Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

Algorithm

Institution
Publication Year
Publication
Publication Type

Articles 1 - 30 of 149

Full-Text Articles in Physical Sciences and Mathematics

Rescape: Transforming Coral-Reefscape Images For Quantitative Analysis, Zachary Ferris, Eraldo Ribeiro, Tomofumi Nagata, Robert Van Woesik Apr 2024

Rescape: Transforming Coral-Reefscape Images For Quantitative Analysis, Zachary Ferris, Eraldo Ribeiro, Tomofumi Nagata, Robert Van Woesik

Ocean Engineering and Marine Sciences Faculty Publications

Ever since the first image of a coral reef was captured in 1885, people worldwide have been accumulating images of coral reefscapes that document the historic conditions of reefs. However, these innumerable reefscape images suffer from perspective distortion, which reduces the apparent size of distant taxa, rendering the images unusable for quantitative analysis of reef conditions. Here we solve this century-long distortion problem by developing a novel computer-vision algorithm, ReScape, which removes the perspective distortion from reefscape images by transforming them into top-down views, making them usable for quantitative analysis of reef conditions. In doing so, we demonstrate the …


Identification Of Faults In Highways Using Approximation Methods And Algorithms, Khudayberdiyev Khakkulmirzayevich Mirzaakbar, Anvar Asatilloyevich Ravshanov Feb 2024

Identification Of Faults In Highways Using Approximation Methods And Algorithms, Khudayberdiyev Khakkulmirzayevich Mirzaakbar, Anvar Asatilloyevich Ravshanov

Chemical Technology, Control and Management

Many fast Fourier transforms are used to identify defective parts of uneven surfaces on roads and send information to relevant organizations on the road, using the " RAVON YO‘LLAR" application installed on a mobile device during car movement. We determine the uneven parts of the road. Smooth and well-maintained roads reduce the risk of vehicle collisions, skidding and other road-related incidents. Timely measures contribute to overall safety, comfort and economic efficiency.


A Chinese Power Text Classification Algorithm Based On Deep Active Learning, Song Deng, Qianliang Li, Renjie Dai, Siming Wei, Di Wu, Yi He, Xindong Wu Jan 2024

A Chinese Power Text Classification Algorithm Based On Deep Active Learning, Song Deng, Qianliang Li, Renjie Dai, Siming Wei, Di Wu, Yi He, Xindong Wu

Computer Science Faculty Publications

The construction of knowledge graph is beneficial for grid production, electrical safety protection, fault diagnosis and traceability in an observable and controllable way. Highly-precision text classification algorithm is crucial to build a professional knowledge graph in power system. Unfortunately, there are a large number of poorly described and specialized texts in the power business system, and the amount of data containing valid labels in these texts is low. This will bring great challenges to improve the precision of text classification models. To offset the gap, we propose a classification algorithm for Chinese text in the power system based on deep …


The Feasibility Of Motion Tracking Camera System For Magnetic Suspension Wind Tunnel Tests, Hisham M. Shehata, David Cox, Mark Schoenenberger, Colin Britcher, Eli Shellabarger, Timothy Schott, Brendan Mcgovern Jan 2024

The Feasibility Of Motion Tracking Camera System For Magnetic Suspension Wind Tunnel Tests, Hisham M. Shehata, David Cox, Mark Schoenenberger, Colin Britcher, Eli Shellabarger, Timothy Schott, Brendan Mcgovern

Mechanical & Aerospace Engineering Faculty Publications

The Entry Systems Modeling (ESM) Program at NASA has actively participated in the re-development of the Magnetic Suspension Balance System (MSBS) at the six-inch subsonic wind tunnel at NASA Langley Research Center. This initiative aims to enhance the MSBS system's capabilities, enabling the testing of stingless entry vehicle models at supersonic speeds. To achieve this, control algorithms are required to ensure magnetic levitation control and stability for models during free-oscillation dynamic responses. Currently, the system relies on electromagnetic position sensors to provide real-time 3 degrees of freedom control of a rigid body. While this approach has proven successful for subsonic …


