Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Singapore Management University (15)
- University of Nevada, Las Vegas (13)
- Old Dominion University (11)
- SelectedWorks (7)
- Institute of Business Administration (5)
-
- Western University (5)
- Portland State University (3)
- Rose-Hulman Institute of Technology (3)
- Technological University Dublin (3)
- San Jose State University (2)
- University of Dayton (2)
- University of Tennessee, Knoxville (2)
- Air Force Institute of Technology (1)
- Chapman University (1)
- Edith Cowan University (1)
- Illinois Math and Science Academy (1)
- Selected Works (1)
- The University of Southern Mississippi (1)
- University of Denver (1)
- University of Nebraska - Lincoln (1)
- Keyword
-
- Algorithms (6)
- Local fractional calculus (6)
- Cryptography (4)
- Fractal (4)
- Reprint articles (4)
-
- Diseases (3)
- 3D face modeling (2)
- 3D face models (2)
- 3D morphable model (2)
- Algorithm (2)
- Applied sciences (2)
- Computational intelligence (2)
- Computer algorithms (2)
- Conference articles (2)
- Differential evolution (2)
- Evolutionary algorithms (2)
- Face recognition (2)
- Machine learning (2)
- Magnetic resonance imaging (2)
- Medical imaging (2)
- Organizations (2)
- Privacy (2)
- Regular chain (2)
- Segmentation (2)
- Textures (2)
- Three dimensional (2)
- Three dimensional computer graphics (2)
- Triangulation (2)
- Tumors (2)
- Uncertainty (2)
- Publication
-
- Research Collection School Of Computing and Information Systems (14)
- UNLV Theses, Dissertations, Professional Papers, and Capstones (12)
- Electrical & Computer Engineering Faculty Publications (9)
- Xiao-Jun Yang (8)
- Electronic Thesis and Dissertation Repository (5)
-
- International Conference on Information and Communication Technologies (5)
- Mathematical Sciences Technical Reports (MSTR) (3)
- Computer Science Faculty Publications (2)
- Doctoral Dissertations (2)
- Master's Projects (2)
- Systems Science Friday Noon Seminar Series (2)
- Articles (1)
- CSE Technical Reports (1)
- Calvert Undergraduate Research Awards (1)
- Computer Science Faculty Publications and Presentations (1)
- Computer Science Theses & Dissertations (1)
- Conference papers (1)
- Dissertations (1)
- Electrical & Computer Engineering Theses & Dissertations (1)
- Electronic Theses and Dissertations (1)
- LARC Research Publications (1)
- Mathematics, Physics, and Computer Science Faculty Books and Book Chapters (1)
- Other resources (1)
- Research outputs 2011 (1)
- Student Publications & Research (1)
- Theses and Dissertations (1)
- Publication Type
Articles 1 - 30 of 79
Full-Text Articles in Physical Sciences and Mathematics
Mobile Phone Graph Evolution: Findings, Model And Interpretation, Siyuan Liu, Lei Li, Christos Faloutsos, Lionel M. Ni
Mobile Phone Graph Evolution: Findings, Model And Interpretation, Siyuan Liu, Lei Li, Christos Faloutsos, Lionel M. Ni
LARC Research Publications
What are the features of mobile phone graph along the time? How to model these features? What are the interpretation for the evolutional graph generation process? To answer the above challenging problems, we analyze a massive who-call-whom networks as long as a year, gathered from records of two large mobile phone communication networks both with 2 million users and 2 billion of calls. We examine the calling behavior distribution at multiple time scales (e.g. day, week, month and quarter), and find that the distribution is not only skewed with a heavy tail, but also changing at different time scales. How …
Identifying Effort Estimation Factors For Corrective Maintenance In Object-Oriented Systems, Michael J. Lee
Identifying Effort Estimation Factors For Corrective Maintenance In Object-Oriented Systems, Michael J. Lee
UNLV Theses, Dissertations, Professional Papers, and Capstones
This research identifies factors that impact software maintenance effort by exploring the decision-making process of expert estimators of corrective maintenance projects by using qualitative methods to identify the factors that they use in deriving estimates. We implement a technique called causal mapping, which allows us to identify the cognitive links between the information that estimators use, and the estimates that they produce based on that information. Results suggest that a total of 17 factors may be relevant for corrective maintenance effort estimation, covering constructs related to developers, code, defects, and environment. When these factors are rank-ordered, they demonstrate that some …
Quantification Of Stochastic Uncertainty Propagation For Monte Carlo Depletion Methods In Reactor Analysis, Quentin Thomas Newell
Quantification Of Stochastic Uncertainty Propagation For Monte Carlo Depletion Methods In Reactor Analysis, Quentin Thomas Newell
UNLV Theses, Dissertations, Professional Papers, and Capstones
The Monte Carlo method provides powerful geometric modeling capabilities for large problem domains in 3-D; therefore, the Monte Carlo method is becoming popular for 3-D fuel depletion analyses to compute quantities of interest in spent nuclear fuel including isotopic compositions. The Monte Carlo approach has not been fully embraced due to unresolved issues concerning the effect of Monte Carlo uncertainties on the predicted results.
