Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

55,367 Full-Text Articles 72,294 Authors 23,183,657 Downloads 376 Institutions

All Articles in Computer Sciences

Faceted Search

55,367 full-text articles. Page 1 of 2017.

Sustainable Energysense: A Predictive Machine Learning Framework For Optimizing Residential Electricity Consumption, Murad Al-Rajab, Samia Loucif 2024 Abu Dhabi University

Sustainable Energysense: A Predictive Machine Learning Framework For Optimizing Residential Electricity Consumption, Murad Al-Rajab, Samia Loucif

All Works

In a world where electricity is often taken for granted, the surge in consumption poses significant challenges, including elevated CO2 emissions and rising prices. These issues not only impact consumers but also have broader implications for the global environment. This paper endeavors to propose a smart application dedicated to optimizing the electricity consumption of household appliances. It employs Augmented Reality (AR) technology along with YOLO to detect electrical appliances and provide detailed electricity consumption insights, such as displaying the appliance consumption rate and computing the total electricity consumption based on the number of hours the appliance was used. The application …


Asthma Prevalence Among United States Population Insights From Nhanes Data Analysis, Sarya Swed, Bisher Sawaf, Feras Al-Obeidat, Wael Hafez, Amine Rakab, Hidar Alibrahim, Mohamad Nour Nasif, Baraa Alghalyini, Abdul Rehman Zia Zaidi, Lamees Alshareef, Fadel Alqatati, Fathima Zamrath Zahir, Ashraf I. Ahmed, Mulham Alom, Anas Sultan, Abdullah AlMahmoud, Agyad Bakkour, Ivan Cherrez-Ojeda 2024 Aleppo Faculty of Medicine

Asthma Prevalence Among United States Population Insights From Nhanes Data Analysis, Sarya Swed, Bisher Sawaf, Feras Al-Obeidat, Wael Hafez, Amine Rakab, Hidar Alibrahim, Mohamad Nour Nasif, Baraa Alghalyini, Abdul Rehman Zia Zaidi, Lamees Alshareef, Fadel Alqatati, Fathima Zamrath Zahir, Ashraf I. Ahmed, Mulham Alom, Anas Sultan, Abdullah Almahmoud, Agyad Bakkour, Ivan Cherrez-Ojeda

All Works

Asthma is a prevalent respiratory condition that poses a substantial burden on public health in the United States. Understanding its prevalence and associated risk factors is vital for informed policymaking and public health interventions. This study aims to examine asthma prevalence and identify major risk factors in the U.S. population. Our study utilized NHANES data between 1999 and 2020 to investigate asthma prevalence and associated risk factors within the U.S. population. We analyzed a dataset of 64,222 participants, excluding those under 20 years old. We performed binary regression analysis to examine the relationship of demographic and health related covariates with …


Data Collector Selection Ranking-Based Method For Collaborative Multi-Tasks In Ubiquitous Environments, Belal Z. Hassan, Ahmed. A. A. Gad-Elrab, Mohamed S. Farag, S. E. Abu-Youssef 2024 Faculty of Science, Al-Azhar University Cairo, Egypt

Data Collector Selection Ranking-Based Method For Collaborative Multi-Tasks In Ubiquitous Environments, Belal Z. Hassan, Ahmed. A. A. Gad-Elrab, Mohamed S. Farag, S. E. Abu-Youssef

Al-Azhar Bulletin of Science

In Ubiquitous Computing and the Internet of Things, the sensing and control of objects involve numerous devices collecting and transmitting data. However, connecting these devices without fostering collaboration leads to suboptimal system performance. As the number of connected sensing devices in Internet of Things increases, efficient task accomplishment through collaboration becomes imperative. This paper proposes a Data Collector Selection Method for Collaborative Multi-Tasks to address this challenge, considering task preferences and uncertainty in data collectors' contributions. The proposed method incorporates three key aspects: (1) Using Fuzzy Analytical Hierarchy Process to determine optimal weights for task preferences; (2) Ranking data collectors …


Hierarchical Damage Correlations For Old Photo Restoration, Weiwei CAI, Xuemiao XU, Jiajia XU, Huaidong ZHANG, Haoxin YANG, Kun ZHANG, Shengfeng HE 2024 Singapore Management University

Hierarchical Damage Correlations For Old Photo Restoration, Weiwei Cai, Xuemiao Xu, Jiajia Xu, Huaidong Zhang, Haoxin Yang, Kun Zhang, Shengfeng He

