Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

2018

Institution
Keyword
Publication
Publication Type
File Type

Articles 2911 - 2940 of 2941

Full-Text Articles in Physical Sciences and Mathematics

Human-Intelligence And Machine-Intelligence Decision Governance Formal Ontology, Faisal Mahmud Jan 2018

Human-Intelligence And Machine-Intelligence Decision Governance Formal Ontology, Faisal Mahmud

Engineering Management & Systems Engineering Theses & Dissertations

Since the beginning of the human race, decision making and rational thinking played a pivotal role for mankind to either exist and succeed or fail and become extinct. Self-awareness, cognitive thinking, creativity, and emotional magnitude allowed us to advance civilization and to take further steps toward achieving previously unreachable goals. From the invention of wheels to rockets and telegraph to satellite, all technological ventures went through many upgrades and updates. Recently, increasing computer CPU power and memory capacity contributed to smarter and faster computing appliances that, in turn, have accelerated the integration into and use of artificial intelligence (AI) in …


Deep Recurrent Learning For Efficient Image Recognition Using Small Data, Mahbubul Alam Jan 2018

Deep Recurrent Learning For Efficient Image Recognition Using Small Data, Mahbubul Alam

Electrical & Computer Engineering Theses & Dissertations

Recognition is fundamental yet open and challenging problem in computer vision. Recognition involves the detection and interpretation of complex shapes of objects or persons from previous encounters or knowledge. Biological systems are considered as the most powerful, robust and generalized recognition models. The recent success of learning based mathematical models known as artificial neural networks, especially deep neural networks, have propelled researchers to utilize such architectures for developing bio-inspired computational recognition models. However, the computational complexity of these models increases proportionally to the challenges posed by the recognition problem, and more importantly, these models require a large amount of data …


Applying Machine Learning To Advance Cyber Security: Network Based Intrusion Detection Systems, Hassan Hadi Latheeth Al-Maksousy Jan 2018

Applying Machine Learning To Advance Cyber Security: Network Based Intrusion Detection Systems, Hassan Hadi Latheeth Al-Maksousy

Computer Science Theses & Dissertations

Many new devices, such as phones and tablets as well as traditional computer systems, rely on wireless connections to the Internet and are susceptible to attacks. Two important types of attacks are the use of malware and exploiting Internet protocol vulnerabilities in devices and network systems. These attacks form a threat on many levels and therefore any approach to dealing with these nefarious attacks will take several methods to counter. In this research, we utilize machine learning to detect and classify malware, visualize, detect and classify worms, as well as detect deauthentication attacks, a form of Denial of Service (DoS). …


A Model For Seasonal Dynamic Networks, Jace D. Robinson Jan 2018

A Model For Seasonal Dynamic Networks, Jace D. Robinson

Browse all Theses and Dissertations

Sociotechnological and geospatial processes exhibit time varying structure that make insight discovery challenging. This paper presents statistical model of systems with seasonal dynamics, modeled as a dynamic network, to address this challenge. It assumes the probability of edge formations depend on a type assigned to incident nodes and the current time. Time dependencies are modeled by unique seasonal processes. The model is studied on several synthetic and real datasets. Superior fidelity of this model on seasonal datasets compared to existing network models, while being able to remain equally accurate for networks with randomly changing structure, is shown. The model is …


Content-Based Clustering And Visualization Of Social Media Text Messages, Sydney A. Barnard Jan 2018

Content-Based Clustering And Visualization Of Social Media Text Messages, Sydney A. Barnard

Browse all Theses and Dissertations

Although Twitter has been around for more than ten years, crisis management agencies and first response personnel are not able to fully use the information this type of data provides during a crisis or natural disaster. This thesis addresses clustering and visualizing social media data by textual similarity, rather than by only time and location, as a tool for first responders. This thesis presents a tool that automatically clusters geotagged text data based on their content and displays the clusters and their locations on the map. It allows at-a-glance information to be displayed throughout the evolution of a crisis. For …


A Multi-Formal Languages Collaborative Scheme For Complex Human Activity Recognition And Behavioral Patterns Extraction, Anargyros Angeleas Jan 2018