Explorelah: Personalised And Smart Trip Planner For Mobile Tourism, Aldy Gunawan, Siu Loon Hoe, Xun Yi Lim, Linh Chi Tran, Dang Viet Anh Nguyen Dec 2023

Explorelah: Personalised And Smart Trip Planner For Mobile Tourism, Aldy Gunawan, Siu Loon Hoe, Xun Yi Lim, Linh Chi Tran, Dang Viet Anh Nguyen

Research Collection School Of Computing and Information Systems

Various recommender systems for mobile tourism have been developed over the years. However, most of these recommender systems tend to overwhelm users with too much information and may not be personalised to user preferences. In this paper, we introduce ExploreLah, a personalised and smart trip planner for exploring Point of Interests (POIs) in Singapore. The user preferences are categorised into five groups: shopping, art & culture, outdoor activity, adventure, and nightlife. The problem is considered as the Team Orienteering Problem with Time Windows. The algorithm is developed to generate itineraries. Simulated experiments using test cases were performed to evaluate and …


Enhancing Relation Database Security With Shuffling, Tieming Geng Oct 2023

Enhancing Relation Database Security With Shuffling, Tieming Geng

Theses and Dissertations

Database security holds paramount importance as it safeguards an organization's most valuable assets: its data. In an age marked by escalating cyber threats, protecting sensitive information stored in databases is essential to preserve trust, prevent financial losses, and maintain legal compliance. In this dissertation, an exploration into the realm of relation database security is undertaken. The research introduces a cryptographic secure shuffling algorithm designed to fortify database security. Additionally, the dissertation presents a series of innovative solutions aimed at bolstering both the security and efficiency of the shuffling algorithm. Encryption algorithms have long served as a mean of safeguarding sensitive …


Intrusion Detection: Machine Learning Techniques For Software Defined Networks, Jacob S. Rodriguez Aug 2023

Intrusion Detection: Machine Learning Techniques For Software Defined Networks, Jacob S. Rodriguez

Masters Theses

In recent years, software defined networking (SDN) has gained popularity as a novel approach towards network management and architecture. Compared to traditional network architectures, this software-based approach offers greater flexibility, programmability, and automation. However, despite the advantages of this system, there still remains the possibility that it could be compromised. As we continue to explore new approaches to network management, we must also develop new ways of protecting those systems from threats. Throughout this paper, I will describe and test a network intrusion detection system (NIDS), and how it can be implemented within a software defined network. This system will …


A Structure-Aware Generative Adversarial Network For Bilingual Lexicon Induction, Bocheng Han, Qian Tao, Lusi Li, Zhihao Xiong Jan 2023

A Structure-Aware Generative Adversarial Network For Bilingual Lexicon Induction, Bocheng Han, Qian Tao, Lusi Li, Zhihao Xiong

Computer Science Faculty Publications

Bilingual lexicon induction (BLI) is the task of inducing word translations with a learned mapping function that aligns monolingual word embedding spaces in two different languages. However, most previous methods treat word embeddings as isolated entities and fail to jointly consider both the intra-space and inter-space topological relations between words. This limitation makes it challenging to align words from embedding spaces with distinct topological structures, especially when the assumption of isomorphism may not hold. To this end, we propose a novel approach called the Structure-Aware Generative Adversarial Network (SA-GAN) model to explicitly capture multiple topological structure information to achieve accurate …


Classifying Recaptured Identity Documents Using The Biomedical Meijering And Sato Algorithms, John Magee, Stephen Sheridan, Christina Thorpe Jan 2023

Classifying Recaptured Identity Documents Using The Biomedical Meijering And Sato Algorithms, John Magee, Stephen Sheridan, Christina Thorpe

Academic Posters Collection

Recaptured identity documents are a low-cost, high-risk threat to modern eKYC systems. Bad actors can easily manipulate images and print them. Existing solutions typically demand manual review of remotely captured identity documents, this is expensive and does not scale. In 2022, the UK National Crime Agency estimated fraud cost business hundreds of billion pounds per year and document forgery is an area of investigation by Europol.


