Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Southern Methodist University (11)
- Embry-Riddle Aeronautical University (7)
- Ministry of Higher and Secondary Specialized Education of the Republic of Uzbekistan (5)
- Rochester Institute of Technology (5)
- Universitas Negeri Yogyakarta (5)
-
- Kennesaw State University (4)
- Prairie View A&M University (4)
- Old Dominion University (2)
- Purdue University (2)
- San Jose State University (2)
- University of Arkansas, Fayetteville (2)
- University of Minnesota Morris Digital Well (2)
- University of South Florida (2)
- William & Mary Law School (2)
- Association of Arab Universities (1)
- Beirut Arab University (1)
- Binghamton University (1)
- Bridgewater State University (1)
- Brigham Young University (1)
- California State University, San Bernardino (1)
- Central Mining Institute (1)
- Chapman University (1)
- Chinese Academy of Sciences (1)
- Claremont Colleges (1)
- Georgia Academy of Science (1)
- Marshall University (1)
- Minnesota State University, Mankato (1)
- Murray State University (1)
- Rochester Regional Health (1)
- Seattle University School of Law (1)
- Keyword
-
- Machine learning (7)
- Neural networks (3)
- Algorithms (2)
- Analysis (2)
- COVID-19 (2)
-
- Classification (2)
- College students (2)
- Cryptocurrency (2)
- Data Science (2)
- Deep Learning (2)
- Deep learning (2)
- Intellectual property (2)
- Internet (2)
- Internet of things (2)
- Raspberry Pi (2)
- Security (2)
- Simulation (2)
- Terrorism (2)
- 2018 (1)
- 3D-mesh (1)
- 8mm (1)
- Abstracts (1)
- Academic achievement (1)
- Accuracy (1)
- Addiction (1)
- Adobe Photoshop (1)
- Adversarial attacks (1)
- Affixes. (1)
- Africa (1)
- Agent-based Modeling (ABM) (1)
- Publication Year
- Publication
-
- SMU Data Science Review (11)
- Bulletin of TUIT: Management and Communication Technologies (5)
- Elinvo (Electronics, Informatics, and Vocational Education) (5)
- Applications and Applied Mathematics: An International Journal (AAM) (4)
- Journal of Interactive Humanities (4)
-
- The African Journal of Information Systems (4)
- International Bulletin of Political Psychology (3)
- International Journal of Speleology (2)
- Journal of Aviation/Aerospace Education & Research (2)
- Journal of Digital Forensics, Security and Law (2)
- Journal of the Arkansas Academy of Science (2)
- OUR Journal: ODU Undergraduate Research Journal (2)
- SWITCH (2)
- Scholarly Horizons: University of Minnesota, Morris Undergraduate Journal (2)
- William & Mary Law Review (2)
- Access*: Interdisciplinary Journal of Student Research and Scholarship (1)
- Advances in Clinical Medical Research and Healthcare Delivery (1)
- Al-Bahir Journal for Engineering and Pure Sciences (1)
- BAU Journal - Science and Technology (1)
- Bulletin of Chinese Academy of Sciences (Chinese Version) (1)
- DU Undergraduate Research Journal Archive (1)
- Frameless (1)
- Free and Open Source Software for Geospatial (FOSS4G) Conference Proceedings (1)
- Georgia Journal of Science (1)
- Hadhramout University Journal of Natural & Applied Sciences (1)
- Human-Machine Communication (1)
- Human–Wildlife Interactions (1)
- International Journal for Research in Education (1)
- International Journal of Geospatial and Environmental Research (1)
- Irish Communication Review (1)
Articles 1 - 30 of 84
Full-Text Articles in Physical Sciences and Mathematics
Factors Influencing The Perceptions Of Human-Computer Interaction Curriculum Developers In Higher Education Institutions During Curriculum Design And Delivery, Cynthia Augustine, Salah Kabanda
