Open Access. Powered by Scholars. Published by Universities.®
Graphics and Human Computer Interfaces Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Algorithmic fairness (1)
- Bluetooth (1)
- Computer vision (1)
- Critical Infrastructure Systems (1)
- Cybersecurity (1)
-
- Damage Source Identification (1)
- Data Analysis (1)
- Data Integrity (1)
- Data Visualization (1)
- Data recovery (1)
- Differential privacy (1)
- Digital Twins (1)
- E-ink (1)
- Fog Computing (1)
- Foresight pruning (1)
- Group Behavior (1)
- Group Interaction (1)
- Image classification (1)
- Information Retrieval (1)
- Intelligent Systems (1)
- Internal deployment (1)
- Inventory tracking (1)
- Low energy (1)
- Machine learning (1)
- Malicious Transactions (1)
- Mashup Software (1)
- Mobile application (1)
- Operable windows notifier (1)
- Opinion (1)
- Prediction (1)
Articles 1 - 8 of 8
Full-Text Articles in Graphics and Human Computer Interfaces
Gauging The State-Of-The-Art For Foresight Weight Pruning On Neural Networks, Noah James
Gauging The State-Of-The-Art For Foresight Weight Pruning On Neural Networks, Noah James
Computer Science and Computer Engineering Undergraduate Honors Theses
The state-of-the-art for pruning neural networks is ambiguous due to poor experimental practices in the field. Newly developed approaches rarely compare to each other, and when they do, their comparisons are lackluster or contain errors. In the interest of stabilizing the field of pruning, this paper initiates a dive into reproducing prominent pruning algorithms across several architectures and datasets. As a first step towards this goal, this paper shows results for foresight weight pruning across 6 baseline pruning strategies, 5 modern pruning strategies, random pruning, and one legacy method (Optimal Brain Damage). All strategies are evaluated on 3 different architectures …
An Investigation Into, And The Construction Of, An Operable Windows Notifier, Grey Hixson
An Investigation Into, And The Construction Of, An Operable Windows Notifier, Grey Hixson
Computer Science and Computer Engineering Undergraduate Honors Theses
The Office of Sustainability at the University of Arkansas identified that building occupants that have control over operable windows may open them at inappropriate times. Windows opened in a building with a temperature and air differential leads to increased HVAC operating costs and building occupant discomfort. This led the Associate Vice Chancellor of Facilities at the University of Arkansas to propose the construction of a mobile application that a building occupant can use to make an informed decision before opening their window. I have formulated a series of research objectives in conjunction with the Director of the Office of Sustainability …
Using Bluetooth Low Energy And E-Ink Displays For Inventory Tracking, David Whelan
Using Bluetooth Low Energy And E-Ink Displays For Inventory Tracking, David Whelan
Computer Science and Computer Engineering Undergraduate Honors Theses
The combination of Bluetooth Low energy and E-Ink displays allow for a low energy wire-less display. The application of this technology is far reaching especially given how the Bluetooth Low Energy specification can be extended. This paper proposes an extension to this specification specifically for inventory tracking. This extension combined with the low energy E-Ink display results in a smart label that can keep track of additional meta data and inventory counts for physical inventory. This label helps track the physical inventory and can help mitigate any errors in the logical organization of inventory.
Component Damage Source Identification For Critical Infrastructure Systems, Nathan Davis
Component Damage Source Identification For Critical Infrastructure Systems, Nathan Davis
Graduate Theses and Dissertations
Cyber-Physical Systems (CPS) are becoming increasingly prevalent for both Critical Infrastructure and the Industry 4.0 initiative. Bad values within components of the software portion of CPS, or the computer systems, have the potential to cause major damage if left unchecked, and so detection and locating of where these occur is vital. We further define features of these computer systems and create a use-based system topology. We then introduce a function to monitor system integrity and the presence of bad values as well as an algorithm to locate them. We then show an improved version, taking advantage of several system properties …
Design And Development Of Techniques To Ensure Integrity In Fog Computing Based Databases, Abdulwahab Fahad S. Alazeb
Design And Development Of Techniques To Ensure Integrity In Fog Computing Based Databases, Abdulwahab Fahad S. Alazeb
Graduate Theses and Dissertations
The advancement of information technology in coming years will bring significant changes to the way sensitive data is processed. But the volume of generated data is rapidly growing worldwide. Technologies such as cloud computing, fog computing, and the Internet of things (IoT) will offer business service providers and consumers opportunities to obtain effective and efficient services as well as enhance their experiences and services; increased availability and higher-quality services via real-time data processing augment the potential for technology to add value to everyday experiences. This improves human life quality and easiness. As promising as these technological innovations, they are prone …
Achieving Differential Privacy And Fairness In Machine Learning, Depeng Xu
Achieving Differential Privacy And Fairness In Machine Learning, Depeng Xu
Graduate Theses and Dissertations
Machine learning algorithms are used to make decisions in various applications, such as recruiting, lending and policing. These algorithms rely on large amounts of sensitive individual information to work properly. Hence, there are sociological concerns about machine learning algorithms on matters like privacy and fairness. Currently, many studies only focus on protecting individual privacy or ensuring fairness of algorithms separately without taking consideration of their connection. However, there are new challenges arising in privacy preserving and fairness-aware machine learning. On one hand, there is fairness within the private model, i.e., how to meet both privacy and fairness requirements simultaneously in …
Prediction, Recommendation And Group Analytics Models In The Domain Of Mashup Services And Cyber-Argumentation Platform, Md Mahfuzer Rahman
Prediction, Recommendation And Group Analytics Models In The Domain Of Mashup Services And Cyber-Argumentation Platform, Md Mahfuzer Rahman
Graduate Theses and Dissertations
Mashup application development is becoming a widespread software development practice due to its appeal for a shorter application development period. Application developers usually use web APIs from different sources to create a new streamlined service and provide various features to end-users. This kind of practice saves time, ensures reliability, accuracy, and security in the developed applications. Mashup application developers integrate these available APIs into their applications. Still, they have to go through thousands of available web APIs and chose only a few appropriate ones for their application. Recommending relevant web APIs might help application developers in this situation. However, very …
Theatrical Genre Prediction Using Social Network Metrics, Manisha Shukla
Theatrical Genre Prediction Using Social Network Metrics, Manisha Shukla
Graduate Theses and Dissertations
With the emergence of digitization, large text corpora are now available online that provide humanities scholars an opportunity to perform literary analysis leveraging the use of computational techniques. This work is focused on applying network theory concepts in the field of literature to explore correlations between the mathematical properties of the social networks of plays and the plays’ dramatic genre, specifically how well social network metrics can identify genre without taking vocabulary into consideration. Almost no work has been done to study the ability of mathematical properties of network graphs to predict literary features. We generated character interaction networks of …