Use of the Monte Carlo method to solve the neutron transport equation introduces stochastic uncertainty in the computed fluxes. These fluxes are used to collapse cross sections, estimate power distributions, and deplete the fuel within depletion …
Beyond Search: Event-Driven Summarization For Web Videos, Richard Hong, Jinhui Tang, Hung-Khoon Tan, Chong-Wah Ngo, Shuicheng Yan, Tat-Seng Chua
Beyond Search: Event-Driven Summarization For Web Videos, Richard Hong, Jinhui Tang, Hung-Khoon Tan, Chong-Wah Ngo, Shuicheng Yan, Tat-Seng Chua
Research Collection School Of Computing and Information Systems
The explosive growth of Web videos brings out the challenge of how to efficiently browse hundreds or even thousands of videos at a glance. Given an event-driven query, social media Web sites usually return a large number of videos that are diverse and noisy in a ranking list. Exploring such results will be time-consuming and thus degrades user experience. This article presents a novel scheme that is able to summarize the content of video search results by mining and threading "key" shots, such that users can get an overview of main content of these videos at a glance. The proposed …
Exploring Tweets Normalization And Query Time Sensitivity For Twitter Search, Zhongyu Wei, Wei Gao, Lanjun Zhou, Binyang Li, Kam-Fai Wong
Exploring Tweets Normalization And Query Time Sensitivity For Twitter Search, Zhongyu Wei, Wei Gao, Lanjun Zhou, Binyang Li, Kam-Fai Wong
Research Collection School Of Computing and Information Systems
This paper presents our work for the Realtime Adhoc Task of TREC 2011 Microblog Track. Microblog texts like tweets are generally characterized by the inclusion of a large proportion of irregular expressions, such as ill-formed words, which can lead to significant mismatch between query terms and tweets. In addition, Twitter queries are distinguished from Web queries with many unique characteristics, one of which reflects the clearly distinct temporal aspects of Twitter search behavior. In this study, we deal with the first problem by normalizing tweet texts and the second by capturing the temporal characteristics of topic. We divided topics into …
Advances In Graph-Cut Optimization: Multi-Surface Models, Label Costs, And Hierarchical Costs, Andrew T. Delong
Advances In Graph-Cut Optimization: Multi-Surface Models, Label Costs, And Hierarchical Costs, Andrew T. Delong
Electronic Thesis and Dissertation Repository
Computer vision is full of problems that are elegantly expressed in terms of mathematical optimization, or energy minimization. This is particularly true of "low-level" inference problems such as cleaning up noisy signals, clustering and classifying data, or estimating 3D points from images. Energies let us state each problem as a clear, precise objective function. Minimizing the correct energy would, hypothetically, yield a good solution to the corresponding problem. Unfortunately, even for low-level problems we are confronted by energies that are computationally hard—often NP-hard—to minimize. As a consequence, a rather large portion of computer vision research is dedicated to proposing …
Solving Polynomial Systems Via Triangular Decomposition, Changbo Chen
Solving Polynomial Systems Via Triangular Decomposition, Changbo Chen
Electronic Thesis and Dissertation Repository
Finding the solutions of a polynomial system is a fundamental problem with numerous applications in both the academic and industrial world. In this thesis, we target on computing symbolically both the real and the complex solutions of nonlinear polynomial systems with or without parameters. To this end, we improve existing algorithms for computing triangular decompositions. Based on that, we develop various new tools for solving polynomial systems and illustrate their effectiveness by applications.