Muse: A Genetic Algorithm For Musical Chord Progression Generation, Griffin Going Dec 2022

Muse: A Genetic Algorithm For Musical Chord Progression Generation, Griffin Going

Culminating Experience Projects

Foundational to our understanding and enjoyment of music is the intersection of harmony and movement. This intersection manifests as chord progressions which themselves underscore the rhythm and melody of a piece. In musical compositions, these progressions often follow a set of rules and patterns which are themselves frequently broken for the sake of novelty. In this work, we developed a genetic algorithm which learns these rules and patterns (and how to break them) from a dataset of 890 songs from various periods of the Billboard Top 100 rankings. The algorithm learned to generate increasingly valid, yet interesting chord progressions via …


Obstacles In Learning Algorithm Run-Time Complexity Analysis, Bailey Licht Dec 2022

Obstacles In Learning Algorithm Run-Time Complexity Analysis, Bailey Licht

Theses/Capstones/Creative Projects

Algorithm run-time complexity analysis is an important topic in data structures and algorithms courses, but it is also a topic that many students struggle with. Commonly cited difficulties include the necessary mathematical background knowledge, the abstract nature of the topic, and the presentation style of the material. Analyzing the subject of algorithm analysis using multiple learning theories shows that course materials often leave out key steps in the learning process and neglect certain learning styles. Students can be more successful at learning algorithm run-time complexity analysis if these missing stages and learning styles are addressed.


A Novel Hybrid Algorithm For Morphological Analysis: Artificial Neural-Net-Xmor, Ayla Kayabaş, Ahmet Ercan Topcu, Özkan Kiliç Jul 2022

A Novel Hybrid Algorithm For Morphological Analysis: Artificial Neural-Net-Xmor, Ayla Kayabaş, Ahmet Ercan Topcu, Özkan Kiliç

Turkish Journal of Electrical Engineering and Computer Sciences

In this study, we present a novel algorithm that combines a rule-based approach and an artificial neural network-based approach in morphological analysis. The usage of hybrid models including both techniques is evaluated for performance improvements. The proposed hybrid algorithm is based on the idea of the dynamic generation of an artificial neural network according to two-level phonological rules. In this study, the combination of linguistic parsing, a neural network-based error correction model, and statistical filtering is utilized to increase the coverage of pure morphological analysis. We experimented hybrid algorithm applying rule-based and long short-term memory-based (LSTM-based) techniques, and the results …


Implementing The Cms+ Sports Rankings Algorithm In A Javafx Environment, Luke Welch May 2022

Implementing The Cms+ Sports Rankings Algorithm In A Javafx Environment, Luke Welch

Industrial Engineering Undergraduate Honors Theses

Every year, sports teams and athletes get cut from championship opportunities because of their rank. While this reality is easier to swallow if a team or athlete is distant from the cut, it is much harder when they are right on the edge. Many times, it leaves fans and athletes wondering, “Why wasn’t I ranked higher? What factors when into the ranking? Are the rankings based on opinion alone?” These are fair questions that deserve an answer. Many times, sports rankings are derived from opinion polls. Other times, they are derived from a combination of opinion polls and measured performance. …


Assessing Photogrammetry Artificial Intelligence In Monumental Buildings’ Crack Digital Detection, Said Maroun, Mostafa Khalifa, Nabil Mohareb Mar 2022

Assessing Photogrammetry Artificial Intelligence In Monumental Buildings’ Crack Digital Detection, Said Maroun, Mostafa Khalifa, Nabil Mohareb

Architecture and Planning Journal (APJ)

Natural and human-made disasters have significant impacts on monumental buildings, threatening them from being deteriorated. If no rapid consolidations took into consideration traumatic accidents would endanger the existence of precious sites. In this context, Beirut's enormous 4th of August 2020 explosion damaged an estimated 640 historical monuments, many volunteers assess damages for more than a year to prevent the more crucial risk of demolitions. This research aims to assist the collaboration ability among photogrammetry science, Artificial Intelligence Model (AIM) and Architectural Coding to optimize the process for better coverage and scientific approach of data specific to the crack disorders to …


