Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

24,339 Full-Text Articles 21,966 Authors 4,665,064 Downloads 211 Institutions

All Articles in Computer Sciences

Faceted Search

24,339 full-text articles. Page 1 of 592.

On Abstract Modular Inference Systems And Solvers, Yuliya Lierler, Miroslaw Truszczyński 2016 University of Nebraska at Omaha

On Abstract Modular Inference Systems And Solvers, Yuliya Lierler, Miroslaw Truszczyński

Computer Science Faculty Publications

Integrating diverse formalisms into modular knowledge representation systems offers increased expressivity, modeling convenience, and computational benefits. We introduce the concepts of abstract inference modules and abstract modular inference systems to study general principles behind the design and analysis of model generating programs, or solvers, for integrated multi-logic systems. We show how modules and modular systems give rise to transition graphs, which are a natural and convenient representation of solvers, an idea pioneered by the SAT community. These graphs lend themselves well to extensions that capture such important solver design features as learning. In the paper, we consider two flavors of ...


Augmented Reality All Around Us: Power And Perception At A Crossroads, Marty J. Wolf, Frances Grodzinsky 2016 Bemidji State University

Augmented Reality All Around Us: Power And Perception At A Crossroads, Marty J. Wolf, Frances Grodzinsky

Frances Grodzinsky

In this paper we continue to explore the ethics and social impact of augmented visual field devices (AVFDs). Recently, Microsoft announced the pending release of HoloLens, and Magic Leap filed a patent application for technology that will project light directly onto the wearer’s retina. Here we explore the notion of deception in relation to the impact these devices have on developers, users, and non-users as they interact via these devices. These sorts of interactions raise questions regarding autonomy and suggest a strong need for informed consent protocols. We identify issues of ownership that arise due to the blending of ...


Suggesting Simple And Comprehensive Queries To Elementary-Grade Children, Meher T. Shaikh, Maria Soledad Pera, Yiu-Kai Ng 2016 Brigham Young University

Suggesting Simple And Comprehensive Queries To Elementary-Grade Children, Meher T. Shaikh, Maria Soledad Pera, Yiu-Kai Ng

Maria Soledad Pera

Query suggestions (QS) tailored specifically for children are slowly gaining research attention in response to the growth in Internet use by children. Even though QS offered by popular search engines adequately meet the information needs of the general public, they do not achieve equivalent effectiveness from a child’s perspective. This is because children’s search behaviors, interests, cognitive levels, and ability to read and understand complex content are different from adults. Given the ubiquitous nature of the Web, its importance in today’s society, and its increasing use in education, it is an urgent need to help children search ...


Financial Studio: Android Based Application For Computing Tax, Pension, Zakat And Loan, Dr. Muhammad Zubair Asghar, Ulfat Batool, Farheen Bibi, Sadia Ismail, Rabail Zahra 2016 Institute of Computing and Information Technology Gomal University

Financial Studio: Android Based Application For Computing Tax, Pension, Zakat And Loan, Dr. Muhammad Zubair Asghar, Ulfat Batool, Farheen Bibi, Sadia Ismail, Rabail Zahra

Dr. Muhammad Zubair Asghar

This work deals with the development of android-based financial studio, an integrated application for
calculating tax, pension, zakat, and loan. Financial studio can facilitate employers of any department and other
individuals. The application is developed using MIT app inventor-based android platform. The financial studio
has four computational modules, namely: (i) tax, (ii) pension, (iii) zakat, and (iv) loan. The system provides an
integrated environment for performing aforementioned distinct calculations by integrating different financial
modules into a single application in a user-friendly way. The statistical analysis shows that the application is
effective to deal with different financial calculations.


An Exploratory Study Of High Performance Graphics Application Programming Interfaces, Joseph A. Shiraef 2016 University of Tennessee, Chattanooga

An Exploratory Study Of High Performance Graphics Application Programming Interfaces, Joseph A. Shiraef

Masters Theses and Doctoral Dissertations

This study was conducted to take an in depth look at the newest APIs offered to graphics programmers. With the recent releases of Vulkan (2016) and DirectX 12 (2015) from industry giants like the Khronos Group and Microsoft, it’s clear they are pushing for a much lower-level, closer-to-hardware approach for future graphics programming solutions. These changes can be credited to the drastic improvements we’ve seen in graphics processors over the last 5 years. It will take a significant amount of time for these API’s to become industry standard. The goal of this research is to verify the ...


On The Geometries Of Conic Section Representation Of Noisy Object Boundaries, Qiuming Zhu 2016 University of Nebraska at Omaha

On The Geometries Of Conic Section Representation Of Noisy Object Boundaries, Qiuming Zhu

Qiuming Zhu

This paper studies some geometrical properties of conic sections and the utilization of these properties for the generation of conic section representations of object boundaries in digital images. Several geometrical features of the conic sections, such as the chord, the characteristic point, the guiding triangles, and their appearances under the tessellation and noise corruption of the digital images are discussed. The study leads to a noniterative algorithm that takes advantage of these features in the process of formulating the conic section parameters and generating the approximations of object boundaries from the given sequences of edge pixels in the images. The ...


