Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

23,568 Full-Text Articles 38,376 Authors 8,340,641 Downloads 263 Institutions

All Articles in Computer Engineering

Faceted Search

23,568 full-text articles. Page 345 of 929.

Preference Learning And Similarity Learning Perspectives On Personalized Recommendation, Duy Dung LE 2019 Singapore Management University

Preference Learning And Similarity Learning Perspectives On Personalized Recommendation, Duy Dung Le

Dissertations and Theses Collection (Open Access)

Personalized recommendation, whose objective is to generate a limited list of items (e.g., products on Amazon, movies on Netflix, or pins on Pinterest, etc.) for each user, has gained extensive attention from both researchers and practitioners in the last decade. The necessity of personalized recommendation is driven by the explosion of available options online, which makes it difficult, if not downright impossible, for each user to investigate every option. Product and service providers rely on recommendation algorithms to identify manageable number of the most likely or preferred options to be presented to each user. Also, due to the limited screen …


Confusion And Information Triggered By Photos In Persona Profiles, Joni SALMINEN, Soon-gyo JUNG, Jisun AN, Haewoon KWAK, Lene NIELSEN, Bernard J. JANSEN 2019 Singapore Management University

Confusion And Information Triggered By Photos In Persona Profiles, Joni Salminen, Soon-Gyo Jung, Jisun An, Haewoon Kwak, Lene Nielsen, Bernard J. Jansen

Research Collection School Of Computing and Information Systems

We investigate whether additional photos beyond a single headshot makes a persona profile more informative without confusing the end user. We conduct an eye-tracking experiment and qualitative interviews with digital content creators after varying the persona in photos via a single headshot, a headshot and photo of the persona in different contexts, and a headshot with photos of different people with key persona attributes the gender and age. Findings show that contextual photos provide significantly more persona information to end users; however, showing photos of multiple people engenders confusion and lowers informativeness. Also, as anticipated, viewing additional photos requires more …


Analyzing Evolution Of Rare Events Through Social Media Data, Xiaoyu Lu 2019 New Jersey Institute of Technology

Analyzing Evolution Of Rare Events Through Social Media Data, Xiaoyu Lu

Dissertations

Recently, some researchers have attempted to find a relationship between the evolution of rare events and temporal-spatial patterns of social media activities. Their studies verify that the relationship exists in both time and spatial domains. However, few of those studies can accurately deduce a time point when social media activities are most highly affected by a rare event because producing an accurate temporal pattern of social media during the evolution of a rare event is very difficult. This work expands the current studies along three directions. Firstly, we focus on the intensity of information volume and propose an innovative clustering …


Optimal Sampling Paths For Autonomous Vehicles In Uncertain Ocean Flows, Andrew J. de Stefan 2019 New Jersey Institute of Technology

Optimal Sampling Paths For Autonomous Vehicles In Uncertain Ocean Flows, Andrew J. De Stefan

Dissertations

Despite an extensive history of oceanic observation, researchers have only begun to build a complete picture of oceanic currents. Sparsity of instrumentation has created the need to maximize the information extracted from every source of data in building this picture. Within the last few decades, autonomous vehicles, or AVs, have been employed as tools to aid in this research initiative. Unmanned and self-propelled, AVs are capable of spending weeks, if not months, exploring and monitoring the oceans. However, the quality of data acquired by these vehicles is highly dependent on the paths along which they collect their observational data. The …


Implementing A Lightweight Schmidt-Samoa Cryptosystem (Ssc) For Sensory Communications, Qasem Abu Al-Haija, Ibrahim Marouf, Mohammad M. Asad, Kamal Al Nasr 2019 Tennessee State University

Implementing A Lightweight Schmidt-Samoa Cryptosystem (Ssc) For Sensory Communications, Qasem Abu Al-Haija, Ibrahim Marouf, Mohammad M. Asad, Kamal Al Nasr

Computer Science Faculty Research

One of the remarkable issues that face wireless sensor networks (WSNs) nowadays is security. WSNs should provide a way to transfer data securely particularly when employed for mission-critical purposes. In this paper, we propose an enhanced architecture and implementation for 128-bit Schmidt-Samoa cryptosystem (SSC) to secure the data communication for wireless sensor networks (WSN) against external attacks. The proposed SSC cryptosystem has been efficiently implemented and verified using FPGA modules by exploiting the maximum allowable parallelism of the SSC internal operations. To verify the proposed SSC implementation, we have synthesized our VHDL coding using Quartus II CAD tool targeting the …


Classifying Appliances Operation Modes Using Dynamic Time Warping (Dtw) And K Nearest Neighbors (Knn), Abdelkareem M. Jaradat 2019 The University of Western Ontario

