Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 3 of 3

Full-Text Articles in Computer Engineering

Identifying And Minimizing Underspecification In Breast Cancer Subtyping, Jonathan Cheuk-Kiu Tang Dec 2022

Identifying And Minimizing Underspecification In Breast Cancer Subtyping, Jonathan Cheuk-Kiu Tang

Master's Theses

In the realm of biomedical technology, both accuracy and consistency are crucial to the development and deployment of these tools. While accuracy is easy to measure, consistency metrics are not so simple to measure, especially in the scope of biomedicine where prediction consistency can be difficult to achieve. Typically, biomedical datasets contain a significantly larger amount of features compared to the amount of samples, which goes against ordinary data mining practices. As a result, predictive models may fail to find valid pathways for prediction during training on such datasets. This concept is known as underspecification.

Underspecification has been more accepted …


Reading Robot, Gillian Watts, Andrew Myers, Sabrinna Tan, Taylor Klein, Omeed Djassemi Jun 2020

Reading Robot, Gillian Watts, Andrew Myers, Sabrinna Tan, Taylor Klein, Omeed Djassemi

General Engineering

Presently, there is an insufficient availability of human experts to assist students in reading competency and comprehension. Our team’s goal was to create an improved socially assistive robot for use by therapists, teachers, and parents to help children and adults develop reading skills while they do not have access to specialists. HAPI is a socially assistive robot that we created with the goal of helping students practice their reading comprehension skills. HAPI enables a student to improve their reading skills without an educator present, while enabling educators to review the student's performance remotely. Design constraints included: physical size, weight, duration …


Toward The Systematization Of Active Authentication Research, Daniel Fleming Gerrity Jun 2015

Toward The Systematization Of Active Authentication Research, Daniel Fleming Gerrity

Master's Theses

Authentication is the vital link between your real self and your digital self. As our digital selves become ever more powerful, the price of failing authentication grows. The most common authentication protocols are static data and employed only once at login. This allows for authentication to be spoofed just once to gain access to an entire user session. Behaviometric protocols continuously consume a user’s behavior as a token of authentication and can be applied throughout a session, thereby eliminating a fixed token to spoof. Research into these protocols as viable forms of authentication is relatively recent and is being conducted …