Bcl2 Translocation Defines A Unique Tumor Subset Within The Germinal Center B-Cell-Like Diffuse Large B-Cell Lymphoma, Javeed Iqbal, Warren G. Sanger, Andreas Rosenwald, Diane L. Pickering, Barbara Dave, Sandeep Dave, Li Xiao, Kahai Cao, Qiuming Zhu, Simon Sherman, Christine P. Hans, Dennis D. Weisenburger, Timothy C. Greiner, Randy D. Gascoyne, German Ott, H. Konrad Müller-Hermelink, Jan Delabie, Rita M. Braziel, Elaine S. Jaffe, Elias Campo, James C. Lynch, Joseph M. Conners, Julie M. Vose, James O. Armitage, Thomas M. Grogan, Louis M. Staudt, Wing C. Chan 2016 University of Nebraska Medical Center

Bcl2 Translocation Defines A Unique Tumor Subset Within The Germinal Center B-Cell-Like Diffuse Large B-Cell Lymphoma, Javeed Iqbal, Warren G. Sanger, Andreas Rosenwald, Diane L. Pickering, Barbara Dave, Sandeep Dave, Li Xiao, Kahai Cao, Qiuming Zhu, Simon Sherman, Christine P. Hans, Dennis D. Weisenburger, Timothy C. Greiner, Randy D. Gascoyne, German Ott, H. Konrad Müller-Hermelink, Jan Delabie, Rita M. Braziel, Elaine S. Jaffe, Elias Campo, James C. Lynch, Joseph M. Conners, Julie M. Vose, James O. Armitage, Thomas M. Grogan, Louis M. Staudt, Wing C. Chan

Qiuming Zhu

Gene expression profiling of diffuse large B-cell lymphoma (DLBCL) has revealed prognostically important subgroups: germinal center B-cell-like (GCB) DLBCL, activated B cell-like (ABC) DLBCL, and primary mediastinal large B-cell lymphoma. The t(14;18)(q32;q21) has been reported previously to define a unique subset within the GCB-DLBCL. We evaluated for the translocation in 141 cases of DLBCL that were successfully gene expression profiled. Using a dual-probe fluorescence in situ hybridization assay, we detected the t(14;18) in 17% of DLBCLs and in 34% of the GCB subgroup which contained the vast majority of positive cases. In addition, 12 ...


Edge Linking By A Directional Potential Function (Dpf), Qiuming Zhu, Matt Payne, Victorian Riordan 2016 University of Nebraska at Omaha

Edge Linking By A Directional Potential Function (Dpf), Qiuming Zhu, Matt Payne, Victorian Riordan

Qiuming Zhu

Low level edge detection operators do not usually guarantee the generation of contiguous boundaries of objects in images. This, coupled with other inherent signal noises, makes many image analysis tasks difficult. We present a new algorithm that is theoretically inspired by a potential function method originated in physics. In this algorithm an edge image is modelled as a potential field with energy depositions at the detected edge positions. Pixels at the edge broken points are charged by the potential forces of the energy in proportion to the relative distances and directions of the surrounding edge pixels. A directional potential function ...


An Integrated Interactive Environment For Knowledge Discovery From Heterogeneous Data Resources, Miao Chen, Qiuming Zhu, Zhengxin Chen 2016 University of Nebraska at Omaha

An Integrated Interactive Environment For Knowledge Discovery From Heterogeneous Data Resources, Miao Chen, Qiuming Zhu, Zhengxin Chen

Qiuming Zhu

Discovering knowledge such as causal relations among objects in large data collections is very important in many decision-making processes. In this paper, we present our development of an integrated environment acting as a software agent for discovering correlative attributes of data objects from multiple heterogeneous resources. The environment provides necessary supporting tools and processing engines for acquiring, collecting, and extracting relevant information from multiple data resources, and then forming meaningful knowledge patterns. The agent system is featured with an interactive user interface that provides useful communication channels for human supervisors to actively engage in necessary consultation and guidance in the ...


Detecting Incorrect Uses Of Combining Algorithms In Xacml 3.0 Policies, Dianxiang Xu, Ning Shen, Yunpeng Zhang 2016 Boise State University

Detecting Incorrect Uses Of Combining Algorithms In Xacml 3.0 Policies, Dianxiang Xu, Ning Shen, Yunpeng Zhang

Dianxiang Xu

With the increasing complexity of software, new access control methods have emerged to deal with attribute-based authorization. As a standard language for specifying attribute-based access control policies, XACML offers a number of rule and policy combining algorithms to meet different needs of policy composition. Due to their variety and complexity, however, it is not uncommon to apply combining algorithms incorrectly, which can lead to unauthorized access or denial of service. To solve this problem, this paper presents a fault-based testing approach for revealing incorrect combining algorithms in XACML 3.0 policies. The theoretical foundation of this approach relies on the ...


