Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Other Computer Sciences

Journal

2020

Institution
Keyword
Publication

Articles 1 - 10 of 10

Full-Text Articles in Physical Sciences and Mathematics

Use Of Image Processing Algorithms For Mine Originating Waste Grain Size Determination, Sebastian Iwaszenko Dec 2020

Use Of Image Processing Algorithms For Mine Originating Waste Grain Size Determination, Sebastian Iwaszenko

Journal of Sustainable Mining

The utilization of mineral wastes from the mining industry is one of most challenging phases in the raw materials life cycle. In many countries, there are piles of mineral waste materials that date back to the previous century. There is also a constant stream of accompanying mineral matter excavated during everyday mine operation. This stream of waste matter is particularly notable for deep coal mining. Grain size composition of waste mineral matter is one of most important characteristics of coal originating waste material. This paper presents the use of image analysis for the determination of grain size composition of mineral …


Methodological Aspects Of Distance Learning For Developing The Professional Competence Of Students Of The Direction "Computer Engineering, B Kuznetsova, Gulnora Muxtarova, Umida Azimova, Kim Yelena Dec 2020

Methodological Aspects Of Distance Learning For Developing The Professional Competence Of Students Of The Direction "Computer Engineering, B Kuznetsova, Gulnora Muxtarova, Umida Azimova, Kim Yelena

Bulletin of TUIT: Management and Communication Technologies

This work is based on the use of distance learning technologies in education, which will make it possible to individualize training, and in turn contributes to the formation of professionally important qualities for students of the direction of "Computer Engineering". The experimental work was aimed at developing a technology for the formation of students' professional competence.

The article shows that the mastery by students of knowledge, skills and abilities in the field of computer engineering was aimed at their conscious application in solving problems of the educational and cognitive process, and subsequently in professional activity.

The article presents the results …


Evaluation Of Reliability Indicators Of Mobile Communication System Bases, Dilmurod Davronbekov, Utkir Karimovich Matyokubov, Malika Ilkhamovna Abdullayeva Nov 2020

Evaluation Of Reliability Indicators Of Mobile Communication System Bases, Dilmurod Davronbekov, Utkir Karimovich Matyokubov, Malika Ilkhamovna Abdullayeva

Bulletin of TUIT: Management and Communication Technologies

In this study, the reliability of mobile system base stations (BTS) is assessed by analyzing data obtained on faults in about 200 BTS over a six-month period. Five BTSs with the highest number of failures and duration of failure were selected in these BTSs. Based on the data obtained, reliability parameters were calculated and compared.

The study used Weibull’s dismissal process distribution method. The breakdown times of each BTS were sorted. In all five BTS, it was found that β(where the value of β is the approximate value obtained from the values of the smallest squares of the Weibull graph), …


Hamming Codes, Steve Mwangi, Sterling Quinn Nov 2020

Hamming Codes, Steve Mwangi, Sterling Quinn

Access*: Interdisciplinary Journal of Student Research and Scholarship

We will be looking into the application of Matrix Algebra in forming Hamming Codes. Hamming Codes are essential not just in the detection of errors, but also in the linear concurrent correction of these errors. The matrices we will use, will have entries that are binary units. Binary units are mathematically convenient, and their simplicity permits the representation of many open and closed circuits used in communication systems. The entries in the matrices will represent a message that is meant for transmission or reception, akin to the contemporary application of Hamming Codes in wireless communication. We will use Hamming (7,4) …


Ranking Volatility In Building Energy Consumption Using Ensemble Learning And Information Entropy, Kunal Sharma, Jung-Ho Lewe Aug 2020

Ranking Volatility In Building Energy Consumption Using Ensemble Learning And Information Entropy, Kunal Sharma, Jung-Ho Lewe

Georgia Journal of Science

Given the rise in building energy consumption and demand worldwide, energy inefficiency detection has become extremely important. A significant portion of the energy used in commercial buildings is wasted as a result of poor maintenance, degradation or improperly controlled equipment. Most facilities employ sensors to track energy consumption across multiple buildings. Smart fault detection and diagnostic systems use various anomaly detection techniques to discover point anomalies in consumption. While these systems work reasonably well in detecting equipment anomalies over short-term intervals, further exploration is needed in finding methods that consider long-term consumption to detect anomalous buildings. This paper presents a …


Critical Media, Information, And Digital Literacy: Increasing Understanding Of Machine Learning Through An Interdisciplinary Undergraduate Course, Barbara R. Burke, Elena Machkasova Jul 2020

Critical Media, Information, And Digital Literacy: Increasing Understanding Of Machine Learning Through An Interdisciplinary Undergraduate Course, Barbara R. Burke, Elena Machkasova

Irish Communication Review

Widespread use of Artificial Intelligence in all areas of today’s society creates a unique problem: algorithms used in decision-making are generally not understandable to those without a background in data science. Thus, those who use out-of-the-box Machine Learning (ML) approaches in their work and those affected by these approaches are often not in a position to analyze their outcomes and applicability.

Our paper describes and evaluates our undergraduate course at the University of Minnesota Morris, which fosters understanding of the main ideas behind ML. With Communication, Media & Rhetoric and Computer Science faculty expertise, students from a variety of majors, …


Summed Batch Lexicase Selection On Software Synthesis Problems, Joseph Deglman Jul 2020

Summed Batch Lexicase Selection On Software Synthesis Problems, Joseph Deglman

Scholarly Horizons: University of Minnesota, Morris Undergraduate Journal

Lexicase selection is one of the most successful parent selection methods in evolutionary computation. However, it has the drawback of being a more computationally involved process and thus taking more time compared to other selection methods, such as tournament selection. Here, we study a version of lexicase selection where test cases are combined into several composite errors, called summed batch lexicase selection; the hope being faster but still reasonable success. Runs on some software synthesis problems show that a larger batch size tends to reduce the success rate of runs, but the results are not very conclusive as the number …


Designing A Future: Silicon Valley-Born Brit Biddle '19 Melds Tech And Art Of Mayflower Hill, Mareisa Weil May 2020

Designing A Future: Silicon Valley-Born Brit Biddle '19 Melds Tech And Art Of Mayflower Hill, Mareisa Weil

Colby Magazine

"This education has taught me how to look at a problem and really think about it. And i've been able to balance that out with art." -Brit Biddle '19


The Use Of Digital Millenium Copyright Act To Stifle Speech Through Non-Copyright Related Takedowns, Miller Freeman May 2020

The Use Of Digital Millenium Copyright Act To Stifle Speech Through Non-Copyright Related Takedowns, Miller Freeman

Seattle Journal of Technology, Environmental & Innovation Law

In 1998, Congress passed the Digital Millennium Copyright Act. This law provided new methods of protecting copyright in online media. These protections shift the normal judicial process that would stop the publication of infringing materials to private actors: the online platforms. As a result, online platforms receive notices of infringement and issue takedowns of allegedly copyrighted works without the judicial process which normally considers the purpose of the original notice of infringement. In at least one case, discussed in detail below, this has resulted in a notice and takedown against an individual for reasons not related to the purpose of …


Who Owns Bitcoin? Private Law Facing The Blockchain, Matthias Lehmann Feb 2020

Who Owns Bitcoin? Private Law Facing The Blockchain, Matthias Lehmann

Minnesota Journal of Law, Science & Technology

No abstract provided.