Classifying Appliances Operation Modes Using Dynamic Time Warping (Dtw) And K Nearest Neighbors (Knn), Abdelkareem M. Jaradat

Electronic Thesis and Dissertation Repository

In the Smart Grid environment, the advent of intelligent measuring devices facilitates monitoring appliance electricity consumption. This data can be used in applying Demand Response (DR) in residential houses through data analytics, and developing data mining techniques. In this research, we introduce a smart system approach that is applied to user's disaggregated power consumption data. This system encourages the users to apply DR by changing their behaviour of using heavier operation modes to lighter modes, and by encouraging users to shift their usages to off-peak hours. First, we apply Cross Correlation to detect times of the occurrences when an appliance …


Online Eeg Seizure Detection And Localization, Amirsalar Mansouri, Sanjay P. Singh, Khalid Sayood 2019 University of Nebraska - Lincoln

Online Eeg Seizure Detection And Localization, Amirsalar Mansouri, Sanjay P. Singh, Khalid Sayood

Department of Electrical and Computer Engineering: Faculty Publications

Epilepsy is one of the three most prevalent neurological disorders. A significant proportion of patients suffering from epilepsy can be effectively treated if their seizures are detected in a timely manner. However, detection of most seizures requires the attention of trained neurologists-- a scarce resource. Therefore, there is a need for an automatic seizure detection capability. A tunable non-patient-specific, non-seizure-specific method is proposed to detect the presence and locality of a seizure using electroencephalography (EEG) signals. This multifaceted computational approach is based on a network model of the brain and a distance metric based on the spectral profiles of EEG …


Learnfca: A Fuzzy Fca And Probability Based Approach For Learning And Classification, Suraj Ketan Samal 2019 University of Nebraska - Lincoln

Learnfca: A Fuzzy Fca And Probability Based Approach For Learning And Classification, Suraj Ketan Samal

Department of Computer Science and Engineering: Dissertations, Theses, and Student Research

Formal concept analysis(FCA) is a mathematical theory based on lattice and order theory used for data analysis and knowledge representation. Over the past several years, many of its extensions have been proposed and applied in several domains including data mining, machine learning, knowledge management, semantic web, software development, chemistry ,biology, medicine, data analytics, biology and ontology engineering.

This thesis reviews the state-of-the-art of theory of Formal Concept Analysis(FCA) and its various extensions that have been developed and well-studied in the past several years. We discuss their historical roots, reproduce the original definitions and derivations with illustrative examples. Further, we provide …


Limited Data Rolling Bearing Fault Diagnosis With Few-Shot Learning, Ansi Zhang, Shaobo Li, Yuxin Cui, Wanli Yang, Rongzhi Dong, Jianjun Hu 2019 University of South Carolina - Columbia

Limited Data Rolling Bearing Fault Diagnosis With Few-Shot Learning, Ansi Zhang, Shaobo Li, Yuxin Cui, Wanli Yang, Rongzhi Dong, Jianjun Hu

Faculty Publications

This paper focuses on bearing fault diagnosis with limited training data. A major challenge in fault diagnosis is the infeasibility of obtaining sufficient training samples for every fault type under all working conditions. Recently deep learning based fault diagnosis methods have achieved promising results. However, most of these methods require large amount of training data. In this study, we propose a deep neural network based few-shot learning approach for rolling bearing fault diagnosis with limited data. Our model is based on the siamese neural network, which learns by exploiting sample pairs of the same or different categories. Experimental results over …


Quantifying The Outcomes Of A Virtual Reality (Vr)-Based Gamified Neck Rehabilitation, Shahan Salim 2019 The University of Western Ontario

Quantifying The Outcomes Of A Virtual Reality (Vr)-Based Gamified Neck Rehabilitation, Shahan Salim

Electronic Thesis and Dissertation Repository

Neck pain is a major global public health concern and adds a significant financial burden to both the healthcare system as well as people suffering from it. Additionally, it presents measurement and evaluation challenges for clinicians as well as adherence challenges and treatment barriers for the patients. We have developed a virtual reality (VR)-based video game that can be used to capture outcomes that may aid in the assessment and treatment of neck pain. We investigated: (i) performance metrics of overall accuracy, accuracy based on movement difficulty, duration, and total envelope of movement; (ii) stability across sessions; (iii) accuracy across …


Machine Learning To Predict The Likelihood Of A Personal Computer To Be Infected With Malware, Maryam Shahini, Ramin Farhanian, Marcus Ellis 2019 Southern Methodist University

Machine Learning To Predict The Likelihood Of A Personal Computer To Be Infected With Malware, Maryam Shahini, Ramin Farhanian, Marcus Ellis

