Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Digital Circuits (2)
- Medicine and Health Sciences (2)
- Computational Engineering (1)
- Computer Sciences (1)
- Computer and Systems Architecture (1)
-
- Digital Communications and Networking (1)
- Electrical and Computer Engineering (1)
- Hardware Systems (1)
- Health and Medical Administration (1)
- Other Computer Engineering (1)
- Physical Sciences and Mathematics (1)
- Quality Improvement (1)
- Theory and Algorithms (1)
- VLSI and Circuits, Embedded and Hardware Systems (1)
- Keyword
-
- Computer science (1)
- Coverage Analysis (1)
- Cyber attack (1)
- Data Science (1)
- Delay Tolerant Networks (1)
-
- Device to Device Communication (1)
- Energy Balancing (1)
- Evidence-based medicine (1)
- Fault Injection (1)
- Fault detection (1)
- Formal Verification (1)
- Geriatric healthcare (1)
- HECAD (1)
- Hashtag retrieval (1)
- Healthcare systems (1)
- IEC 61508 (1)
- Machine Learning (1)
- Medicine (1)
- Mobile AdHoc Networks (1)
- Mobile Social Networks (1)
- Model Based Design Assurance (1)
- Model Based Fault Injection (1)
- Model Checking (1)
- Natural Language Processing (1)
- Network Lifetime (1)
- Nuclear Instrumentation and Control (1)
- Pattern mining (1)
- Peer-to-Peer Energy Sharing (1)
- Quantum computers (1)
- Quantum computing (1)
- Publication
- Publication Type
Articles 1 - 6 of 6
Full-Text Articles in Computer Engineering
Exploring Pattern Mining Algorithms For Hashtag Retrieval Problem, Asma Belhadi, Youcef Djenouri, Jerry Chun-Wei Lin, Chongsheng Zhang, Alberto Cano
Exploring Pattern Mining Algorithms For Hashtag Retrieval Problem, Asma Belhadi, Youcef Djenouri, Jerry Chun-Wei Lin, Chongsheng Zhang, Alberto Cano
Computer Science Publications
Hashtag is an iconic feature to retrieve the hot topics of discussion on Twitter or other social networks. This paper incorporates the pattern mining approaches to improve the accuracy of retrieving the relevant information and speeding up the search performance. A novel algorithm called PM-HR (Pattern Mining for Hashtag Retrieval) is designed to first transform the set of tweets into a transactional database by considering two different strategies (trivial and temporal). After that, the set of the relevant patterns is discovered, and then used as a knowledge-based system for finding the relevant tweets based on users' queries under the similarity …
Implementation Of A Hierarchical, Embedded, Cyber Attack Detection System For Spi Devices On Unmanned Aerial Systems, Jeremy J. Price
Implementation Of A Hierarchical, Embedded, Cyber Attack Detection System For Spi Devices On Unmanned Aerial Systems, Jeremy J. Price
Theses and Dissertations
Unmanned Aerial Systems (UAS) create security concerns as their roles expand in commercial, military, and consumer spaces. The need to secure these systems is recognized in the architecture for a Hierarchical, Embedded, Cyber Attack Detection (HECAD) system. HECAD passively monitors the communication between a flight controller and all its peripherals like sensors and actuators. It ensures the functionality of a UAS is within the set of defined behavior and reports all potential problems, whether the errors were caused by cyber attacks or other physical faults. A portion of the design for Serial Peripheral Interface (SPI) devices on board a flight …
Data Science Methods For Standardization, Safety, And Quality Assurance In Radiation Oncology, Khajamoinuddin Syed
Data Science Methods For Standardization, Safety, And Quality Assurance In Radiation Oncology, Khajamoinuddin Syed
Theses and Dissertations
Radiation oncology is the field of medicine that deals with treating cancer patients through ionizing radiation. The clinical modality or technique used to treat the cancer patients in the radiation oncology domain is referred to as radiation therapy. Radiation therapy aims to deliver precisely measured dose irradiation to a defined tumor volume (target) with as minimal damage as possible to surrounding healthy tissue (organs-at-risk), resulting in eradication of the tumor, high quality of life, and prolongation of survival. A typical radiotherapy process requires the use of different clinical systems at various stages of the workflow. The data generated in these …
Leveraging Peer-To-Peer Energy Sharing For Resource Optimization In Mobile Social Networks, Aashish Dhungana
Leveraging Peer-To-Peer Energy Sharing For Resource Optimization In Mobile Social Networks, Aashish Dhungana
Theses and Dissertations
Mobile Opportunistic Networks (MSNs) enable the interaction of mobile users in the vicinity through various short-range wireless communication technologies (e.g., Bluetooth, WiFi) and let them discover and exchange information directly or in ad hoc manner. Despite their promise to enable many exciting applications, limited battery capacity of mobile devices has become the biggest impediment to these appli- cations. The recent breakthroughs in the areas of wireless power transfer (WPT) and rechargeable lithium batteries promise the use of peer-to-peer (P2P) energy sharing (i.e., the transfer of energy from the battery of one member of the mobile network to the battery of …
Systematic Model-Based Design Assurance And Property-Based Fault Injection For Safety Critical Digital Systems, Athira Varma Jayakumar
Systematic Model-Based Design Assurance And Property-Based Fault Injection For Safety Critical Digital Systems, Athira Varma Jayakumar
Theses and Dissertations
With advances in sensing, wireless communications, computing, control, and automation technologies, we are witnessing the rapid uptake of Cyber-Physical Systems across many applications including connected vehicles, healthcare, energy, manufacturing, smart homes etc. Many of these applications are safety-critical in nature and they depend on the correct and safe execution of software and hardware that are intrinsically subject to faults. These faults can be design faults (Software Faults, Specification faults, etc.) or physically occurring faults (hardware failures, Single-event-upsets, etc.). Both types of faults must be addressed during the design and development of these critical systems. Several safety-critical industries have widely adopted …
Applications Of Cloud-Based Quantum Computers With Cognitive Computing Algorithms In Automated, Evidence-Based Virginia Geriatric Healthcare, Henry Childs
AUCTUS: The Journal of Undergraduate Research and Creative Scholarship
Quantum computers have recently headlined IBM’s next generation of products promoting computational evolution. After the successful release of the cloud-streaming quantum computer IBM Watson Q, the company has released projections for future development of quantum devices. Because of the incredible processing power of these machines and the expected integration into everyday life in the near future, what implications can this have in the healthcare field?
I am studying cloud-based quantum computers with natural language processing (NLP) algorithms and patient health record data because I want to understand automated, evidenced-based co-optimized treatment of home-bound geriatric patients in order to help my …