Factors Influencing The Perceptions Of Human-Computer Interaction Curriculum Developers In Higher Education Institutions During Curriculum Design And Delivery, Cynthia Augustine, Salah Kabanda
The African Journal of Information Systems
Computer science (CS) and information systems students seeking to work as software developers upon graduating are often required to create software that has a sound user experience (UX) and meets the needs of its users. This includes addressing unique user, context, and infrastructural requirements. This study sought to identify the factors that influence the perceptions of human-computer interaction (HCI) curriculum developers in higher education institutions (HEIs) in developing economies of Africa when it comes to curriculum design and delivery. A qualitative enquiry was conducted and consisted of fourteen interviews with HCI curriculum developers and UX practitioners in four African countries. …
Digitizing Delphi: Educating Audiences Through Virtual Reconstruction, Kate Koury
Digitizing Delphi: Educating Audiences Through Virtual Reconstruction, Kate Koury
The Journal of Purdue Undergraduate Research
Implementing a 3D model into a virtual space allows the general public to engage critically with archaeological processes. There are many unseen decisions that go into reconstructing an ancient temple. Analysis of available materials and techniques, predictions of how objects were used, decisions of what sources to reference, puzzle piecing broken remains together, and even educated guesses used to fill gaps in information often go unobserved by the public. This work will educate users about those choices by allowing the side-by-side comparison of conflicting theories on the reconstruction of the Tholos at Delphi, which is an ideal site because of …
Movie Recommendation System Using Content Based Filtering, Sribhashyam Rakesh
Movie Recommendation System Using Content Based Filtering, Sribhashyam Rakesh
Al-Bahir Journal for Engineering and Pure Sciences
The movie recommendation system plays a crucial role in assisting movie enthusiasts in finding movies that match their interests, saving them from the overwhelming task of sifting through countless options. In this paper, we present a content-grounded movie recommendation system that leverages an attribute-based approach to offer personalized movie suggestions to users. The proposed method focuses on attributes such as cast, keywords, crew, and genres of movies to predict users' preferences accurately. Through extensive evaluation, our content-grounded recommendation system demonstrated significant improvements in performance compared to conventional methods. The precision and recall scores increased by an average of 20% and …
Lidar Segmentation-Based Adversarial Attacks On Autonomous Vehicles, Blake Johnson
Lidar Segmentation-Based Adversarial Attacks On Autonomous Vehicles, Blake Johnson
Scholarly Horizons: University of Minnesota, Morris Undergraduate Journal
Autonomous vehicles utilizing LiDAR-based 3D perception systems are susceptible to adversarial attacks. This paper focuses on a specific attack scenario that relies on the creation of adversarial point clusters with the intention of fooling the segmentation model utilized by LiDAR into misclassifying point cloud data. This can be translated into the real world with the placement of objects (such as road signs or cardboard) at these adversarial point cluster locations. These locations are generated through an optimization algorithm performed on said adversarial point clusters that are introduced by the attacker.