A Multi-Formal Languages Collaborative Scheme For Complex Human Activity Recognition And Behavioral Patterns Extraction, Anargyros Angeleas

Browse all Theses and Dissertations

Human Activity Recognition is an actively researched domain for the past few decades, and is one of the most eminent applications of today. It is already part of our life, but due to high level of uncertainty and challenges of human detection, we have only application specific solutions. Thus, the problem being very demanding and still remains unsolved. Within this PhD we delve into the problem, and approach it from a variety of viewpoints. At start, we present and evaluate different architectures and frameworks for activity recognition. Henceforward, the focal point of our attention is automatic human activity recognition. We …


Development Of An Ios App For Learning Intonation Of Wind Instruments, Swathi Pamidi Jan 2018

Development Of An Ios App For Learning Intonation Of Wind Instruments, Swathi Pamidi

Browse all Theses and Dissertations

Learning music instrument is a challenging task for a beginner without constant guidance from an instructor. The primary objective of this thesis research is to design and develop an iOS mobile / iPad learning app that helps users to learn and practice intonation for a suite of wind instruments by themselves with comfort and ease through app-provided tuning and charting guidance and app-assisted self-assessment. Particularly, our successfully-implemented app provides the following features to enhance the user's learning experience: 1 ) Provides learners easy-to-access information for the fingering and tuning techniques of wind instruments by converting Dr. Shelley Jagow's book - …


Malware Analysis Skills Taught In University Courses, Swetha Gorugantu Jan 2018

Malware Analysis Skills Taught In University Courses, Swetha Gorugantu

Browse all Theses and Dissertations

Career opportunities for malware analysts are growing at a fast pace due to the evolving nature of cyber threats as well as the necessity to counter them. However, employers are often unable to hire analysts fast though due to a lack of the required skillset. Hence, the primary purpose of the thesis is to conduct a gap analysis between the binary analysis skills taught in universities with those that the recruiters are looking for. Malware can be analyzed using three main types of tools and techniques: high-level profiling, static analysis, and dynamic analysis. These methods provide detailed information about the …


Sensor Data Streams Correlation Platform For Asthma Management, Vaikunth Sridharan Jan 2018

Sensor Data Streams Correlation Platform For Asthma Management, Vaikunth Sridharan

Browse all Theses and Dissertations

Asthma is a high-burden chronic inflammatory disease with prevalence in children with twice the rate compared to adults. It can be improved by continuously monitoring patients and their environment using the Internet of Things (IoT) based devices. These sensor data streams so obtained are essential to comprehend multiple factors triggering asthma symptoms. In order to support physicians in exploring causal associations and finding actionable insights, a visualization system with a scalable cloud infrastructure that can process multimodal sensor data and Patient Generated Health Data (PGHD) is necessary. In this thesis, we describe a cloud-based asthma management and visualization platform that …


Building An Abstract-Syntax-Tree-Oriented Symbolic Execution Engine For Php Programs, Jin Huang Jan 2018

Building An Abstract-Syntax-Tree-Oriented Symbolic Execution Engine For Php Programs, Jin Huang

Browse all Theses and Dissertations

This thesis presents the design, implementation, and evaluation of an abstract-syntax-tree-oriented symbolic execution engine for the PHP programming language. As a symbolic execution engine, our system emulate the execution of a PHP program by assuming that all inputs are with symbolic rather than concrete values. While our system inherits the basic definition of symbolic execution, it fundamentally differs from existing symbolic execution implementations that mainly leverage intermediate representation (IRs) to operate. Specifically, our system directly takes the abstract syntax tree (AST) of a program as input and subsequently interprets this AST. Performing symbolic execution using AST offers unique advantages. First, …


Quantitative Forecasting Of Risk For Ptsd Using Ecological Factors: A Deep Learning Application, Nuriel S. Mor, Kathryn L. Dardeck Jan 2018

Quantitative Forecasting Of Risk For Ptsd Using Ecological Factors: A Deep Learning Application, Nuriel S. Mor, Kathryn L. Dardeck

