has been one of the most scientifically challenging problems around the world due to continuously changing weather conditions. Observations of patterns of changing conditions create an opportunity for meteorologists to use advanced technology for weather forecasting. Data mining is considered to be the most feasible approach, and has been applied to develop an accurate data model for forecasting weather. The data mining predictive model is applied to historical weather data to analyse fluctuating patterns that are, in turn, used to approximate upcoming weather conditions. This paper provides an analysis of data mining techniques being used in weather prediction.
Disaster Relief: Making an impact from 700 miles away using technology.
Whitney Hicks, Jordan Crow, Chanelle Hanks, Alison Sirna
Hurricane Harvey unleashed trillions of gallons of water causing catastrophic flooding in Southeast Texas. Misplaced families are forced to sleep in tents and on floors months after the disaster took place. We created an organization called Beds For Texans dedicated to providing brand new beds to families who have lost everything. Our presentation will demonstrate the circumstances of the flood victims, the development/success of our organization with real life data. We will show case our use of various computing platforms which has made providing direct relief to Texans possible from 700 miles away.
DIVAS: Using Image Processing in Natural Science Research
Keeliann Mark, AdreAnna Ernest, Marisa Foster
Presented by: Marisa Foster, Doane University
Our poster describes our experiences with the DIVAS (Digital Imaging and Vision Applications in Science) Project. Our coding experience started with a five day coding boot-camp at the beginning of the summer and continued throughout the summer where we worked on both group and individual projects. During the five day boot-camp, we obtained skills in bash, git, Python, and OpenCV. The individual research projects, focusing on genuine scientific problems, included detection and quantification of free amines secreted by maize roots, automating width detection of biofilms on Arabidopsis thaliana, and real time color detection of acid titrations.
Finding the Rumor Source on Social Network
Presented by: Preeti Bhardwaj, Iowa State University
It is about the problem of finding a small subset of nodes (seed nodes) in a social network that had spread the rumor. The motivation behind this research project is to detect worms or viruses sources in computer network, find the origin of a infectious disease or cause of failure in financial market. I am working towards applying different algorithms with heuristic function to get the nodes which are influenced by rumor and to get the rumor source.
High-Density Clients Lead to Wi-Fi Upgrade
Haymanot Gebre-Amlak, Moe Al Mansoori, Tajul Md Islam, Daniel Cummins, Baek-Young Choi
Presented by: Helen Gebre-Amlak, University of Missouri – Kansas City
In this poster, we carry out an in-depth analysis of a university campus Wi-Fi upgrade deployment to address the High-density issue. We explore the various design consideration done when implementing Wi-Fi 802.11 ac, to improve compatibility, data rate, coverage and performance. Our analysis shows that although the number of people in the campus have decreased this semester, both network flows and traffics have increased as much as 20% which have driven increased number of wifi devices in the network.
HPC-Bench: A Tool to Optimize HPC Benchmarking Workflow
Gianina Alina Negoita, Glenn R. Luecke, Shashi K. Gadia, Gurpur M. Prabhu
Presented by: Dr. Gianina Alina Negoita, Iowa State University
The evaluation of the performance of applications on high performance computers (HPC) can be long and tedious. To optimize the workflow needed for this process, we have developed a tool, HPC-Bench, using the Cyclone Database Implementation Workbench (CyDIW) developed at Iowa State University. HPC-Bench integrates our workflow into CyDIW as a plain text file and encapsulates the specified commands for multiple client systems. Using our tool optimizes the benchmarking workflow and saves time in analyzing performance results by automatically generating performance graphs. Use of HPC-Bench is illustrated with multiple MPI and SHMEM applications which were run on NERSC’s Cray XC30.
Implicit Relations to improve Saturation
Shruti Biswal, Andrew S Miner, Benjamin Smith
Presented by: Shruti Biswal, Iowa State University
Given the versatility for functional representation and availability of numerous algorithms for the efficient construction and storage, it has been long since decision diagrams have established their identity in symbolic methods of high-level model analysis. However, the representation of such models by decision diagrams often is an overkill due to expensive re-building procedure. Hence, we propose a data structure, implicit relation, that manages to retain the information of model with improved time and space attributes. Saturation algorithm for reachability set generation, which is crucial for model checking, shows time and memory improvement when coupled with implicit relations.