(R2051) Analysis Of Map/Ph1, Ph2/2 Queueing Model With Working Breakdown, Repairs, Optional Service, And Balking, G. Ayyappan, G. Archana
(R2051) Analysis Of Map/Ph1, Ph2/2 Queueing Model With Working Breakdown, Repairs, Optional Service, And Balking, G. Ayyappan, G. Archana
Applications and Applied Mathematics: An International Journal (AAM)
In this paper, a classical queueing system with two types of heterogeneous servers has been considered. The Markovian Arrival Process (MAP) is used for the customer arrival, while phase type distribution (PH) is applicable for the offering of service to customers as well as the repair time of servers. Optional service are provided by the servers to the unsatisfied customers. The server-2 may get breakdown during the busy period of any type of service. Though the server- 2 got breakdown, server-2 has a capacity to provide the service at a slower rate to the current customer who is receiving service …
Du Undergraduate Showcase: Research, Scholarship, And Creative Works, Caitlyn Aldersea, Justin Bravo, Sam Allen, Anna Block, Connor Block, Emma Buechler, Maria De Los Angeles Bustillos, Arianna Carlson, William Christensen, Olivia Kachulis, Noah Craver, Kate Dillon, Muskan Fatima, Angel Fernandes, Emma Finch, Colleen Cassidy, Amy Fishman, Andrea Francis, Stacia Fritz, Simran Gill, Emma Gries, Rylie Hansen, Shannon Powers, Jacqueline Martinez, Zachary Harker, Ashley Hasty, Mykaela Tanino-Springsteen, Kathleen Hopps, Adelaide Kerenick, Colin Kleckner, Ci Koehring, Elijah Kruger, Braden Krumholz, Maddie Leake, Lyneé Alves, Seraphina Loukas, Yatzari Lozano Vazquez, Haley Maki, Emily Martinez, Sierra Mckinney, Mykaela Tanino-Springsteen, Audrey Mitchell, Kipling Newman, Audrey Ng, Megan Lucyshyn, Andrew Nguyen, Stevie Ostman, Casandra Pearson, Alexandra Penney, Julia Gielczynski, Tyler Ball, Anna Rini, Christina Rorres, Simon Ruland, Helayna Schafer, Emma Sellers, Sarah Schuller, Claire Shaver, Kevin Summers, Isabella Shaw, Madison Sinar, Claudia Pena, Apshara Siwakoti, Carter Sorensen, Madi Sousa, Anna Sparling, Alexandra Revier, Brandon Thierry, Dylan Tyree, Maggie Williams, Lauren Wols
Du Undergraduate Showcase: Research, Scholarship, And Creative Works, Caitlyn Aldersea, Justin Bravo, Sam Allen, Anna Block, Connor Block, Emma Buechler, Maria De Los Angeles Bustillos, Arianna Carlson, William Christensen, Olivia Kachulis, Noah Craver, Kate Dillon, Muskan Fatima, Angel Fernandes, Emma Finch, Colleen Cassidy, Amy Fishman, Andrea Francis, Stacia Fritz, Simran Gill, Emma Gries, Rylie Hansen, Shannon Powers, Jacqueline Martinez, Zachary Harker, Ashley Hasty, Mykaela Tanino-Springsteen, Kathleen Hopps, Adelaide Kerenick, Colin Kleckner, Ci Koehring, Elijah Kruger, Braden Krumholz, Maddie Leake, Lyneé Alves, Seraphina Loukas, Yatzari Lozano Vazquez, Haley Maki, Emily Martinez, Sierra Mckinney, Mykaela Tanino-Springsteen, Audrey Mitchell, Kipling Newman, Audrey Ng, Megan Lucyshyn, Andrew Nguyen, Stevie Ostman, Casandra Pearson, Alexandra Penney, Julia Gielczynski, Tyler Ball, Anna Rini, Christina Rorres, Simon Ruland, Helayna Schafer, Emma Sellers, Sarah Schuller, Claire Shaver, Kevin Summers, Isabella Shaw, Madison Sinar, Claudia Pena, Apshara Siwakoti, Carter Sorensen, Madi Sousa, Anna Sparling, Alexandra Revier, Brandon Thierry, Dylan Tyree, Maggie Williams, Lauren Wols
DU Undergraduate Research Journal Archive
DU Undergraduate Showcase: Research, Scholarship, and Creative Works
Covid-19 Crowd Detection, Mustafa Ibrahim, Aly M. Zeineldin, Yameen Khan, Ayman Elmesalami, Soad Ibrahim