Journal of Social, Behavioral, and Health Sciences

Forecasting the risk for mental disorders from early ecological information holds benefits for the individual and society. Computational models used in psychological research, however, are barriers to making such predictions at the individual level. Preexposure identification of future soldiers at risk for posttraumatic stress disorder (PTSD) and other individuals, such as humanitarian aid workers and journalists intending to be potentially exposed to traumatic events, is important for guiding decisions about exposure. The purpose of the present study was to evaluate a machine learning approach to identify individuals at risk for PTSD using readily collected ecological risk factors, which makes scanning …


My.Eskwela: Designing An Enterprise Learning Management System To Increase Social Network And Reduce Cognitive Load, Ma. Regina Justina E. Estuar, Orven E. Llantos Jan 2018

My.Eskwela: Designing An Enterprise Learning Management System To Increase Social Network And Reduce Cognitive Load, Ma. Regina Justina E. Estuar, Orven E. Llantos

Department of Information Systems & Computer Science Faculty Publications

A typical learning management system (LMS) provides a tool for teachers to upload and create links to resources, create online assessments and provide immediate evaluation to students. As much as it tries to be student centered, most LMS remains a tool for instruction rather than learning. In a learning generation that is bound by very high online social capital, connectedness to the family weakens. my.Eskwela (My School) redefines LMS to include a parent component to address the need for inclusive participation of parents in the teaching-learning process. Basis for re-design came from the low user acceptance of teachers in using …


The Efficacy Of An Emr-Enabled Text Messaging System To The Expanded Health Beliefs, Diabetes Care Profile And Hba1c Of Diabetes Mellitus Patients, Ma. Regina Justina E. Estuar, John Noel Victorino, Razel Custodio Jan 2018

The Efficacy Of An Emr-Enabled Text Messaging System To The Expanded Health Beliefs, Diabetes Care Profile And Hba1c Of Diabetes Mellitus Patients, Ma. Regina Justina E. Estuar, John Noel Victorino, Razel Custodio

Department of Information Systems & Computer Science Faculty Publications

As diabetes mellitus (DM) becomes a global emergency, there is a need to explore novel interventions to address problems in self – management. Literature agree in the potential of mobile phones to carry-out self-care for a wide-array of disease conditions. Diabetes Self – Management Support and Education Through Text – Messaging (DSMSET) is a low-cost, two-way text messaging system designed to deliver self - help, educational messages based on the nine (9) dimensions of health management. DSMSET serves as a plugin to SHINE OS+, an open – source electronic medical record (EMR) system. The research is also based on the …


Ontologies And The Semantic Web For Digital Investigation Tool Selection, Hayden Wimmer, Lei Chen, Tom Narock Jan 2018

Ontologies And The Semantic Web For Digital Investigation Tool Selection, Hayden Wimmer, Lei Chen, Tom Narock

Department of Information Technology Faculty Publications

The nascent field of digital forensics is heavily influenced by practice. Much digital forensics research involves the use, evaluation, and categorization of the multitude of tools available to researchers and practitioners. As technology evolves at an increasingly rapid pace, the digital forensics field must constantly adapt by creating and evaluating new tools and techniques to perform forensic analysis on many disparate systems such as desktops, notebook computers, mobile devices, cloud, and personal wearable sensor devices, among many others. While researchers have attempted to use ontologies to classify the digital forensics domain on various dimensions, no ontology of digital forensic tools …


The Feasibility Of Dementia Caregiver Task Performance Measurement Using Smart Gaming Technology, Garrett G. Goodman Jan 2018

The Feasibility Of Dementia Caregiver Task Performance Measurement Using Smart Gaming Technology, Garrett G. Goodman

Browse all Theses and Dissertations

Dementia caregiver burnout is detrimental to both the familial caregiver and their loved ones with dementia. As the population of older adults increases, both the number of individuals with dementia and their corresponding caregivers increase as well. Thus, we are interested in developing a potential tool to non-invasively detect signs of caregiver burnout using a mobile application combined with machine learning. Hence, the mobile application "Caregiver Assessment using Smart Technology" (CAST) was developed which personalizes a word scramble game. The CAST application utilizes a heuristically constructed Fuzzy Inference System (FIS) optimized via a Genetic Algorithm (GA) to provide an individualized …