We propose new algorithms for computing triangular decompositions of polynomial systems incrementally. With respect to previous works, our improvements are based on a weakened notion of a …
Isomorph-Free Generation Of 2-Connected Graphs With Applications, Derrick Stolee
Isomorph-Free Generation Of 2-Connected Graphs With Applications, Derrick Stolee
CSE Technical Reports
Many interesting graph families contain only 2-connected graphs, which have ear decompositions. We develop a technique to generate families of unlabeled 2-connected graphs using ear augmentations and apply this technique to two problems. In the first application, we search for uniquely Kr-saturated graphs and find the list of uniquely K4-saturated graphs on at most 12 vertices, supporting current conjectures for this problem. In the second application, we verify the Edge Reconstruction Conjecture for all 2-connected graphs on at most 12 vertices. This technique can be easily extended to more problems concerning 2-connected graphs.
Some Single And Combined Operations On Formal Languages: Algebraic Properties And Complexity, Bo Cui
Some Single And Combined Operations On Formal Languages: Algebraic Properties And Complexity, Bo Cui
Electronic Thesis and Dissertation Repository
In this thesis, we consider several research questions related to language operations in the following areas of automata and formal language theory: reversibility of operations, generalizations of (comma-free) codes, generalizations of basic operations, language equations, and state complexity.
Motivated by cryptography applications, we investigate several reversibility questions with respect to the parallel insertion and deletion operations. Among the results we obtained, the following result is of particular interest. For languages L1, L2 ⊆ Σ∗, if L2 satisfies the condition L2ΣL2 ∩ Σ+L2Σ+ = ∅, then …
Workflow-Net Based Cooperative Multi-Agent Systems, Yehia T. Kotb
Workflow-Net Based Cooperative Multi-Agent Systems, Yehia T. Kotb
Electronic Thesis and Dissertation Repository
Workflow-nets are mathematical frameworks that are used to formally describe, model and implement workflows. First, we propose critical section workflow nets (abbreviated WFCSnet). This framework allows feedbacks in workflow systems while ensuring the soundness of the workflow. Feedback is generally not recommended in workflow systems as they threaten the soundness of the system. The proposed WFCSnet allows safe feedback and limits the maximum number of activities per workflow as required. A theorem for soundness of WFCSnet is presented. Serializability, Separability, Quasi-liveness and CS-Properties of WFCSnet are examined and some theorems and lemmas are proposed to mathematically formalize them. In this …
Transcriptomic Data Analysis Using Graph-Based Out-Of-Core Methods, Gary L Rogers
Transcriptomic Data Analysis Using Graph-Based Out-Of-Core Methods, Gary L Rogers
Doctoral Dissertations
Biological data derived from high-throughput microarrays can be transformed into finite, simple, undirected graphs and analyzed using tools first introduced by the Langston Lab at the University of Tennessee. Transforming raw data can be broken down into three main tasks: data normalization, generation of similarity metrics, and threshold selection. The choice of methods used in each of these steps effect the final outcome of the graph, with respect to size, density, and structure. A number of different algorithms are examined and analyzed to illustrate the magnitude of the effects.
Graph-based tools are then used to extract putative gene networks. These …
A Geospatial Based Decision Framework For Extending Marssim Regulatory Principles Into The Subsurface, Robert Nathan Stewart
A Geospatial Based Decision Framework For Extending Marssim Regulatory Principles Into The Subsurface, Robert Nathan Stewart
Doctoral Dissertations
The Multi-Agency Radiological Site Survey Investigation Manual (MARSSIM) is a regulatory guidance document regarding compliance evaluation of radiologically contaminated soils and buildings (USNRC, 2000). Compliance is determined by comparing radiological measurements to established limits using a combination of hypothesis testing and scanning measurements. Scanning allows investigators to identify localized pockets of contamination missed during sampling and allows investigators to assess radiological exposure at different spatial scales. Scale is important in radiological dose assessment as regulatory limits can vary with the size of the contaminated area and sites are often evaluated at more than one scale (USNRC, 2000). Unfortunately, scanning is …
Roaming Region For Delaunay Triangulation, Romas James Hada
Roaming Region For Delaunay Triangulation, Romas James Hada
UNLV Theses, Dissertations, Professional Papers, and Capstones
Delaunay graphs have been used in CAD/CAM, sensor network and geographic information systems. We investigate the reliability properties of nodes in Delaunay graphs. For measuring the reliability we formulate the concept of roaming-region for nodes. A node v with large roaming-region r(v) such that v is positioned near the center of r(v) is identified as a reliable node. We develop algorithms for constructing roaming-regions and present an implementation of the proposed algorithm in the Java programming language.