Covid-19 Crowd Detection, Mustafa Ibrahim, Aly M. Zeineldin, Yameen Khan, Ayman Elmesalami, Soad Ibrahim
OUR Journal: ODU Undergraduate Research Journal
Object detection was introduced by researchers for face detection. Researchers explain how the detected face is divided into minor frames to be recognized by the algorithm. Due to COVID-19 and government regulations, many people face problems going to shopping centers and shop safely. It has been very hard for both the government and the people to manage social distancing. In our study, we developed a system using Raspberry Pi-4 that will detect the distance between people along with counting the number of distance and mask violations. An error message will appear on the screen in red, showing the total number …
A Deep Bilstm Machine Learning Method For Flight Delay Prediction Classification, Desmond B. Bisandu Phd, Irene Moulitsas Phd
A Deep Bilstm Machine Learning Method For Flight Delay Prediction Classification, Desmond B. Bisandu Phd, Irene Moulitsas Phd
Journal of Aviation/Aerospace Education & Research
This paper proposes a classification approach for flight delays using Bidirectional Long Short-Term Memory (BiLSTM) and Long Short-Term Memory (LSTM) models. Flight delays are a major issue in the airline industry, causing inconvenience to passengers and financial losses to airlines. The BiLSTM and LSTM models, powerful deep learning techniques, have shown promising results in a classification task. In this study, we collected a dataset from the United States (US) Bureau of Transportation Statistics (BTS) of flight on-time performance information and used it to train and test the BiLSTM and LSTM models. We set three criteria for selecting highly important features …
Famaid: A Tool For Aiding People With Disability, Mohamad Maad, Ahmad Owaydate, Mohammad Kojok, Firas Aboudaher, Layal Abu Daher, May Itani
Famaid: A Tool For Aiding People With Disability, Mohamad Maad, Ahmad Owaydate, Mohammad Kojok, Firas Aboudaher, Layal Abu Daher, May Itani
BAU Journal - Science and Technology
People with disabilities suffer from discrimination and obstacles that restrict them from participating in society on an equal basis with others every day. They are deprived of their rights to be included in ordinary school systems and even in the work market. In the process of raising awareness, facilitating dailyroutines, and developing guidance, the idea of assisting such people with handy tools/software arose and was implemented in the FamAid tool. FamAid offers people with hearing disability the opportunity to be engaged in the society through many facilities. In this work, we implemented a web application that serves as a community …
Computing Concept: Genealogy Potential, Power, Arithmetic, Algorithm And Ritual Of Computation, Yuhang Liu, Fei Zhang
Computing Concept: Genealogy Potential, Power, Arithmetic, Algorithm And Ritual Of Computation, Yuhang Liu, Fei Zhang
Bulletin of Chinese Academy of Sciences (Chinese Version)
In the new era, China needs more rational, firm, dialectical, and practical cultural confidence in the field of computational technology. The study conducted rigorous literature research, and established the correspondence between the ancient Chinese ideologies and different focuses of computation. The study proposes the computation concept genealogy (i.e., potential, power, arithmetic, algorithm, and ritual of computation) to deepen the multi-dimensional understanding of the concept of computation, and gives some suggestions for cultivating the computational culture that is facing the world and is of Chinese characteristics.