Research Collection School Of Computing and Information Systems

Restoring old photographs can preserve cherished memories. Previous methods handled diverse damages within the same network structure, which proved impractical. In addition, these methods cannot exploit correlations among artifacts, especially in scratches versus patch-misses issues. Hence, a tailored network is particularly crucial. In light of this, we propose a unified framework consisting of two key components: ScratchNet and PatchNet. In detail, ScratchNet employs the parallel Multi-scale Partial Convolution Module to effectively repair scratches, learning from multi-scale local receptive fields. In contrast, the patch-misses necessitate the network to emphasize global information. To this end, we incorporate a transformer-based encoder and decoder …


Unveiling The Dynamics Of Crisis Events: Sentiment And Emotion Analysis Via Multi-Task Learning With Attention Mechanism And Subject-Based Intent Prediction, Phyo Yi WIN MYINT, Siaw Ling LO, Yuhao ZHANG 2024 Singapore Management University

Unveiling The Dynamics Of Crisis Events: Sentiment And Emotion Analysis Via Multi-Task Learning With Attention Mechanism And Subject-Based Intent Prediction, Phyo Yi Win Myint, Siaw Ling Lo, Yuhao Zhang

Research Collection School Of Computing and Information Systems

In the age of rapid internet expansion, social media platforms like Twitter have become crucial for sharing information, expressing emotions, and revealing intentions during crisis situations. They offer crisis responders a means to assess public sentiment, attitudes, intentions, and emotional shifts by monitoring crisis-related tweets. To enhance sentiment and emotion classification, we adopt a transformer-based multi-task learning (MTL) approach with attention mechanism, enabling simultaneous handling of both tasks, and capitalizing on task interdependencies. Incorporating attention mechanism allows the model to concentrate on important words that strongly convey sentiment and emotion. We compare three baseline models, and our findings show that …


A Sentiment Analysis Approach For Understanding Users’ Perception Of Metaverse Marketplace, Ahmed Al-Adaileh, Mousa Al-Kfairy, Mohammad Tubishat, Omar Alfandi 2024 Kingston University

A Sentiment Analysis Approach For Understanding Users’ Perception Of Metaverse Marketplace, Ahmed Al-Adaileh, Mousa Al-Kfairy, Mohammad Tubishat, Omar Alfandi

All Works

This research explores the user perceptions of the Metaverse Marketplace, analyzing a substantial dataset of over 860,000 Twitter posts through sentiment analysis and topic modeling techniques. The study aims to uncover the driving factors behind user engagement and sentiment in this novel digital trading space. Key findings highlight a predominantly positive user sentiment, with significant enthusiasm for the marketplace's revenue generation and entertainment potential, particularly within the gaming sector. Users express appreciation for the innovative opportunities the Metaverse Marketplace offers for artists, designers, and traders in handling and trading digital assets. This positive outlook is tempered by notable concerns regarding …


Context In Computer Vision: A Taxonomy, Multi-Stage Integration, And A General Framework, Xuan Wang 2024 The Graduate Center, City University of New York

Context In Computer Vision: A Taxonomy, Multi-Stage Integration, And A General Framework, Xuan Wang

Dissertations, Theses, and Capstone Projects

Contextual information has been widely used in many computer vision tasks, such as object detection, video action detection, image classification, etc. Recognizing a single object or action out of context could be sometimes very challenging, and context information may help improve the understanding of a scene or an event greatly. However, existing approaches design specific contextual information mechanisms for different detection tasks.

In this research, we first present a comprehensive survey of context understanding in computer vision, with a taxonomy to describe context in different types and levels. Then we proposed MultiCLU, a new multi-stage context learning and utilization framework, …


On Coresets For Fair Clustering In Metric And Euclidean Spaces And Their Applications, Sayan Bandyapadhyay, Fedor V. Fomin, Kirill Simonov 2024 Portland State University

On Coresets For Fair Clustering In Metric And Euclidean Spaces And Their Applications, Sayan Bandyapadhyay, Fedor V. Fomin, Kirill Simonov

Computer Science Faculty Publications and Presentations

Fair clustering is a constrained clustering problem where we need to partition a set of colored points. The fraction of points of each color in every cluster should be more or less equal to the fraction of points of this color in the dataset. The problem was recently introduced by Chierichetti et al. (2017) [1]. We propose a new construction of coresets for fair clustering for Euclidean and general metrics based on random sampling. For the Euclidean space Rd, we provide the first coreset whose size does not depend exponentially on the dimension d. The question of whether such constructions …


A Comparative Analysis Of Source Identification Algorithms, Pablo A. Curiel 2024 Virginia Commonwealth University

A Comparative Analysis Of Source Identification Algorithms, Pablo A. Curiel

Biology and Medicine Through Mathematics Conference

No abstract provided.