Employee Churn Prediction Using Logistic Regression And Support Vector Machine, Rajendra Maharjan Dec 2021

Employee Churn Prediction Using Logistic Regression And Support Vector Machine, Rajendra Maharjan

Master's Projects

It is a challenge for Human Resource (HR) team to retain their existing employees than to hire a new one. For any company, losing their valuable employees is a loss in terms of time, money, productivity, and trust, etc. This loss could be possibly minimized if HR could beforehand find out their potential employees who are planning to quit their job hence, we investigated solving the employee churn problem through the machine learning perspective. We have designed machine learning models using supervised and classification-based algorithms like Logistic Regression and Support Vector Machine (SVM). The models are trained with the IBM …


Importance Of Cryptography In The Government, Gazmend Krasniqi, Agnesa Pefqeli Oct 2021

Importance Of Cryptography In The Government, Gazmend Krasniqi, Agnesa Pefqeli

UBT International Conference

This paper first of all reflects the need for encryption and then the importance it has managed to accumulate over thousands of years of use. Various factors, mainly of a purpose; being powerful, have influenced the rapid development and stressed the importance of encryption in governing bodies.

Depending on in which part of the world it is used and for what reasons it is developed, the importance of cryptography in different governments has shifted to the more powerful states.

Governments have encountered conflicts due to the popularization of encryption, where users of encryption belonging to the non-governmental communities have declined …


An Algorithm For The Selection Of Route Dependent Orientation Information, Heinrich Loewen, Angela Schwering Jul 2021

An Algorithm For The Selection Of Route Dependent Orientation Information, Heinrich Loewen, Angela Schwering

Journal of Spatial Information Science

Landmarks are important features of spatial cognition and are naturally included in human route descriptions. In the past algorithms were developed to select the most salient landmarks at decision points and automatically incorporate them in route instructions. Moreover, it was shown that human route descriptions contain a significant amount of orientation information, which support the users to orient themselves regarding known environmental information, and it was shown that orientation information support the acquisition of survey knowledge. Thus, there is a need to extend the landmarks selection to automatically select orientation information. In this work, we present an algorithm for the …


A Digital One Degree Of Freedom Model Of An Electromagnetic Position Sensor, Michelle Elizabeth Weinmann Jul 2021

A Digital One Degree Of Freedom Model Of An Electromagnetic Position Sensor, Michelle Elizabeth Weinmann

Mechanical & Aerospace Engineering Theses & Dissertations

The purpose of this project was to improve an existing system currently in use by NASA Langley Research Center (LaRC). The 6-inch Magnetic Suspension and Balance System (MSBS) built at MIT is operational with control in three degrees of freedom, with two additional degrees of freedom exhibiting passive stability. The means for measuring model displacement within the magnetic environment is an Electromagnetic Position Sensor (EPS), consisting of excitation coils at 20 kHz and multiple sets of pickup coils. The pickup coil voltages are proportional to model displacement in each degree of freedom. However, the EPS electronic signal processing system is …


Object Manipulation With Modular Planar Tensegrity Robots, Maxine Perroni-Scharf Jun 2021

Object Manipulation With Modular Planar Tensegrity Robots, Maxine Perroni-Scharf

Dartmouth College Undergraduate Theses

This thesis explores the creation of a novel two-dimensional tensegrity-based mod- ular system. When individual planar modules are linked together, they form a larger tensegrity robot that can be used to achieve non-prehensile manipulation. The first half of this dissertation focuses on the study of preexisting types of tensegrity mod- ules and proposes different possible structures and arrangements of modules. The second half describes the construction and actuation of a modular 2D robot com- posed of planar three-bar tensegrity structures. We conclude that tensegrity modules are suitably adapted to object manipulation and propose a future extension of the modular 2D …