(Si10-124) Inverse Reconstruction Methodologies: A Review, Deepika Saini
(Si10-124) Inverse Reconstruction Methodologies: A Review, Deepika Saini
Applications and Applied Mathematics: An International Journal (AAM)
The three-dimensional reconstruction problem is a longstanding ill-posed problem, which has made enormous progress in the field of computer vision. This field has attracted increasing interest and demonstrated an impressive performance. Due to a long era of increasing evolution, this paper presents an extensive review of the developments made in this field. For the three dimensional visualization, researchers have focused on the developments of three dimensional information and acquisition methodologies from two dimensional scenes or objects. These acquisition methodologies require a complex calibration procedure which is not practical in general. Hence, the requirement of flexibility was much needed in all …
Cov-Inception: Covid-19 Detection Tool Using Chest X-Ray, Aswini Thota, Ololade Awodipe, Rashmi Patel
Cov-Inception: Covid-19 Detection Tool Using Chest X-Ray, Aswini Thota, Ololade Awodipe, Rashmi Patel
SMU Data Science Review
Since the pandemic started, researchers have been trying to find a way to detect COVID-19 which is a cost-effective, fast, and reliable way to keep the economy viable and running. This research details how chest X-ray radiography can be utilized to detect the infection. This can be for implementation in Airports, Schools, and places of business. Currently, Chest imaging is not a first-line test for COVID-19 due to low diagnostic accuracy and confounding with other viral pneumonia. Different pre-trained algorithms were fine-tuned and applied to the images to train the model and the best model obtained was fine-tuned InceptionV3 model …
A Roller Coaster For The Mind: Virtual Reality Sickness Modes, Metrics, And Mitigation, Dalton C. Sparks
A Roller Coaster For The Mind: Virtual Reality Sickness Modes, Metrics, And Mitigation, Dalton C. Sparks
The Cardinal Edge
Understanding and preventing virtual reality sickness(VRS), or cybersickness, is vital in removing barriers for the technology's adoption. Thus, this article aims to synthesize a variety of academic sources to demonstrate the modes by which VRS occurs, the metrics by which it is judged, and the methods to mitigate it. The predominant theories on the biological origins of VRS are discussed, as well as the individual factors which increase the likelihood of a user developing VRS. Moreover, subjective and physiological measurements of VRS are discussed in addition to the development of a predictive model and conceptual framework. Finally, several methodologies of …
How Facial Features Convey Attention In Stationary Environments, Janelle Domantay, Brendan Morris
How Facial Features Convey Attention In Stationary Environments, Janelle Domantay, Brendan Morris
Spectra Undergraduate Research Journal
Awareness detection technologies have been gaining traction in a variety of enterprises; most often used for driver fatigue detection, recent research has shifted towards using computer vision technologies to analyze user attention in environments such as online classrooms. This paper aims to extend previous research on distraction detection by analyzing which visual features contribute most to predicting awareness and fatigue. We utilized the open-source facial analysis toolkit OpenFace in order to analyze visual data of subjects at varying levels of attentiveness. Then, using a Support-Vector Machine (SVM) we created several prediction models for user attention and identified the Histogram of …
Changeling Vr, Elouise Oyzon
Changeling Vr, Elouise Oyzon
Frameless
Changeling VR is an interactive virtual reality narrative game. As we progress through the game, each level is seen through the Point of View of a different character whose emotional core is expressed through different aesthetics, mechanics and interactions.
Considering The Context To Build Theory In Hci, Hri, And Hmc: Explicating Differences In Processes Of Communication And Socialization With Social Technologies, Andrew Gambino, Bingjie Liu
Considering The Context To Build Theory In Hci, Hri, And Hmc: Explicating Differences In Processes Of Communication And Socialization With Social Technologies, Andrew Gambino, Bingjie Liu
Human-Machine Communication
The proliferation and integration of social technologies has occurred quickly, and the specific technologies with which we engage are ever-changing. The dynamic nature of the development and use of social technologies is often acknowledged by researchers as a limitation. In this manuscript, however, we present a discussion on the implications of our modern technological context by focusing on processes of socialization and communication that are fundamentally different from their interpersonal corollary. These are presented and discussed with the goal of providing theoretical building blocks toward a more robust understanding of phenomena of human-computer interaction, human-robot interaction, human-machine communication, and interpersonal …
