Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Physical Sciences and Mathematics (4)
- Applied Mathematics (2)
- Business (2)
- Computer Sciences (2)
- Technology and Innovation (2)
-
- Biochemistry, Biophysics, and Structural Biology (1)
- Controls and Control Theory (1)
- Curriculum and Instruction (1)
- Education (1)
- Educational Assessment, Evaluation, and Research (1)
- Electrical and Computer Engineering (1)
- Engineering (1)
- Library and Information Science (1)
- Life Sciences (1)
- Numerical Analysis and Computation (1)
- Social and Behavioral Sciences (1)
- Theory and Algorithms (1)
- Institution
Articles 1 - 10 of 10
Full-Text Articles in Entire DC Network
Rg Smart Gambling Machines: A Prevention Model To Respond To Risky Play In Real Time, Tracy Schrans
Rg Smart Gambling Machines: A Prevention Model To Respond To Risky Play In Real Time, Tracy Schrans
International Conference on Gambling & Risk Taking
Abstract:
In collaboration with industry, public health, and regulators, Focal Research developed an effective modelling process using player data and technology to identify and assist customers at-risk of having problems with their gambling. The system was originally designed using account-based player data to accurately assess play patterns. Complex algorithms scan the player data stored in an operator’s member data system, alerting operators to play behaviours typically observed among those scoring 8 or higher on the Problem Gambling Severity Index. During a live trial, the system was found to help staff interact with at-risk customers leading to measurable improvement in outcomes …
Follow The Algorithm: Assessing Facebook's Group Recommendation Behavior Regarding Conspiracy Theories And Echo Chambers, Abraham Neis-Eldridge
Follow The Algorithm: Assessing Facebook's Group Recommendation Behavior Regarding Conspiracy Theories And Echo Chambers, Abraham Neis-Eldridge
Appalachian Student Research Forum
This research was motivated by the growing concerns regarding social media platforms roles in the presentation of conspiracy theories as compelling alternative narratives regarding contemporary social events. Specifically, this research asks whether Facebook’s algorithm autonomously recommends groups that are organized around conspiracy theories regarding contemporary political and social events to end users, despite the user not previously indicating interest in those topics. Based on coverage of biases in Facebooks content ranking and recommendation algorithms surrounding the 2020 presidential election, it was hypothesized that, over time, Facebook would increasingly seek to recommend conspiratorial content to its users to retain them on …
A Formal Approach To Verification And Validation Of Guidance, Navigation, And Control Algorithms, Jason Crane, Jason Westphal, Islam Hussein, Meeko Oishi, Abraham Vinod, Joseph Gleason
A Formal Approach To Verification And Validation Of Guidance, Navigation, And Control Algorithms, Jason Crane, Jason Westphal, Islam Hussein, Meeko Oishi, Abraham Vinod, Joseph Gleason
Small Satellite Conference
The traditional Monte Carlo based approaches to Verification & Validation (V&V) of Guidance Navigation and Control (GN&C) algorithms suffers from drawbacks, including typically requiring a significant amount of computational resources to guarantee a candidate algorithm’s appropriateness. Formal approaches to V&V of GN&C algorithms can help address these is-sues as they are not based on simulation. Therefore, we are investigating and developing an innovative formal V&V algorithm for spacecraft GN&C, specifically in the determination of safety of maneuvers for satellite Remote Proximity Operations and Docking (RPOD). Formal V&V methods could provide rigorous and quantifiable assurances of safety for a given satellite …
Assessing Computational Thinking, Daniel Duckworth
Assessing Computational Thinking, Daniel Duckworth
2009 - 2019 ACER Research Conferences
This paper provides some context for the role of computation thinking (CT) in the Australian Curriculum, an abridged literature review of CT as a problem-solving framework from the International Computer and Information Literacy Study (ICILS) 2018 assessment framework and some examples of how CT has been used to solve real-world problems. Finally, this paper presents ways to teach and assess CT.