Lecture 08: Partial Eigen Decomposition Of Large Symmetric Matrices Via Thick-Restart Lanczos With Explicit External Deflation And Its Communication-Avoiding Variant, Zhaojun Bai Apr 2021

Lecture 08: Partial Eigen Decomposition Of Large Symmetric Matrices Via Thick-Restart Lanczos With Explicit External Deflation And Its Communication-Avoiding Variant, Zhaojun Bai

Mathematical Sciences Spring Lecture Series

There are continual and compelling needs for computing many eigenpairs of very large Hermitian matrix in physical simulations and data analysis. Though the Lanczos method is effective for computing a few eigenvalues, it can be expensive for computing a large number of eigenvalues. To improve the performance of the Lanczos method, in this talk, we will present a combination of explicit external deflation (EED) with an s-step variant of thick-restart Lanczos (s-step TRLan). The s-step Lanczos method can achieve an order of s reduction in data movement while the EED enables to compute eigenpairs in batches along with a number …


Lecture 12: Recent Advances In Time Integration Methods And How They Can Enable Exascale Simulations, Carol S. Woodward Apr 2021

Lecture 12: Recent Advances In Time Integration Methods And How They Can Enable Exascale Simulations, Carol S. Woodward

Mathematical Sciences Spring Lecture Series

To prepare for exascale systems, scientific simulations are growing in physical realism and thus complexity. This increase often results in additional and changing time scales. Time integration methods are critical to efficient solution of these multiphysics systems. Yet, many large-scale applications have not fully embraced modern time integration methods nor efficient software implementations. Hence, achieving temporal accuracy with new and complex simulations has proved challenging. We will overview recent advances in time integration methods, including additive IMEX methods, multirate methods, and parallel-in-time approaches, expected to help realize the potential of exascale systems on multiphysics simulations. Efficient execution of these methods …


Law Library Blog (January 2021): Legal Beagle's Blog Archive, Roger Williams University School Of Law Jan 2021

Law Library Blog (January 2021): Legal Beagle's Blog Archive, Roger Williams University School Of Law

Law Library Newsletters/Blog

No abstract provided.


Development Of A Real Time Human Face Recognition Software System, Askar Boranbayev, Seilkhan Boranbayev, Mukhamedzhan Amirtaev, Malik Baimukhamedov, Askar Nurbekov Jan 2021

Development Of A Real Time Human Face Recognition Software System, Askar Boranbayev, Seilkhan Boranbayev, Mukhamedzhan Amirtaev, Malik Baimukhamedov, Askar Nurbekov

Physics and Astronomy Faculty Publications and Presentations

In this study, a system for real-time face recognition was built using the Open Face tools of the Open CV library. The article describes the methodology for creating the system and the results of its testing. The Open CV library has various modules that perform many tasks. In this paper, Open CV modules were used for face recognition in images and face identification in real time. In addition, the HOG method was used to detect a person by the front of his face. After performing the HOG method, 128 face measurements were obtained using the image encoding method. A convolutional …


Football’S Future: An Analytical Interpretation Of The Premier League, Hunter Witeof Jan 2021

Football’S Future: An Analytical Interpretation Of The Premier League, Hunter Witeof

Williams Honors College, Honors Research Projects

This project looks to take the statistics of soccer players and run them through an algorithm to determine how well a player is performing. The system that will be designed in the project will look to accomplish 3 main goals: allow the user to enter new statistics, store the data for all 38 game weeks for all 20 teams, and compute a score for each player’s performance for each game as well as the average of all of the player's scores.


Loss Of Precision In Implementations Of The Toom-Cook Algorithm, Marcus Elia Jan 2021

Loss Of Precision In Implementations Of The Toom-Cook Algorithm, Marcus Elia

Graduate College Dissertations and Theses

Historically, polynomial multiplication has required a quadratic number of operations. Several algorithms in the past century have improved upon this. In this work, we focus on the Toom-Cook algorithm. Devised by Toom in 1963, it is a family of algorithms parameterized by an integer, n. The algorithm multiplies two polynomials by recursively dividing them into smaller polynomials, multiplying many small polynomials, and interpolating to obtain the product. While it is no longer the asymptotically fastest method of multiplying, there is a range of intermediate degrees (typically less than 1000) where it performs the best.