Improved Algorithms For Ear-Clipping Triangulation, Bartosz Kajak
Improved Algorithms For Ear-Clipping Triangulation, Bartosz Kajak
UNLV Theses, Dissertations, Professional Papers, and Capstones
We consider the problem of improving ear-slicing algorithm for triangulating a simple polygon. We propose two variations of ear-slicing technique for generating “good-quality” triangulation. The first approach is based on searching for the best triangle along the boundary. The second approach considers polygon partitioning on a pre-process before applying the ear-slicing. Experimental investigation reveals that both approaches yield better quality triangulation than the standard ear-slicing method.
Structure And Randomness Of The Discrete Lambert Map, Jingjing Chen, Mark Lotts
Structure And Randomness Of The Discrete Lambert Map, Jingjing Chen, Mark Lotts
Mathematical Sciences Technical Reports (MSTR)
We investigate the structure and cryptographic applications of the Discrete Lambert Map (DLM). The mapping is closely related to the Discrete Log Problem, but has received far less attention since it is considered to be a more complicated map that is likely even harder to invert. However, this mapping is quite important because it underlies the security of the ElGamal Digital Signature Scheme. Using functional graphs induced by this mapping, we were able to find non-random properties that could potentially be used to exploit the ElGamal DSS.
The Square Discrete Exponentiation Map, A Wood
The Square Discrete Exponentiation Map, A Wood
Mathematical Sciences Technical Reports (MSTR)
We will examine the square discrete exponentiation map and its properties. The square discrete exponentiation map is a variation on a commonly seen problem in cryptographic algorithms. This paper focuses on understanding the underlying structure of the functional graphs generated by this map. Specifically, this paper focuses on explaining the in-degree of graphs of safe primes, which are primes of the form p = 2q + 1, where q is also prime.
Image Processing – I: Pointing And Target Selection Of Object Using Color Detection Algorithm Through Dsp Processor Tms320c6711, Waseem Ahmed, M. Irfan, Mr. Muzammil, Mr. Yaseen
Image Processing – I: Pointing And Target Selection Of Object Using Color Detection Algorithm Through Dsp Processor Tms320c6711, Waseem Ahmed, M. Irfan, Mr. Muzammil, Mr. Yaseen
International Conference on Information and Communication Technologies
In the field of robotic and image vision technologies, the embedded computing and optimization of the image processing algorithm is quite significant in order to provide the real time processing. In the current era, for making the real time system for such high extensive computation and processing for providing the high speed and real time standalone system, several industrial giants continuously providing the solutions which are in the form of dedicated DSP processors and generalized FPGAs. Beside such high speed processor implementation, the image processing based algorithm plays significant role in machine vision based solution for industries, robotic and field …
Network Security: Privacy-Preserving Data Publication: A Review On “Updates” In Continuous Data Publication, Adeel Anjum, Guillaume Raschia
Network Security: Privacy-Preserving Data Publication: A Review On “Updates” In Continuous Data Publication, Adeel Anjum, Guillaume Raschia
International Conference on Information and Communication Technologies
Preserving the privacy of individuals while publishing their relevant data has been an important problem. Most of previous works in privacy preserving data publication focus on one time, static release of datasets. In multiple publications however, where data is published multiple times, these techniques are unable to ensure privacy of the concerned individuals as just joining either of the releases could result in identity disclosure. In this work, we tried to investigate the major findings in the scenario of continuous data publication, in which the data is not only published multiple times but also modified with INSERTS, UPDATES and DELETE …
Image Processing – I: Automated System For Fingerprint Image Enhancement Using Improved Segmentation And Gabor Wavelets, Amna Saeed, Anam Tariq, Usman Jawaid
Image Processing – I: Automated System For Fingerprint Image Enhancement Using Improved Segmentation And Gabor Wavelets, Amna Saeed, Anam Tariq, Usman Jawaid