Anatomy Of Online Hate: Developing A Taxonomy And Machine Learning Models For Identifying And Classifying Hate In Online News Media, Joni Salminen, Hind Almerekhi, Milica Milenkovic, Soon-Gyu Jung, Haewoon Kwak, Haewoon Kwak, Bernard J. Jansen Jan 2018

Anatomy Of Online Hate: Developing A Taxonomy And Machine Learning Models For Identifying And Classifying Hate In Online News Media, Joni Salminen, Hind Almerekhi, Milica Milenkovic, Soon-Gyu Jung, Haewoon Kwak, Haewoon Kwak, Bernard J. Jansen

Research Collection School Of Computing and Information Systems

Online social media platforms generally attempt to mitigate hateful expressions, as these comments can be detrimental to the health of the community. However, automatically identifying hateful comments can be challenging. We manually label 5,143 hateful expressions posted to YouTube and Facebook videos among a dataset of 137,098 comments from an online news media. We then create a granular taxonomy of different types and targets of online hate and train machine learning models to automatically detect and classify the hateful comments in the full dataset. Our contribution is twofold: 1) creating a granular taxonomy for hateful online comments that includes both …


Skylens: Visual Analysis Of Skyline On Multi-Dimensional Data, Xun Zhao, Yanhong Wu, Weiwei Cui, Xinnan Du, Yuan Chen, Yong Wang, Dik Lun Lee, Huamin Qu Jan 2018

Skylens: Visual Analysis Of Skyline On Multi-Dimensional Data, Xun Zhao, Yanhong Wu, Weiwei Cui, Xinnan Du, Yuan Chen, Yong Wang, Dik Lun Lee, Huamin Qu

Research Collection School Of Computing and Information Systems

Skyline queries have wide-ranging applications in fields that involve multi-criteria decision making, including tourism, retail industry, and human resources. By automatically removing incompetent candidates, skyline queries allow users to focus on a subset of superior data items (i.e.. the skyline), thus reducing the decision-making overhead. However, users are still required to interpret and compare these superior items manually before making a successful choice. This task is challenging because of two issues. First, people usually have fuzzy, unstable, and inconsistent preferences when presented with multiple candidates. Second, skyline queries do not reveal the reasons for the superiority of certain skyline points …


Uncertainty Estimation Of Deep Neural Networks, Chao Chen Jan 2018

Uncertainty Estimation Of Deep Neural Networks, Chao Chen

Theses and Dissertations

Normal neural networks trained with gradient descent and back-propagation have received great success in various applications. On one hand, point estimation of the network weights is prone to over-fitting problems and lacks important uncertainty information associated with the estimation. On the other hand, exact Bayesian neural network methods are intractable and non-applicable for real-world applications. To date, approximate methods have been actively under development for Bayesian neural networks, including but not limited to: stochastic variational methods, Monte Carlo dropouts, and expectation propagation. Though these methods are applicable for current large networks, there are limits to these approaches with either underestimation …


Defense In Depth Network Perimeter Security, Anuoluwapo Ope Fatokun Jan 2018

Defense In Depth Network Perimeter Security, Anuoluwapo Ope Fatokun

Masters Theses

Defense in depth network perimeter security has always be a topic of discussion for a long time as an efficient way of mitigating cyber-attacks. While there are no 100% mitigating method against cyber-attacks, a layered defense in depth network perimeter security can be used to mitigate against cyber-attacks. Research have shown a massive growth in cyber-crimes and there are limited number of cyber security expert to counter this attacks. EIU as an institution is taking up the responsibility of producing cyber security graduates with the new Master of Science in Cyber Security program that started in Fall 2017.