Some applications, like quantum-resistant cryptosystems, require …


Exact Generalized Voronoi Diagram Computation Using A Sweepline Algorithm, Daniel Marsden Dec 2020

Exact Generalized Voronoi Diagram Computation Using A Sweepline Algorithm, Daniel Marsden

All Graduate Theses and Dissertations, Spring 1920 to Summer 2023

Voronoi Diagrams can provide useful spatial information. Little work has been done on computing exact Voronoi Diagrams when the sites are more complex than a point. We introduce a technique that measures the exact Generalized Voronoi Diagram from points, line segments and, connected lines including lines that connect to form simple polygons. Our technique is an extension of Fortune’s method. Our approach treats connected lines (or polygons) as a single site.


Research On Multi-Objective Optimization Method Based On Model, Jianjun Liu, Guangya Si, Yanzheng Wang, Dachuan He Nov 2020

Research On Multi-Objective Optimization Method Based On Model, Jianjun Liu, Guangya Si, Yanzheng Wang, Dachuan He

Journal of System Simulation

Abstract: There is a model-based algorithm for the optimization of multiple objective functions by means of black-box evaluation is proposed. The algorithm iteratively generates candidate solutions from a mixture distribution over the solution space and updates the mixture distribution based on the sampled solutions’ domination count, such that the future search is biased towards the set of Pareto optimal solutions. The proposed algorithm seeks to find a mixture distribution on the solution space so that each component of the mixture distribution is a degenerate distribution centered at a Pareto optimal solution and each estimated Pareto optimal solution is uniformly spread …


Qwasi: The Quantum Walk Simulator, Warren V. Wilson Aug 2020

Qwasi: The Quantum Walk Simulator, Warren V. Wilson

Theses and Dissertations

As quantum computing continues to evolve, the ability to design and analyze novel quantum algorithms becomes a necessary focus for research. In many instances, the virtues of quantum algorithms only become evident when compared to their classical counterparts, so a study of the former often begins with a consideration of the latter. This is very much the case with quantum walk algorithms, as the success of random walks and their many, varied applications have inspired much interest in quantum correlates. Unfortunately, finding purely algebraic solutions for quantum walks is an elusive endeavor. At best, and when solvable, they require simple …


Design Of Unified Algorithm For Sampling Mpdu, Ti Zhou, Miao Yi, Yang Jian Aug 2020

Design Of Unified Algorithm For Sampling Mpdu, Ti Zhou, Miao Yi, Yang Jian

Journal of System Simulation

Abstract: The standard of CCSDS AOS is used in space exploration because of the process of the standard airspace system. The spacecraft missions have used multi-protocol data unit (MPDU) to multiplex the package channels. The range of MPDU and the data are different in different spacecrafts. This process brings some problems in the maintenance and the correctness of the algorithms of virtual channel multiplexing in simulation system. The applications of CCSDS in the world were researched, and the general definitions of MPDU in these missions were described. A circle memory was given to buffer the data of MPDU, two general …


Study Of Parallelized Graph Clustering Algorithm Based On Spark, Dongjiang Liu, Jianhui Li Jun 2020

Study Of Parallelized Graph Clustering Algorithm Based On Spark, Dongjiang Liu, Jianhui Li

Journal of System Simulation

Abstract: The parallelized graph clustering algorithm is researched. A new parallelized graph clustering algorithm is proposed based on Spark. As the top operation of Spark occupies a lot of memory space, a new algorithm which is used to substitute the top operation is proposed to reduce the memory consumption. By improving bottom up hierarchical clustering algorithm, the speed of the proposed algorithm is improved. A new data filtering method based on the feature of graph data is proposed. By the method, the running time and memory space comsuption is reduced greatly. The reason of the high efficiency of this filtering …