International Conference on Information and Communication Technologies
This research revolves around the fingerprint image enhancement. It is used for automated fingerprint identification systems (AFIS) for extracting the best quality fingerprint images. Accurate feature extraction and identification is the basic theme of this enhancement. This paper is on the fingerprint image enhancement using wavelets. Wavelets are famous for their special localization property and orientation flow estimation. The proposed technique is basically comprises of three main steps: segmentation followed by image sharpening and then Gabor wavelet filtering. Segmentation distinguishes between image background and foreground which in turn reduces processing time. Our sharpening stage of enhancement algorithm sharpens the edges …
Application Of Ict: Fram Based Tmr (Triple Modular Redundancy) For Fault Tolerance Implementation, Kashif Sagheer Siddiqui, Mirza Altamash Baig
Application Of Ict: Fram Based Tmr (Triple Modular Redundancy) For Fault Tolerance Implementation, Kashif Sagheer Siddiqui, Mirza Altamash Baig
International Conference on Information and Communication Technologies
The main objective of this paper is to design a Triple modular redundancy test bench using FRAM (Ferroelectric RAM) based memory module for main driver of OBDH (On Board Data Handling) system of LEO (Lower Earth Orbit) Satellite that enables the fast detection of error in driver data when implied with FPGA (Field Programmable Gate Array) and provides more realistic and tolerant way of fault finding for Single Event Upset (SEU) in highly radiated space environment. The scope of paper embraces development of TMR test bench, software algorithms, functional simulations, timing simulations and conclusion of comparison of FRAM based memory …
Artificial Intelligence - I: Adaptive Automated Teller Machines - Part Ii, Ghulam Mujtaba, Tariq Mahmood
Artificial Intelligence - I: Adaptive Automated Teller Machines - Part Ii, Ghulam Mujtaba, Tariq Mahmood
International Conference on Information and Communication Technologies
Nowadays, the banking sector is increasingly relying on Automated Teller Machines (ATMs) in order to provide services to its customers. Although thousands of ATMs exist across many banks and different locations, the GUI and content of a typical ATM interface remains, more or less, the same. For instance, any ATM provides typical options for withdrawal, electronic funds transfer, viewing of mini-statements etc. However, such a static interface might not be suitable for all ATM customers, e.g., some users might not prefer to view all the options when they access the ATM, or to view specific withdrawal amounts less than, say, …
Heuristic Algorithms For Balanced Multi-Way Number Partitioning, Jilian Zhang, Kyriakos Mouratidis, Hwee Hwa Pang
Heuristic Algorithms For Balanced Multi-Way Number Partitioning, Jilian Zhang, Kyriakos Mouratidis, Hwee Hwa Pang
Research Collection School Of Computing and Information Systems
Balanced multi-way number partitioning (BMNP) seeks to split a collection of numbers into subsets with (roughly) the same cardinality and subset sum. The problem is NP-hard, and there are several exact and approximate algorithms for it. However, existing exact algorithms solve only the simpler, balanced two-way number partitioning variant, whereas the most effective approximate algorithm, BLDM, may produce widely varying subset sums. In this paper, we introduce the LRM algorithm that lowers the expected spread in subset sums to one third that of BLDM for uniformly distributed numbers and odd subset cardinalities. We also propose Meld, a novel strategy for …
Automatic Content Generation For Video Self Modeling, Ju Shen, Anusha Raghunathan, Sen-Ching S. Cheung, Ravi R. Patel
Automatic Content Generation For Video Self Modeling, Ju Shen, Anusha Raghunathan, Sen-Ching S. Cheung, Ravi R. Patel
Computer Science Faculty Publications
Video self modeling (VSM) is a behavioral intervention technique in which a learner models a target behavior by watching a video of him or herself. Its effectiveness in rehabilitation and education has been repeatedly demonstrated but technical challenges remain in creating video contents that depict previously unseen behaviors. In this paper, we propose a novel system that re-renders new talking-head sequences suitable to be used for VSM treatment of patients with voice disorder. After the raw footage is captured, a new speech track is either synthesized using text-to-speech or selected based on voice similarity from a database of clean speeches. …
