Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Conference

Algorithms

Discipline
Institution
Publication Year
Publication

Articles 1 - 10 of 10

Full-Text Articles in Entire DC Network

Rg Smart Gambling Machines: A Prevention Model To Respond To Risky Play In Real Time, Tracy Schrans May 2023

Rg Smart Gambling Machines: A Prevention Model To Respond To Risky Play In Real Time, Tracy Schrans

International Conference on Gambling & Risk Taking

Abstract:

In collaboration with industry, public health, and regulators, Focal Research developed an effective modelling process using player data and technology to identify and assist customers at-risk of having problems with their gambling. The system was originally designed using account-based player data to accurately assess play patterns. Complex algorithms scan the player data stored in an operator’s member data system, alerting operators to play behaviours typically observed among those scoring 8 or higher on the Problem Gambling Severity Index. During a live trial, the system was found to help staff interact with at-risk customers leading to measurable improvement in outcomes …


Follow The Algorithm: Assessing Facebook's Group Recommendation Behavior Regarding Conspiracy Theories And Echo Chambers, Abraham Neis-Eldridge Apr 2023

Follow The Algorithm: Assessing Facebook's Group Recommendation Behavior Regarding Conspiracy Theories And Echo Chambers, Abraham Neis-Eldridge

Appalachian Student Research Forum

This research was motivated by the growing concerns regarding social media platforms roles in the presentation of conspiracy theories as compelling alternative narratives regarding contemporary social events. Specifically, this research asks whether Facebook’s algorithm autonomously recommends groups that are organized around conspiracy theories regarding contemporary political and social events to end users, despite the user not previously indicating interest in those topics. Based on coverage of biases in Facebooks content ranking and recommendation algorithms surrounding the 2020 presidential election, it was hypothesized that, over time, Facebook would increasingly seek to recommend conspiratorial content to its users to retain them on …


A Formal Approach To Verification And Validation Of Guidance, Navigation, And Control Algorithms, Jason Crane, Jason Westphal, Islam Hussein, Meeko Oishi, Abraham Vinod, Joseph Gleason Aug 2019

A Formal Approach To Verification And Validation Of Guidance, Navigation, And Control Algorithms, Jason Crane, Jason Westphal, Islam Hussein, Meeko Oishi, Abraham Vinod, Joseph Gleason

Small Satellite Conference

The traditional Monte Carlo based approaches to Verification & Validation (V&V) of Guidance Navigation and Control (GN&C) algorithms suffers from drawbacks, including typically requiring a significant amount of computational resources to guarantee a candidate algorithm’s appropriateness. Formal approaches to V&V of GN&C algorithms can help address these is-sues as they are not based on simulation. Therefore, we are investigating and developing an innovative formal V&V algorithm for spacecraft GN&C, specifically in the determination of safety of maneuvers for satellite Remote Proximity Operations and Docking (RPOD). Formal V&V methods could provide rigorous and quantifiable assurances of safety for a given satellite …


Assessing Computational Thinking, Daniel Duckworth Aug 2019

Assessing Computational Thinking, Daniel Duckworth

2009 - 2019 ACER Research Conferences

This paper provides some context for the role of computation thinking (CT) in the Australian Curriculum, an abridged literature review of CT as a problem-solving framework from the International Computer and Information Literacy Study (ICILS) 2018 assessment framework and some examples of how CT has been used to solve real-world problems. Finally, this paper presents ways to teach and assess CT.


Inoculating Students Against Digital Media Manipulation In The Algorithmic Age, Robert Berkman Sep 2018

Inoculating Students Against Digital Media Manipulation In The Algorithmic Age, Robert Berkman

Georgia International Conference on Information Literacy

Propaganda, media manipulation, and bias in the news is not, of course, a new issue. However, in today’s hyper accelerated digital and social information environment, there are novel and more powerful methods being intentionally employed to convince media consumers to place their attention on, click, read/watch and believe content that was created to serve a very specific pre-existing agenda. These actors who create this agenda based news—whether political, commercial, or otherwise—today leverage machine learning, big data, behavioral psychology, knowledge of algorithms, social media user behavior, and networking theory, to created what has come to be rather dramatically called “weaponized” information. …


Registration And Grouping Algorithms In Protein Nmr Derived Peak Lists And Their Application In Protein Nmr Reference Correction, Andrey Smelter, Xi Chen, Eric C. Rouchka, Hunter N. B. Moseley Oct 2017