This research …


Spike-Based Classification Of Uci Datasets With Multi-Layer Resume-Like Tempotron, Sami Abdul-Wahid Jan 2018

Spike-Based Classification Of Uci Datasets With Multi-Layer Resume-Like Tempotron, Sami Abdul-Wahid

All Master's Theses

Spiking neurons are a class of neuron models that represent information in timed sequences called ``spikes.'' Though predominantly used in neuro-scientific investigations, spiking neural networks (SNN) can be applied to machine learning problems such as classification and regression. SNN are computationally more powerful per neuron than traditional neural networks. Though training time is slow on general purpose computers, spike-based hardware implementations are faster and have shown capability for ultra-low power consumption. Additionally, various SNN training algorithms have achieved comparable performance with the State of the Art on the Fisher Iris dataset. Our main contribution is a software implementation of the …


Old English Character Recognition Using Neural Networks, Sattajit Sutradhar Jan 2018

Old English Character Recognition Using Neural Networks, Sattajit Sutradhar

Electronic Theses and Dissertations

Character recognition has been capturing the interest of researchers since the beginning of the twentieth century. While the Optical Character Recognition for printed material is very robust and widespread nowadays, the recognition of handwritten materials lags behind. In our digital era more and more historical, handwritten documents are digitized and made available to the general public. However, these digital copies of handwritten materials lack the automatic content recognition feature of their printed materials counterparts. We are proposing a practical, accurate, and computationally efficient method for Old English character recognition from manuscript images. Our method relies on a modern machine learning …


Isolated Mobile Malware Observation, Augustine Paul Jan 2018

Isolated Mobile Malware Observation, Augustine Paul

Electronic Theses and Dissertations

The idea behind Bring Your Own Device (BYOD) it that personal mobile devices can be used in the workplace to enhance convenience and flexibility. This development encourages organizations to allow access of personal mobile devices to business information and systems for businesses operation. However, BYOD opens a firm to various security risks such as data contamination and the exposure of user interest to criminal activities. Mobile devices were not designed to handle intense data security and advanced security features are frequently turned off. Using personal mobile devices can also expose a system to various forms of security threats like malware. …


Exploratory Data Analysis And Crime Prediction In San Francisco, Isha Pradhan Jan 2018

Exploratory Data Analysis And Crime Prediction In San Francisco, Isha Pradhan

Master's Projects

Crime has been prevalent in our society for a very long time and it continues to be so even today. The San Francisco Police Department has continued to register numerous such crime cases daily and has released this data to the public as a part of the open data initiative. In this paper, Big Data analysis is used on this dataset and a tool that predicts crime in San Francisco is provided. The focus of the project is to perform an in-depth analysis of the major types of crimes that occurred in the city, observe the trend over the years, …


Segmenting Human Trajectory Data By Movement States While Addressing Signal Loss And Signal Noise, Sungsoon Hwang, Cynthia Vandemark, Navdeep Dhatt, Sai Yalla, Ryan Crews Dec 2017

Segmenting Human Trajectory Data By Movement States While Addressing Signal Loss And Signal Noise, Sungsoon Hwang, Cynthia Vandemark, Navdeep Dhatt, Sai Yalla, Ryan Crews

Sungsoon Hwang

This paper considers the problem of partitioning an individual GPS
trajectory data into homogeneous, meaningful segments such as
stops and trips. Signal loss and signal noise are highly prevalent in
human trajectory data, and it is challenging to deal with uncertainties
in segmentation algorithms. We propose a new trajectory
segmentation algorithm that detects stop segments in a noiserobust
manner from GPS data with time gaps. The algorithm consists
of three steps that impute time gaps, split data into base
segments and estimate states over a base segment. The statedependent
path interpolation was proposed as a framework for
gap imputation to …


The Evolution Of Requirements Practices In Software Startups, Catarina Gralha, Daniela Damian, Anthony Wasserman, Miguel Goulão, João Araújo Dec 2017

The Evolution Of Requirements Practices In Software Startups, Catarina Gralha, Daniela Damian, Anthony Wasserman, Miguel Goulão, João Araújo