The Effect Of Using The Gamification Strategy On Academic Achievement And Motivation Towards Learning Problem-Solving Skills In Computer And Information Technology Course Among Tenth Grade Female Students, Mazyunah Almutairi, Prof. Ahmad Almassaad
The Effect Of Using The Gamification Strategy On Academic Achievement And Motivation Towards Learning Problem-Solving Skills In Computer And Information Technology Course Among Tenth Grade Female Students, Mazyunah Almutairi, Prof. Ahmad Almassaad
International Journal for Research in Education
Abstract
This study aimed to identify the effect of using the gamification strategy on academic achievement and motivation towards learning problem-solving skills in computer and information technology course. A quasi-experimental method was adopted. The study population included tenth-grade female students in Al-Badi’ah schools in Riyadh. The sample consisted of 54 students divided into two equal groups: control group and experimental group. The study tools comprised an achievement test and the motivation scale. The results showed that there were statistically significant differences between the two groups in the academic achievement test in favor of the experimental group, with a large effect …
Odu Undergraduate Students Addressing The Societal Problems Of Parking Control, Classroom Seating, And Flood Monitoring In Hampton Roads, Stephanie K. Trusty, Gabriel Del Razo, Nathan Potter, Soad Ibrahim, Ayman Elmesalami
Odu Undergraduate Students Addressing The Societal Problems Of Parking Control, Classroom Seating, And Flood Monitoring In Hampton Roads, Stephanie K. Trusty, Gabriel Del Razo, Nathan Potter, Soad Ibrahim, Ayman Elmesalami
OUR Journal: ODU Undergraduate Research Journal
During the summer of 2021, ODU undergraduate computer science students undertook image processing research projects. These projects focused on utilizing the Raspberry Pi computer and camera module to address three real-world problems concerning parking control, classroom seating, and flood monitoring. The parking lot occupancy project aimed to develop a system that monitors the occupancy of parking spaces in a lot and communicates the status of the lot of drivers and the lot attendants. The COVID-19 classroom occupancy project sought to enforce social distancing protocols in a classroom environment by detecting seating violations and notifying the instructor and the impacted students …
Improving Accurate Candidates For Missing Data Using Benefit Performance Of (Ml-Som), Abeer Abdullah Al-Mohdar, Mohamed Abdullah Bamatraf
Improving Accurate Candidates For Missing Data Using Benefit Performance Of (Ml-Som), Abeer Abdullah Al-Mohdar, Mohamed Abdullah Bamatraf
Hadhramout University Journal of Natural & Applied Sciences
Missing data is one of the major challenges in extracting and analyzing knowledge from datasets. The performance of training quality was affected by the appearance of missing data in a dataset. For this reason, there is a need for a quick and reliable method to find possible solutions in order to provide an accurate system. Therefore, the previous studies provided robust ability of Self Organizing Map (SOM) algorithm to deal with the missing values [6, 20]. However, it has a drawback such as an error rate(ERR) in the missing values that increase huge dataset. This study is mainly based on …
Internet Of Things Software And Hardware Architectures And Their Impacts On Forensic Investigations: Current Approaches And Challenges, Abel Alex Boozer, Arun John, Tathagata Mukherjee
Internet Of Things Software And Hardware Architectures And Their Impacts On Forensic Investigations: Current Approaches And Challenges, Abel Alex Boozer, Arun John, Tathagata Mukherjee
Journal of Digital Forensics, Security and Law
The never-before-seen proliferation of interconnected low-power computing devices, patently dubbed the Internet of Things (IoT), is revolutionizing how people, organizations, and malicious actors interact with one another and the Internet. Many of these devices collect data in different forms, be it audio, location data, or user commands. In civil or criminal nature investigations, the data collected can act as evidence for the prosecution or the defense. This data can also be used as a component of cybersecurity efforts. When data is extracted from these devices, investigators are expected to do so using proven methods. Still, unfortunately, given the heterogeneity in …
Knowing What We Know: Leveraging Community Knowledge Through Automated Text-Mining, Justin Gardner, Jonathan Tory Toole, Hemant Kalia, Garry Spink Jr., Gordon Broderick
Knowing What We Know: Leveraging Community Knowledge Through Automated Text-Mining, Justin Gardner, Jonathan Tory Toole, Hemant Kalia, Garry Spink Jr., Gordon Broderick
Advances in Clinical Medical Research and Healthcare Delivery
No abstract provided.