A Nlp Approach To Automating The Generation Of Surveys For Market Research, Anav Chug 2024 Georgia Southern University

A Nlp Approach To Automating The Generation Of Surveys For Market Research, Anav Chug

Honors College Theses

Market Research is vital but includes activities that are often laborious and time consuming. Survey questionnaires are one possible output of the process and market researchers spend a lot of time manually developing questions for focus groups. The proposed research aims to develop a software prototype that utilizes Natural Language Processing (NLP) to automate the process of generating survey questions for market research. The software uses a pre-trained Open AI language model to generate multiple choice survey questions based on a given product prompt, send it to a targeted email list, and also provides a real-time analysis of the responses …


Integration Of Agent Models And Meta Reinforcement Learning (Meta-Rl) Algorithms For Car Racing Experiment, Vidyavarshini Holenarasipur Jayashankar 2024 Portland State University

Integration Of Agent Models And Meta Reinforcement Learning (Meta-Rl) Algorithms For Car Racing Experiment, Vidyavarshini Holenarasipur Jayashankar

Student Research Symposium

Introduction: Achieving optimal performance in 2D racing games presents unique challenges, requiring adaptive strategies and advanced learning algorithms. This research explores the integration of sophisticated agent models with Meta Reinforcement Learning (Meta-RL) techniques, specifically Model-Agnostic Meta-Learning (MAML) and Proximal Policy Optimization (PPO), to enhance decision-making and adaptability within these simulated environments. We hypothesize that this innovative approach will lead to marked improvements in game performance and learning efficiency.

Methods: In our experimental setup, we applied MAML for its rapid adaptation capabilities and PPO for optimizing the agents' policy decisions within a 2D racing game simulator. The objective was …


Securing The Internet Of Things At Scale, Steven L. Willoughby 2024 Portland State University

Securing The Internet Of Things At Scale, Steven L. Willoughby

Student Research Symposium

The world of the connected “Internet of Things” (IoT), including the "Industrial Internet of Things" (IIoT) is expanding to include more devices which observe and influence our daily lives, routines, locations, and even our state of health. But have the underlying protocols by which they communicate this data kept pace with the need to protect our privacy and security?

My talk will introduce my research into an approach to better secure this information flow using appropriate access controls without sacrificing performance. I will assess the historical challenges and simple access controls applied to IoT networking protocols and how they can …


Improving Tattle-Tale K-Deniability, Nicholas G.E. Morales 2024 Portland State University

Improving Tattle-Tale K-Deniability, Nicholas G.E. Morales

Student Research Symposium

Ensuring privacy for databases is an ongoing struggle. While the majority of work has focused on using access control lists to protect sensitive data these methods are vulnerable to inference attacks. A set of algorithms, referred to as Tattle-Tale, was developed that could protect sensitive data from being inferred however its runtime performance wasn’t suitable for production code. This set of algorithms contained two main subsets, Full Deniability and K-Deniability. My research focused on improving the runtime or utility of the K-Deniability algorithms. I investigated the runtime of the K-Deniability algorithms to identify what was slowing the process down. Aside …


A Novel Caching Algorithm For Efficient Fine-Grained Access Control In Database Management Systems, Anadi Shakya 2024 Portland State University

A Novel Caching Algorithm For Efficient Fine-Grained Access Control In Database Management Systems, Anadi Shakya

Student Research Symposium

Fine-grained access Control (FGAC) in DBMS is vital for restricting user access to authorized data and enhancing security. FGAC policies govern how users are granted access to specific resources based on detailed criteria, ensuring security and privacy measures. Traditional methods struggle with scaling policies to thousands, causing delays in query responses. This paper introduces a novel caching algorithm designed to address this challenge by accelerating query processing and ensuring compliance with FGAC policies. In our approach, we create a circular hashmap and employ different replacement techniques to efficiently manage the cache, prioritizing entries that are visited more frequently. To evaluate …


Systematic Comparison Of Reservoir Computing Frameworks, Nihar S. Koppolu, Christof Teuscher 2024 Portland State University

Systematic Comparison Of Reservoir Computing Frameworks, Nihar S. Koppolu, Christof Teuscher

Student Research Symposium

In this poster, we present a systematic evaluation and comparison of five Reservoir computing (RC) software simulation frameworks, namely reservoirpy, RcTorch, pyRCN, pytorch-esn, and ReservoirComputing.jl. RC is a specific machine learning approach that leverages fixed, nonlinear systems to map signals into higher dimensions. Its unique strength lies in training only the readout layer, which reduces the training complexity. RC excels in temporal signal processing and is also well suited for various physical implementations. The increasing interest in RC has led to the proliferation of various RC simulation frameworks. Our RC simulation framework evaluation focuses on a feature comparison, documentation quality, …