SMU Data Science Review

In this paper, we present a new model to predict the prob- ability that a personal computer will become infected with malware. The dataset is selected from a Kaggle competition supported by Mi- crosoft. The data includes computer configuration, owner information, installed software, and configuration information. In our research, sev- eral classification models are utilized to assign a probability of a machine being infected with malware. The LightGBM classifier is the optimum machine learning model by performing faster with higher efficiency and lower memory usage in this research. The LightGBM algorithm obtained a cross-validation ROC-AUC score of 74%. Leading factors …


Aws Ec2 Instance Spot Price Forecasting Using Lstm Networks, Jeffrey Lancon, Yejur Kunwar, David Stroud, Monnie McGee, Robert Slater 2019 Southern Methodist University

Aws Ec2 Instance Spot Price Forecasting Using Lstm Networks, Jeffrey Lancon, Yejur Kunwar, David Stroud, Monnie Mcgee, Robert Slater

SMU Data Science Review

Cloud computing is a network of remote computing resources hosted on the Internet that allow users to utilize cloud resources on demand. As such, it represents a paradigm shift in the way businesses and industries think about digital infrastructure. With the shift from IT resources being a capital expenditure to a managed service, companies must rethink how they approach utilizing and optimizing these resources in order to maximize productivity and minimize costs. With proper resource management, cloud resources can be instrumental in reducing computing expenses.

Cloud resources are perishable commodities; therefore, cloud service providers have developed strategies to maximize utilization …


Non-Parametric Combination Analysis Of Multiple Data Types Enables Detection Of Novel Regulatory Mechanisms In T Cells Of Multiple Sclerosis Patients., Sunjay Jude Fernandes, Hiromasa Morikawa, Ewoud Ewing, Sabrina Ruhrmann, Rubin Narayan Joshi, Vincenzo Lagani, Nestoras Karathanasis, Mohsen Khademi, Nuria Planell, Angelika Schmidt, Ioannis Tsamardinos, Tomas Olsson, Fredrik Piehl, Ingrid Kockum, Maja Jagodic, Jesper Tegnér, David Gomez-Cabrero 2019 Karolinska Institutet; Science for Life Laboratory

Non-Parametric Combination Analysis Of Multiple Data Types Enables Detection Of Novel Regulatory Mechanisms In T Cells Of Multiple Sclerosis Patients., Sunjay Jude Fernandes, Hiromasa Morikawa, Ewoud Ewing, Sabrina Ruhrmann, Rubin Narayan Joshi, Vincenzo Lagani, Nestoras Karathanasis, Mohsen Khademi, Nuria Planell, Angelika Schmidt, Ioannis Tsamardinos, Tomas Olsson, Fredrik Piehl, Ingrid Kockum, Maja Jagodic, Jesper Tegnér, David Gomez-Cabrero

Computational Medicine Center Faculty Papers

Multiple Sclerosis (MS) is an autoimmune disease of the central nervous system with prominent neurodegenerative components. The triggering and progression of MS is associated with transcriptional and epigenetic alterations in several tissues, including peripheral blood. The combined influence of transcriptional and epigenetic changes associated with MS has not been assessed in the same individuals. Here we generated paired transcriptomic (RNA-seq) and DNA methylation (Illumina 450 K array) profiles of CD4+ and CD8+ T cells (CD4, CD8), using clinically accessible blood from healthy donors and MS patients in the initial relapsing-remitting and subsequent secondary-progressive stage. By integrating the output of a …


Recent Trends, Current Research In Cyberpsychology: A Literature Review, Amarjit Kumar Singh, Pawan Kumar Singh 2019 Library Assistant, Central Library, Central University of South Bihar (CUSB), Gaya (Bihar)

Recent Trends, Current Research In Cyberpsychology: A Literature Review, Amarjit Kumar Singh, Pawan Kumar Singh

Library Philosophy and Practice (e-journal)

Cyberpsychology refers to the study of the mind and behavior in the context of interactions with technology. It is an emerging branch, which has focused on the psychological aspects connected to the increasing presence and usages of technology in modern lives. This paper traces recent advancement and trends of Cyberpsychology is an emerging domain of knowledge and goes on the give a literature review of the same. An analysis of the recent research and literature covering 300 most relevant research papers from the period of 2012 to 15, August 2019 was conducted to determine and shape the research pattern based …


Polarization Division Multiplexing For Optical Data Communications, Darko Ivanovich 2019 Washington University in St. Louis

Polarization Division Multiplexing For Optical Data Communications, Darko Ivanovich