Iot Based Agriculture 4.0: Challenges And Opportunities, Halimjon Khujamatov, Temur Toshtemirov Mr., Doston Turayevich Khasanov Mr., Nasiba Saburova Ms., Ilhom Ikromovich Xamroyev Mr.
Iot Based Agriculture 4.0: Challenges And Opportunities, Halimjon Khujamatov, Temur Toshtemirov Mr., Doston Turayevich Khasanov Mr., Nasiba Saburova Ms., Ilhom Ikromovich Xamroyev Mr.
Bulletin of TUIT: Management and Communication Technologies
In recent years, the world's population growth has been intensifying, resulting in specific problems related to the depletion of natural resources, food shortages, declining fertile lands, and changing weather conditions. This paper has been discussed the use of IoT technology as a solution to such problems.
At the same time, the emergence of IoT technology has given rise to a new research direction in agriculture. Soil analysis and monitoring using Zigbee wireless sensor network technology, which is part of the IoT, will enable the creation of an IoT ecosystem as well as the development of smart agriculture. In addition, entrepreneurship, …
Network-Based Analysis Of Early Pandemic Mitigation Strategies: Solutions, And Future Directions, Pegah Hozhabrierdi, Raymond Zhu, Maduakolam Onyewu, Sucheta Soundarajan
Network-Based Analysis Of Early Pandemic Mitigation Strategies: Solutions, And Future Directions, Pegah Hozhabrierdi, Raymond Zhu, Maduakolam Onyewu, Sucheta Soundarajan
Northeast Journal of Complex Systems (NEJCS)
Despite the large amount of literature on mitigation strategies for pandemic spread, in practice, we are still limited by naive strategies, such as lockdowns, that are not effective in controlling the spread of the disease in long term. One major reason behind adopting basic strategies in real-world settings is that, in the early stages of a pandemic, we lack knowledge of the behavior of a disease, and so cannot tailor a more sophisticated response. In this study, we design different mitigation strategies for early stages of a pandemic and perform a comprehensive analysis among them. We then propose a novel …
Use Of Image Processing Algorithms For Mine Originating Waste Grain Size Determination, Sebastian Iwaszenko
Use Of Image Processing Algorithms For Mine Originating Waste Grain Size Determination, Sebastian Iwaszenko
Journal of Sustainable Mining
The utilization of mineral wastes from the mining industry is one of most challenging phases in the raw materials life cycle. In many countries, there are piles of mineral waste materials that date back to the previous century. There is also a constant stream of accompanying mineral matter excavated during everyday mine operation. This stream of waste matter is particularly notable for deep coal mining. Grain size composition of waste mineral matter is one of most important characteristics of coal originating waste material. This paper presents the use of image analysis for the determination of grain size composition of mineral …
Methodological Aspects Of Distance Learning For Developing The Professional Competence Of Students Of The Direction "Computer Engineering, B Kuznetsova, Gulnora Muxtarova, Umida Azimova, Kim Yelena
Methodological Aspects Of Distance Learning For Developing The Professional Competence Of Students Of The Direction "Computer Engineering, B Kuznetsova, Gulnora Muxtarova, Umida Azimova, Kim Yelena
Bulletin of TUIT: Management and Communication Technologies
This work is based on the use of distance learning technologies in education, which will make it possible to individualize training, and in turn contributes to the formation of professionally important qualities for students of the direction of "Computer Engineering". The experimental work was aimed at developing a technology for the formation of students' professional competence.
The article shows that the mastery by students of knowledge, skills and abilities in the field of computer engineering was aimed at their conscious application in solving problems of the educational and cognitive process, and subsequently in professional activity.