Story Of Your Lazy Function’S Life: A Bidirectional Demand Semantics For Mechanized Cost Analysis Of Lazy Programs, Laura Israel, Nicholas Coltharp 2024 Portland State University

Story Of Your Lazy Function’S Life: A Bidirectional Demand Semantics For Mechanized Cost Analysis Of Lazy Programs, Laura Israel, Nicholas Coltharp

Student Research Symposium

Lazy evaluation is a powerful tool that enables better compositionality and potentially better performance in functional programming, but it is challenging to analyze its computation cost. Existing works either require manually annotating sharing, or rely on separation logic to reason about heaps of mutable cells. In this paper, we propose a bidirectional demand semantics that allows for reasoning about the computation cost of lazy programs without relying on special program logics. To show the effectiveness of our approach, we apply the demand semantics to a variety of case studies including insertion sort, selection sort, Okasaki's banker's queue, and the push …


Behavioral Intention For Ai Usage In Higher Education, Isaac A. Odai, Elliot Wiley 2024 Portland State University

Behavioral Intention For Ai Usage In Higher Education, Isaac A. Odai, Elliot Wiley

Student Research Symposium

This study sought to further understand the cognitive factors that influence undergraduate students' behavioral intention to use generative AI. Generative AI's presence in academic spaces opens the door for ethical and pedagogical questions. This study surveyed 51 undergraduate communication students to measure their attitudes, subjective norms, self efficacy and their behavioral intention to use GenAI for school work. The results of this study showed behavioral intent had a positive relationship with attitudes and subjective norms. The implications of these findings show that personal beliefs and the perceived beliefs of others are correlated to undergraduate students’ intent to use GenAI for …


Surmounting Challenges In Aggregating Results From Static Analysis Tools, Dr. Ann Marie Reinhold, Brittany Boles, A. Redempta Manzi Muneza, Thomas McElroy, Dr. Clemente Izurieta 2024 Montana State University

Surmounting Challenges In Aggregating Results From Static Analysis Tools, Dr. Ann Marie Reinhold, Brittany Boles, A. Redempta Manzi Muneza, Thomas Mcelroy, Dr. Clemente Izurieta

Military Cyber Affairs

Aggregation poses a significant challenge for software practitioners because it requires a comprehensive and nuanced understanding of raw data from diverse sources. Suites of static-analysis tools (SATs) are commonly used to assess organizational security but simultaneously introduce significant challenges. Challenges include unique results, scales, configuration environments for each SAT execution, and incompatible formats between SAT outputs. Here, we document our experiences addressing these issues. We highlight the problem of relying on a single vendor's SAT version and offer a solution for aggregating findings across multiple SATs, aiming to enhance software security practices and deter threats early with robust defensive operations.


Generative Machine Learning For Cyber Security, James Halvorsen, Dr. Assefaw Gebremedhin 2024 Washington State University

Generative Machine Learning For Cyber Security, James Halvorsen, Dr. Assefaw Gebremedhin

Military Cyber Affairs

Automated approaches to cyber security based on machine learning will be necessary to combat the next generation of cyber-attacks. Current machine learning tools, however, are difficult to develop and deploy due to issues such as data availability and high false positive rates. Generative models can help solve data-related issues by creating high quality synthetic data for training and testing. Furthermore, some generative architectures are multipurpose, and when used for tasks such as intrusion detection, can outperform existing classifier models. This paper demonstrates how the future of cyber security stands to benefit from continued research on generative models.


Learning Adversarial Semantic Embeddings For Zero-Shot Recognition In Open Worlds, Tianqi LI, Guansong PANG, Xiao BAI, Jin ZHENG, Lei ZHOU, Xin NING 2024 Singapore Management University

Learning Adversarial Semantic Embeddings For Zero-Shot Recognition In Open Worlds, Tianqi Li, Guansong Pang, Xiao Bai, Jin Zheng, Lei Zhou, Xin Ning

Research Collection School Of Computing and Information Systems

Zero-Shot Learning (ZSL) focuses on classifying samples of unseen classes with only their side semantic information presented during training. It cannot handle real-life, open-world scenarios where there are test samples of unknown classes for which neither samples (e.g., images) nor their side semantic information is known during training. Open-Set Recognition (OSR) is dedicated to addressing the unknown class issue, but existing OSR methods are not designed to model the semantic information of the unseen classes. To tackle this combined ZSL and OSR problem, we consider the case of “Zero-Shot Open-Set Recognition” (ZS-OSR), where a model is trained under the ZSL …


Digital Commons powered by bepress