Registration And Grouping Algorithms In Protein Nmr Derived Peak Lists And Their Application In Protein Nmr Reference Correction, Andrey Smelter, Xi Chen, Eric C. Rouchka, Hunter N. B. Moseley

Commonwealth Computational Summit

Nuclear magnetic resonance spectroscopy of proteins (protein NMR) is a powerful analytical technique for studying structure and dynamics of proteins. Almost all aspects of protein NMR have been accelerated by the development of software tools that enable the analysis of NMR spectral data and its utilization in studying protein structure and dynamics. This includes software for raw NMR processing, spectral visualization, protein resonance assignment, and structure determination. However, full automation of protein NMR data analysis is still a work in progress and data analysis still requires an expert NMR spectroscopist utilizing an array of software tools.

While manual resonance assignment …


Pursuit Evasion With Multiple Pursuers : Capturing A Ground Vehicle On A Road Network With Multiple Drones, Blake Wilson, Shreyas Sundaram, Amritha Prasad Aug 2017

Pursuit Evasion With Multiple Pursuers : Capturing A Ground Vehicle On A Road Network With Multiple Drones, Blake Wilson, Shreyas Sundaram, Amritha Prasad

The Summer Undergraduate Research Fellowship (SURF) Symposium

Unmanned Aerial Vehicles (UAV) have many military and civilian applications, one of which is monitoring a given area (such as a road network) for threats. An important question in this application is to determine the latest time to dispatch UAVs for the guaranteed capture of threats attempting to travel through the network. In this work, we consider a pursuit evasion scenario with multiple pursuers (UAVs) trying to catch a single evader (ground vehicle), where information about the evader’s path is provided by ground sensors. In this scenario, we consider the problem of finding the maximum delay with which the pursuers …


Analysis Of Community Detection Algorithms For Large Scale Cyber Networks, Prachita Mane, Sunanda Shanbhag, Tanmayee Kamath, Patrick Mackey, John Springer Sep 2016

Analysis Of Community Detection Algorithms For Large Scale Cyber Networks, Prachita Mane, Sunanda Shanbhag, Tanmayee Kamath, Patrick Mackey, John Springer

Information Security Research and Education (INSuRE) Conference

The aim of this project is to use existing community detection algorithms on an IP network dataset to create supernodes within the network. This study compares the performance of different algorithms on the network in terms of running time. The paper begins with an introduction to the concept of clustering and community detection followed by the research question that the team aimed to address. Further the paper describes the graph metrics that were considered in order to shortlist algorithms followed by a brief explanation of each algorithm with respect to the graph metric on which it is based. The next …


The Dc Algorithm & The Constrained Fermat-Torricelli Problem, Nathan Peron Lawrence, George Blikas May 2016

The Dc Algorithm & The Constrained Fermat-Torricelli Problem, Nathan Peron Lawrence, George Blikas

Student Research Symposium

The theory of functions expressible as the Difference of Convex (DC) functions has led to the development of a rich field in applied mathematics known as DC Programming.We survey the work of Pham Dinh Tao and Le Thi Hoai An in order to understand the DC Algorithm (DCA) and its use in solving clustering problems. Further, we present several other methods that generalize the DCA for any norm. These powerful tools enable researchers to reformulate objective functions, not necessarily convex, into DC Programs.

The Fermat-Torricelli problem is visited in light of convex analysis and various norms. Pierre de Fermat proposed …


Image Processing – I: Automated System For Fingerprint Image Enhancement Using Improved Segmentation And Gabor Wavelets, Amna Saeed, Anam Tariq, Usman Jawaid Jul 2011

Image Processing – I: Automated System For Fingerprint Image Enhancement Using Improved Segmentation And Gabor Wavelets, Amna Saeed, Anam Tariq, Usman Jawaid

International Conference on Information and Communication Technologies

This research revolves around the fingerprint image enhancement. It is used for automated fingerprint identification systems (AFIS) for extracting the best quality fingerprint images. Accurate feature extraction and identification is the basic theme of this enhancement. This paper is on the fingerprint image enhancement using wavelets. Wavelets are famous for their special localization property and orientation flow estimation. The proposed technique is basically comprises of three main steps: segmentation followed by image sharpening and then Gabor wavelet filtering. Segmentation distinguishes between image background and foreground which in turn reduces processing time. Our sharpening stage of enhancement algorithm sharpens the edges …