The article presents the results …
Evaluation Of Reliability Indicators Of Mobile Communication System Bases, Dilmurod Davronbekov, Utkir Karimovich Matyokubov, Malika Ilkhamovna Abdullayeva
Evaluation Of Reliability Indicators Of Mobile Communication System Bases, Dilmurod Davronbekov, Utkir Karimovich Matyokubov, Malika Ilkhamovna Abdullayeva
Bulletin of TUIT: Management and Communication Technologies
In this study, the reliability of mobile system base stations (BTS) is assessed by analyzing data obtained on faults in about 200 BTS over a six-month period. Five BTSs with the highest number of failures and duration of failure were selected in these BTSs. Based on the data obtained, reliability parameters were calculated and compared.
The study used Weibull’s dismissal process distribution method. The breakdown times of each BTS were sorted. In all five BTS, it was found that β(where the value of β is the approximate value obtained from the values of the smallest squares of the Weibull graph), …
Hamming Codes, Steve Mwangi, Sterling Quinn
Hamming Codes, Steve Mwangi, Sterling Quinn
Access*: Interdisciplinary Journal of Student Research and Scholarship
We will be looking into the application of Matrix Algebra in forming Hamming Codes. Hamming Codes are essential not just in the detection of errors, but also in the linear concurrent correction of these errors. The matrices we will use, will have entries that are binary units. Binary units are mathematically convenient, and their simplicity permits the representation of many open and closed circuits used in communication systems. The entries in the matrices will represent a message that is meant for transmission or reception, akin to the contemporary application of Hamming Codes in wireless communication. We will use Hamming (7,4) …
Ranking Volatility In Building Energy Consumption Using Ensemble Learning And Information Entropy, Kunal Sharma, Jung-Ho Lewe
Ranking Volatility In Building Energy Consumption Using Ensemble Learning And Information Entropy, Kunal Sharma, Jung-Ho Lewe
Georgia Journal of Science
Given the rise in building energy consumption and demand worldwide, energy inefficiency detection has become extremely important. A significant portion of the energy used in commercial buildings is wasted as a result of poor maintenance, degradation or improperly controlled equipment. Most facilities employ sensors to track energy consumption across multiple buildings. Smart fault detection and diagnostic systems use various anomaly detection techniques to discover point anomalies in consumption. While these systems work reasonably well in detecting equipment anomalies over short-term intervals, further exploration is needed in finding methods that consider long-term consumption to detect anomalous buildings. This paper presents a …
Critical Media, Information, And Digital Literacy: Increasing Understanding Of Machine Learning Through An Interdisciplinary Undergraduate Course, Barbara R. Burke, Elena Machkasova
Critical Media, Information, And Digital Literacy: Increasing Understanding Of Machine Learning Through An Interdisciplinary Undergraduate Course, Barbara R. Burke, Elena Machkasova
Irish Communication Review
Widespread use of Artificial Intelligence in all areas of today’s society creates a unique problem: algorithms used in decision-making are generally not understandable to those without a background in data science. Thus, those who use out-of-the-box Machine Learning (ML) approaches in their work and those affected by these approaches are often not in a position to analyze their outcomes and applicability.
Our paper describes and evaluates our undergraduate course at the University of Minnesota Morris, which fosters understanding of the main ideas behind ML. With Communication, Media & Rhetoric and Computer Science faculty expertise, students from a variety of majors, …
Summed Batch Lexicase Selection On Software Synthesis Problems, Joseph Deglman
Summed Batch Lexicase Selection On Software Synthesis Problems, Joseph Deglman
Scholarly Horizons: University of Minnesota, Morris Undergraduate Journal
Lexicase selection is one of the most successful parent selection methods in evolutionary computation. However, it has the drawback of being a more computationally involved process and thus taking more time compared to other selection methods, such as tournament selection. Here, we study a version of lexicase selection where test cases are combined into several composite errors, called summed batch lexicase selection; the hope being faster but still reasonable success. Runs on some software synthesis problems show that a larger batch size tends to reduce the success rate of runs, but the results are not very conclusive as the number …