McKelvey School of Engineering Theses & Dissertations

Multiple parallel channels are ubiquitous in optical communications, with spatial division multiplexing (separate physical paths) and wavelength division multiplexing (separate optical wavelengths) being the most common forms. In this research work, we investigate the viability of polarization division multiplexing, the separation of distinct parallel optical communication channels through the polarization properties of light. We investigate polarization division multiplexing based optical communication systems in five distinct parts. In the first part of the work, we define a simulation model of two or more linearly polarized optical signals (at different polarization angles) that are transmitted through a common medium (e.g., air), filtered …


Decoupling Information And Connectivity Via Information-Centric Transport, Hila Ben Abraham 2019 Washington University in St. Louis

Decoupling Information And Connectivity Via Information-Centric Transport, Hila Ben Abraham

McKelvey School of Engineering Theses & Dissertations

The power of Information-Centric Networking architectures (ICNs) lies in their abstraction for communication --- the request for named data. This abstraction was popularized by the HyperText Transfer Protocol (HTTP) as an application-layer abstraction, and was extended by ICNs to also serve as their network-layer abstraction. In recent years, network mechanisms for ICNs, such as scalable name-based forwarding, named-data routing and in-network caching, have been widely explored and researched. However, to the best of our knowledge, the impact of this network abstraction on ICN applications has not been explored or well understood. The motivation of this dissertation is to address this …


A Review Of Text Corpus-Based Tourism Big Data Mining, Qin Li, Shaobo Li, Sen Zhang, Jie Hu, Jianhun Hu 2019 Computer Sciences

A Review Of Text Corpus-Based Tourism Big Data Mining, Qin Li, Shaobo Li, Sen Zhang, Jie Hu, Jianhun Hu

Faculty Publications

With the massive growth of the Internet, text data has become one of the main formats of tourism big data. As an effective expression means of tourists’ opinions, text mining of such data has big potential to inspire innovations for tourism practitioners. In the past decade, a variety of text mining techniques have been proposed and applied to tourism analysis to develop tourism value analysis models, build tourism recommendation systems, create tourist profiles, and make policies for supervising tourism markets. The successes of these techniques have been further boosted by the progress of natural language processing (NLP), machine learning, and …


Knn Optimization For Multi-Dimensional Data, Arialdis Japa 2019 Kennesaw State University

Knn Optimization For Multi-Dimensional Data, Arialdis Japa

Master of Science in Computer Science Theses

The K-Nearest Neighbors (KNN) algorithm is a simple but powerful technique used in the field of data analytics. It uses a distance metric to identify existing samples in a dataset which are similar to a new sample. The new sample can then be classified via a class majority voting of its most similar samples, i.e. nearest neighbors. The KNN algorithm can be applied in many fields, such as recommender systems where it can be used to group related products or predict user preferences. In most cases, the performance of the KNN algorithm tends to suffer as the size of the …


Optimizing Impression Counts For Outdoor Advertising, Yipeng ZHANG, Yuchen LI, Zhifeng BAO, Songsong MO, Ping ZHANG 2019 Singapore Management University

Optimizing Impression Counts For Outdoor Advertising, Yipeng Zhang, Yuchen Li, Zhifeng Bao, Songsong Mo, Ping Zhang

Research Collection School Of Computing and Information Systems

In this paper we propose and study the problem of optimizing theinfluence of outdoor advertising (ad) when impression counts aretaken into consideration. Given a database U of billboards, each ofwhich has a location and a non-uniform cost, a trajectory databaseT and a budget B, it aims to find a set of billboards that has themaximum influence under the budget. In line with the advertisingconsumer behavior studies, we adopt the logistic function to takeinto account the impression counts of an ad (placed at differentbillboards) to a user trajectory when defining the influence measurement. However, this poses two challenges: (1) our problemis …


Coresets For Minimum Enclosing Balls Over Sliding Windows, Yanhao WANG, Yuchen LI, Kian-Lee TAN 2019 Singapore Management University

Coresets For Minimum Enclosing Balls Over Sliding Windows, Yanhao Wang, Yuchen Li, Kian-Lee Tan

Research Collection School Of Computing and Information Systems

Coresets are important tools to generate concise summaries of massive datasets for approximate analysis. A coreset is a small subset of points extracted from the original point set such that certain geometric properties are preserved with provable guarantees. This paper investigates the problem of maintaining a coreset to preserve the minimum enclosing ball (MEB) for a sliding window of points that are continuously updated in a data stream. Although the problem has been extensively studied in batch and append-only streaming settings, no efficient sliding-window solution is available yet. In this work, we first introduce an algorithm, called AOMEB, to build …


Digital Commons powered by bepress