Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Purdue University (4)
- Cedarville University (3)
- Illinois State University (3)
- Kennesaw State University (3)
- Nova Southeastern University (3)
-
- Virginia Commonwealth University (3)
- Arcadia University (2)
- Duquesne University (2)
- University of North Florida (2)
- Georgia Southern University (1)
- Georgia State University (1)
- Illinois Math and Science Academy (1)
- Institute of Business Administration (1)
- Portland State University (1)
- South Dakota State University (1)
- Stephen F. Austin State University (1)
- University of Nebraska at Omaha (1)
- University of Southern Maine (1)
- Utah State University (1)
- Yale University (1)
- Keyword
-
- Epidemiology (2)
- Probability (2)
- Statistics (2)
- Accuracy (1)
- Algorithm (1)
-
- Analytics (1)
- And Computer Sciences -- Research – Posters (1)
- Audience engagement (1)
- Availability (1)
- Compositional approach (1)
- Computer networks (1)
- Computer security (1)
- Conditional probability (1)
- Cover tour (1)
- Curve number (1)
- Data (1)
- Dynamic Covariance Kernel Density Estimation (1)
- Ecology (1)
- Electronic mail (1)
- Event (1)
- Human activity recognition (1)
- Hydrologic modeling (1)
- Image processing -- Digital techniques (1)
- Information resources (1)
- Intrusion detection (1)
- Logic (1)
- Long-Term Hydrologic Impact Assessment model (1)
- Low Impact Development (1)
- Math (1)
- Mathematics (1)
- Publication Year
- Publication
-
- Annual Symposium on Biomathematics and Ecology Education and Research (3)
- Biology and Medicine Through Mathematics Conference (3)
- Mathematics Colloquium Series (3)
- Symposium of Student Scholars (3)
- The Research and Scholarship Symposium (2013-2019) (3)
-
- Capstone Showcase (2)
- Showcase of Osprey Advancements in Research and Scholarship (SOARS) (2)
- Student Research Symposium (2)
- The Summer Undergraduate Research Fellowship (SURF) Symposium (2)
- Undergraduate Research and Scholarship Symposium (2)
- Georgia State Undergraduate Research Conference (1)
- I-GUIDE Forum (1)
- International Conference on Information and Communication Technologies (1)
- MODVIS Workshop (1)
- National Youth Advocacy and Resilience Conference (1)
- Professional Learning Day (1)
- SDSU Data Science Symposium (1)
- Thinking Matters Symposium (1)
- UNO Student Research and Creative Activity Fair (1)
- Undergraduate Research Conference (1)
- Yale Day of Data (1)
- File Type
Articles 31 - 36 of 36
Full-Text Articles in Mathematics
A Nonlinear Filter For Markov Chains And Its Effect On Diffusion Maps, Stefan Steinerberger
A Nonlinear Filter For Markov Chains And Its Effect On Diffusion Maps, Stefan Steinerberger
Yale Day of Data
Diffusion maps are a modern mathematical tool that helps to find structure in large data sets - we present a new filtering technique that is based on the assumption that errors in the data are intrinsically random to isolate and filter errors and thus boost the efficiency of diffusion maps. Applications include data sets from medicine (the Cleveland Heart Disease Data set and the Wisconsin Breast Cancer Data set) and engineering (the Ionosphere data set).
Video Event Understanding With Pattern Theory, Fillipe Souza, Sudeep Sarkar, Anuj Srivastava, Jingyong Su
Video Event Understanding With Pattern Theory, Fillipe Souza, Sudeep Sarkar, Anuj Srivastava, Jingyong Su
MODVIS Workshop
We propose a combinatorial approach built on Grenander’s pattern theory to generate semantic interpretations of video events of human activities. The basic units of representations, termed generators, are linked with each other using pairwise connections, termed bonds, that satisfy predefined relations. Different generators are specified for different levels, from (image) features at the bottom level to (human) actions at the highest, providing a rich representation of items in a scene. The resulting configurations of connected generators provide scene interpretations; the inference goal is to parse given video data and generate high-probability configurations. The probabilistic structures are imposed using energies that …
Session B-2: The “Roll” Of Statistics In Modeling - It All Adds Up, Richard Stalmack, Janice Krouse
Session B-2: The “Roll” Of Statistics In Modeling - It All Adds Up, Richard Stalmack, Janice Krouse
Professional Learning Day
The common core practice standards ask us to teach students to propose mathematical models and test their viability. Participants will do an experiment, collect data and use technological tools to combine modeling, analysis and basic statistics. Participants should bring a laptop, if possible; otherwise, bring a graphing calculator.
Spatiotemporal Crime Analysis, James Q. Tay, Abish Malik, Sherry Towers, David Ebert
Spatiotemporal Crime Analysis, James Q. Tay, Abish Malik, Sherry Towers, David Ebert
The Summer Undergraduate Research Fellowship (SURF) Symposium
There has been a rise in the use of visual analytic techniques to create interactive predictive environments in a range of different applications. These tools help the user sift through massive amounts of data, presenting most useful results in a visual context and enabling the person to rapidly form proactive strategies. In this paper, we present one such visual analytic environment that uses historical crime data to predict future occurrences of crimes, both geographically and temporally. Due to the complexity of this analysis, it is necessary to find an appropriate statistical method for correlative analysis of spatiotemporal data, as well …
Temporal Dynamics Of Neural Activity In The Olfactory Receptor Neurons During Odor Exposure, Danni Liu, Jun Xia
Temporal Dynamics Of Neural Activity In The Olfactory Receptor Neurons During Odor Exposure, Danni Liu, Jun Xia
Georgia State Undergraduate Research Conference
No abstract provided.
A Survey On Intrusion Detection Approaches, A Murali M. Rao
A Survey On Intrusion Detection Approaches, A Murali M. Rao
International Conference on Information and Communication Technologies
Intrusion detection plays one of the key roles in computer security techniques and is one of the prime areas of research. Usages of computer network services are tremendously increasing day by day and at the same time intruders are also playing a major role to deny network services, compromising the crucial services for Email, FTP and Web. Realizing the importance of the problem due to intrusions, many researchers have taken up research in this area and have proposed several solutions. It has come to a stage to take a stock of the research results and project a comprehensive view so …