Improved Triangle Counting in Graph Streams: Power of Multi-Sampling
Neeraj Kavassery-Parakkat, Kiana Mousavi Hanjani, Aduri pavan
Presented by: Kiana Mousavi, Iowa State University
In this work, we propose a multi-sampling variant of these algorithms: In case of Buriol et al’s algorithm, instead of randomly choosing a single vertex and edge, randomly sample multiple vertices and multiple edges and and collect cross edges that connect sampled vertices to the sampled edges. In case of neighborhood sampling algorithm, randomly pick multiple edges and pick their multiple neighbors.
We provide a theoretical analysis of these algorithms and prove that this simple modification yields improves upon the known space and accuracy bounds. We experimentally show that these algorithms out perform several well known triangle counting streaming algorithms.
Internet of things(IOT) and it’s application
Presented by: Sumnima Rana, Northwest Missouri State University
Based on the exhaustive review of the currently available products, this project/poster is to show how IOT has worked throughout the internet connection providing any useful function to users. This project includes the analyzing heartbeat sensor of the person with cellular calling connectivity attached to it. In this project, the sensor is an interface to a microcontroller that allows checking heart rate readings and transmitting them over the internet. Thus, this project and the poster explains and conclude about the internet connectivity and the communication that occurs between the objects and the internet-enabled devices.
Presented by: Pavithra Devdas, Northwest Missouri State University
Jira is an All-in-one Software Development tool used by agile teams to plan road-maps, track work and distribute tasks across the team. It helps product owners to create bugs, prioritize issues and visually represent the work in progress on Scrum,Kanban boards. Jira improves productivity and quality of the product and supports continuous integration which allows us to monitor build processes. It has Agile reports which clearly shows real time insight on team’s performance during the sprint. It can be easily integrated with developer tools for end-to-end traceability. It helps in backlog grooming, sprint planning and provides transparency to the team.
Smart City Open Data: Openness, Privacy and Security
Almansoori Mohammed, Rafida Zaman, Baek-Young Choi
Presented by: Rafida Zaman, University of Missouri Kansas City
Smart cities create well-connected cities to optimize and automate all the possible services, by using a wide range of data. The open data portals are main interaction interface for data. This traffic from/to/through the ODP and the server must be secured and monitored. In this study multiple methods used including; Running security tests, HTTP traffic analysis, cURL analysis, etc and developing a real-time tool to detect and filter the sensitive information in the raw captured data. Security and privacy practices of portals significantly vary among the cities, and most of them have some known security vulnerabilities and privacy issues.
The Success Game: Academic Guide for International Students in the US
Alanne Godinho, Joonghyun Park
Presented by: Alanne Godinho, Iowa State University
Many international students fail to assimilate into America’s academic culture. Facing this harsh reality, many lose interest in US culture, surrounding themselves mostly by their compatriots, and missing key aspects of college/professional life. With advisory help from the International Student Support Advisers, this project consists of developing a game that gathers users’ academic information/goals, college/major facts, US laws, and job market – simulating opportunities/challenges that one may encounter while studying in America. The conclusion of this project may guide international students into making the most out their stay, and being prepared for all possibilities after graduation.
Understanding the rating behavior of the reviewers based on moral foundations: The case of Yelp.com
Presented by: Pegah Nokhiz, University of Kansas
Moral foundations can affect the way people behave in social networks. But how does this effect present itself when people are rating various businesses online? Analysis of a corpus of over 7,000 online reviews on Yelp, using Doc2Vec, a natural language processing embedding tool, reveals that the reviewers manifest these moral concerns by rating with fewer stars should they be concerned about ingroup, authority, harm, and fairness moral issues. However, people who rate based on the moral purity content, do not follow a specific pattern. The reviewers also show similar behavior in their average ratings based on their moral tendencies.
Xstreaming Fitness: Internship Experience
Presented by: Nikhita Sharma, Iowa State University
I am going to talk about Xstreaming Fitness, my internship project at Sincera Solutions(Iowa), this summer. It is a technology advocate for fitness clubs that allows them to market group fitness classes to remote clients.
I will be sharing my experience of learning a new technology (C# MVC), the difficulties I faced, and how I overcame them to successfully develop connectivity between a mobile and web application, while being the only girl in the office.