Online Auc Maximization, Peilin Zhao, Steven C. H. Hoi, Rong Jin, Tianbo Yang
Online Auc Maximization, Peilin Zhao, Steven C. H. Hoi, Rong Jin, Tianbo Yang
Research Collection School Of Computing and Information Systems
Most studies of online learning measure the performance of a learner by classification accuracy, which is inappropriate for applications where the data are unevenly distributed among different classes. We address this limitation by developing online learning algorithm for maximizing Area Under the ROC curve (AUC), a metric that is widely used for measuring the classification performance for imbalanced data distributions. The key challenge of online AUC maximization is that it needs to optimize the pairwise loss between two instances from different classes. This is in contrast to the classical setup of online learning where the overall loss is a sum …
Algorithms Analysis System: Recurrences, Anchit Sharma
Algorithms Analysis System: Recurrences, Anchit Sharma
Master's Projects
Algorithms which are recursive have running times which can be described by
recurrence equations or recurrences. These equations determine the overall running time complexity of the algorithm. This project intends to create a mechanism for
-
auto generating recurrence equations of the form T(n) = a(T(n)/b) + f(n)
-
creating a computational method for solving them and generating running times
i.e. O (f(n)) or Ω (f(n)).
-
presenting students with a way to verify their manually computed answers with
the solution generation by the project
-
generating grading and feedback for their solution
The exercises will utilize the ‘Substitution Method’ and the ‘Master Method’ …
Estimating Anthropometric Marker Locations From 3-D Ladar Point Clouds, Matthew J. Maier
Estimating Anthropometric Marker Locations From 3-D Ladar Point Clouds, Matthew J. Maier
Theses and Dissertations
An area of interest for improving the identification portion of the system is in extracting anthropometric markers from a Laser Detection and Ranging (LADAR) point cloud. Analyzing anthropometrics markers is a common means of studying how a human moves and has been shown to provide good results in determining certain demographic information about the subject. This research examines a marker extraction method utilizing principal component analysis (PCA), self-organizing maps (SOM), alpha hulls, and basic anthropometric knowledge. The performance of the extraction algorithm is tested by performing gender classification with the calculated markers.
Applications Of Local Fractional Calculus To Engineering In Fractal Time-Space: Local Fractional Differential Equations With Local Fractional Derivative, Yang Xiao-Jun
Xiao-Jun Yang
This paper presents a better approach to model an engineering problem in fractal-time space based on local fractional calculus. Some examples are given to elucidate to establish governing equations with local fractional derivative.
A Short Introduction To Local Fractional Complex Analysis, Yang Xiao-Jun
A Short Introduction To Local Fractional Complex Analysis, Yang Xiao-Jun
Xiao-Jun Yang
This paper presents a short introduction to local fractional complex analysis. The generalized local fractional complex integral formulas, Yang-Taylor series and local fractional Laurent’s series of complex functions in complex fractal space, and generalized residue theorems are investigated.
Fractional Trigonometric Functions In Complex-Valued Space: Applications Of Complex Number To Local Fractional Calculus Of Complex Function, Yang Xiao-Jun
Xiao-Jun Yang
This paper presents the fractional trigonometric functions in complex-valued space and proposes a short outline of local fractional calculus of complex function in fractal spaces.
A New Viewpoint To The Discrete Approximation: Discrete Yang-Fourier Transforms Of Discrete-Time Fractal Signal, Yang Xiao-Jun
A New Viewpoint To The Discrete Approximation: Discrete Yang-Fourier Transforms Of Discrete-Time Fractal Signal, Yang Xiao-Jun
Xiao-Jun Yang
It is suggest that a new fractal model for the Yang-Fourier transforms of discrete approximation based on local fractional calculus and the Discrete Yang-Fourier transforms are investigated in detail.