Inoculating Students Against Digital Media Manipulation In The Algorithmic Age, Robert Berkman
Inoculating Students Against Digital Media Manipulation In The Algorithmic Age, Robert Berkman
Georgia International Conference on Information Literacy
Propaganda, media manipulation, and bias in the news is not, of course, a new issue. However, in today’s hyper accelerated digital and social information environment, there are novel and more powerful methods being intentionally employed to convince media consumers to place their attention on, click, read/watch and believe content that was created to serve a very specific pre-existing agenda. These actors who create this agenda based news—whether political, commercial, or otherwise—today leverage machine learning, big data, behavioral psychology, knowledge of algorithms, social media user behavior, and networking theory, to created what has come to be rather dramatically called “weaponized” information. …
Registration And Grouping Algorithms In Protein Nmr Derived Peak Lists And Their Application In Protein Nmr Reference Correction, Andrey Smelter, Xi Chen, Eric C. Rouchka, Hunter N. B. Moseley
Registration And Grouping Algorithms In Protein Nmr Derived Peak Lists And Their Application In Protein Nmr Reference Correction, Andrey Smelter, Xi Chen, Eric C. Rouchka, Hunter N. B. Moseley
Commonwealth Computational Summit
Nuclear magnetic resonance spectroscopy of proteins (protein NMR) is a powerful analytical technique for studying structure and dynamics of proteins. Almost all aspects of protein NMR have been accelerated by the development of software tools that enable the analysis of NMR spectral data and its utilization in studying protein structure and dynamics. This includes software for raw NMR processing, spectral visualization, protein resonance assignment, and structure determination. However, full automation of protein NMR data analysis is still a work in progress and data analysis still requires an expert NMR spectroscopist utilizing an array of software tools.
While manual resonance assignment …
Pursuit Evasion With Multiple Pursuers : Capturing A Ground Vehicle On A Road Network With Multiple Drones, Blake Wilson, Shreyas Sundaram, Amritha Prasad
Pursuit Evasion With Multiple Pursuers : Capturing A Ground Vehicle On A Road Network With Multiple Drones, Blake Wilson, Shreyas Sundaram, Amritha Prasad
The Summer Undergraduate Research Fellowship (SURF) Symposium
Unmanned Aerial Vehicles (UAV) have many military and civilian applications, one of which is monitoring a given area (such as a road network) for threats. An important question in this application is to determine the latest time to dispatch UAVs for the guaranteed capture of threats attempting to travel through the network. In this work, we consider a pursuit evasion scenario with multiple pursuers (UAVs) trying to catch a single evader (ground vehicle), where information about the evader’s path is provided by ground sensors. In this scenario, we consider the problem of finding the maximum delay with which the pursuers …
Analysis Of Community Detection Algorithms For Large Scale Cyber Networks, Prachita Mane, Sunanda Shanbhag, Tanmayee Kamath, Patrick Mackey, John Springer
Analysis Of Community Detection Algorithms For Large Scale Cyber Networks, Prachita Mane, Sunanda Shanbhag, Tanmayee Kamath, Patrick Mackey, John Springer
Information Security Research and Education (INSuRE) Conference
The aim of this project is to use existing community detection algorithms on an IP network dataset to create supernodes within the network. This study compares the performance of different algorithms on the network in terms of running time. The paper begins with an introduction to the concept of clustering and community detection followed by the research question that the team aimed to address. Further the paper describes the graph metrics that were considered in order to shortlist algorithms followed by a brief explanation of each algorithm with respect to the graph metric on which it is based. The next …
The Dc Algorithm & The Constrained Fermat-Torricelli Problem, Nathan Peron Lawrence, George Blikas
The Dc Algorithm & The Constrained Fermat-Torricelli Problem, Nathan Peron Lawrence, George Blikas
Student Research Symposium
The theory of functions expressible as the Difference of Convex (DC) functions has led to the development of a rich field in applied mathematics known as DC Programming.We survey the work of Pham Dinh Tao and Le Thi Hoai An in order to understand the DC Algorithm (DCA) and its use in solving clustering problems. Further, we present several other methods that generalize the DCA for any norm. These powerful tools enable researchers to reformulate objective functions, not necessarily convex, into DC Programs.
The Fermat-Torricelli problem is visited in light of convex analysis and various norms. Pierre de Fermat proposed …
Image Processing – I: Automated System For Fingerprint Image Enhancement Using Improved Segmentation And Gabor Wavelets, Amna Saeed, Anam Tariq, Usman Jawaid
Image Processing – I: Automated System For Fingerprint Image Enhancement Using Improved Segmentation And Gabor Wavelets, Amna Saeed, Anam Tariq, Usman Jawaid
International Conference on Information and Communication Technologies
This research revolves around the fingerprint image enhancement. It is used for automated fingerprint identification systems (AFIS) for extracting the best quality fingerprint images. Accurate feature extraction and identification is the basic theme of this enhancement. This paper is on the fingerprint image enhancement using wavelets. Wavelets are famous for their special localization property and orientation flow estimation. The proposed technique is basically comprises of three main steps: segmentation followed by image sharpening and then Gabor wavelet filtering. Segmentation distinguishes between image background and foreground which in turn reduces processing time. Our sharpening stage of enhancement algorithm sharpens the edges …