Tony Wasserman

We use Grounded Theory to study the evolution of requirements practices of 16 so ware startups as they grow and introduce new products and services. These startups operate in a dynamic environment, with significant time and market pressure, and rarely have time for systematic requirements analysis. Our theory describes the evolution of practice along six dimensions that emerged as relevant to their requirements activities: requirements artefacts, knowledge management, requirements-related roles, planning, technical debt and product quality. Beyond the relationships among the dimensions, our theory also explains the turning points that drove the evolution along these dimensions. These changes are reactive, …


Stacked Generalization: An Introduction To Super Learning, Ashley Naimi, Laura Balzer Dec 2017

Stacked Generalization: An Introduction To Super Learning, Ashley Naimi, Laura Balzer

Laura B. Balzer

Stacked generalization is an ensemble method that allows researchers to combine several different prediction algorithms into one. Since its introduction in the early 1990s, the method has evolved several times into a host of methods among which is the ‘‘Super Learner’’. Super Learner uses V -fold cross-validation to build the optimal weighted combination of predictions from a library of candidate algorithms. Optimality is defined by a user-specified objective function, such as minimizing mean squared error or maximizing the area under the receiver operating characteristic curve. Although relatively simple in nature, use of Super Learner by epidemiologists has been hampered by …


Informing Students About Academic Integrity In Programming., Simple Simon, Judy Sheard, Michael Morgan, Andrew Petersen, Amber Settle, Jane Sinclair Dec 2017

Informing Students About Academic Integrity In Programming., Simple Simon, Judy Sheard, Michael Morgan, Andrew Petersen, Amber Settle, Jane Sinclair

Amber Settle

In recent years academic integrity has come to be seen as a major concern across the full educational spectrum. The case has been made that in certain ways academic integrity is not the same in computing education as in education more generally, and that as a consequence it is the responsibility of computing educators to explicitly advise their students of the academic integrity requirements of their assessments. As part of a larger project, computing academics around the world were asked a number of questions regarding how they advise their students about academic integrity in programming assessments. Almost all respondents indicated …


Artificial Intelligence And Role-Reversible Judgment, Stephen E. Henderson, Kiel Brennan-Marquez Dec 2017

Artificial Intelligence And Role-Reversible Judgment, Stephen E. Henderson, Kiel Brennan-Marquez

Stephen E Henderson

As intelligent machines begin more generally outperforming human experts, why should humans remain ‘in the loop’ of decision-making?  One common answer focuses on outcomes: relying on intuition and experience, humans are capable of identifying interpretive errors—sometimes disastrous errors—that elude machines.  Though plausible today, this argument will wear thin as technology evolves.

Here, we seek out sturdier ground: a defense of human judgment that focuses on the normative integrity of decision-making.  Specifically, we propose an account of democratic equality as ‘role-reversibility.’  In a democracy, those tasked with making decisions should be susceptible, reciprocally, to the impact of decisions; there ought to …


Amilcar Aponte.Jpg, Amilcar Aponte Dec 2017

Amilcar Aponte.Jpg, Amilcar Aponte

Amilcar Aponte

Amilcar Aponte receiving his Student of the Year award from President of CCT College Dublin, Neil Gallagher. Amilcar obtained first in his class on the BSc in Information Technology.


Blockchain And Smart Contracts: The Missing Link In Copyright Licensing?, Balazs Bodo, Daniel Gervais, Joao Pedro Quintais Dec 2017

Blockchain And Smart Contracts: The Missing Link In Copyright Licensing?, Balazs Bodo, Daniel Gervais, Joao Pedro Quintais

Daniel J Gervais

This article offers a normative analysis of key blockchain technology concepts from the
perspective of copyright law. Some features of blockchain technologies—scarcity, trust,
transparency, decentralized public records and smart contracts—seem to make this
technology compatible with the fundamentals of copyright. Authors can publish works
on blockchain creating a quasi-immutable record of initial ownership, and encode
‘smart’ contracts to license the use of works. Remuneration may happen on online distribution
platforms where the smart contracts reside. In theory, such an automated
setup allows for the private ordering of copyright. Blockchain technology, like Digital
Rights Management 20 years ago, is thus presented …