Nextgen Flight Deck Data Comm: Auxiliary Synthetic Speech Phase I, Tracy Lennertz, Judith Bürki-Cohen, Andrea L. Sparko, Nickolas D. Macchiarella, Jason Kring, Mike Coman, Tom Haritos, Jeffry Alvarado 2016 Dean, College of Aviation, Embry-Riddle Aeronautical University, Daytona Beach

Nextgen Flight Deck Data Comm: Auxiliary Synthetic Speech Phase I, Tracy Lennertz, Judith Bürki-Cohen, Andrea L. Sparko, Nickolas D. Macchiarella, Jason Kring, Mike Coman, Tom Haritos, Jeffry Alvarado

Nickolas D. "Dan" Macchiarella

Data Comm—a text-based controller-pilot communication system—is critical to many NextGen improvements. With Data Comm, communication becomes a visual task. Interacting with a visual Data Comm display may yield an unsafe increase in head-down time, particularly for single-pilot operations. This study examined the feasibility of supplementing Data Comm with synthetic speech. To this end, thirty-two pilots flew two experimental scenarios in a Cessna 172 Flight Training Device. In one scenario, ATC communication was with a text-only Data Comm display, in the other, communication was with a text Data Comm display with synthetic speech that read aloud each message (i ...


Transfer Of Training From Flight Training Devices To Flight For Ab-Initio Pilots, Nickolas D. Macchiarella, Pamela K. Arban, Shawn M. Doherty 2016 Embry-Riddle Aeronautical University - Daytona Beach

Transfer Of Training From Flight Training Devices To Flight For Ab-Initio Pilots, Nickolas D. Macchiarella, Pamela K. Arban, Shawn M. Doherty

Nickolas D. "Dan" Macchiarella

The application of flight simulation to meet pilot training needs continues to evolve. Flight simulations built with powerful and inexpensive computers are making high fidelity simulation available as a medium for training ab-initio pilots at Pilot Schools and Training Centers. The researchers conducted an 18-month study that applied an experimental flight-training curriculum comprised of 60% flight training device (FTD) flight and 40% airplane flight to certify Private Pilots under Federal Aviation Regulation (FAR) Part 142. The results from the research provided data to ascertain the effective transfer for each flight-training task. Ab-initio student pilots practiced each task to standard in ...


Stable Analysis Patterns For Software And Systems, Mohamed Fayad 2016 San Jose State University

Stable Analysis Patterns For Software And Systems, Mohamed Fayad

Mohamed Fayad

This book presents a new, pragmatic approach for understanding the problem domain and in utilizing stable analysis patterns for engineering and modeling stable software systems, components and frameworks. The unique template employed in this book for describing the presented analysis patterns makes the use of these patterns easy and efficient. The book also helps readers attain the basic knowledge needed to analyze and extract analysis patterns for their own domain of interest and master how to document their own patterns.


User Interface Design, Moritz Stefaner, Sebastien Ferre, Saverio Perugini, Jonathan Koren, Yi Zhang 2016 University of Dayton

User Interface Design, Moritz Stefaner, Sebastien Ferre, Saverio Perugini, Jonathan Koren, Yi Zhang

Saverio Perugini

As detailed in Chap. 1, system implementations for dynamic taxonomies and faceted search allow a wide range of query possibilities on the data. Only when these are made accessible by appropriate user interfaces, the resulting applications can support a variety of search, browsing and analysis tasks. User interface design in this area is confronted with specific challenges. This chapter presents an overview of both established and novel principles and solutions.


Program Transformations For Information Personalization, Saverio Perugini, Naren Ramakrishnan 2016 University of Dayton

Program Transformations For Information Personalization, Saverio Perugini, Naren Ramakrishnan

Saverio Perugini

Personalization constitutes the mechanisms necessary to automatically customize information content, structure, and presentation to the end user to reduce information overload. Unlike traditional approaches to personalization, the central theme of our approach is to model a website as a program and conduct website transformation for personalization by program transformation (e.g., partial evaluation, program slicing). The goal of this paper is study personalization through a program transformation lens and develop a formal model, based on program transformations, for personalized interaction with hierarchical hypermedia. The specific research issues addressed involve identifying and developing program representations and transformations suitable for classes of ...


A Study Of Android Malware Detection Techniques And Machine Learning, Balaji Baskaran, Anca Ralescu 2016 University of Cincinnati - Main Campus

A Study Of Android Malware Detection Techniques And Machine Learning, Balaji Baskaran, Anca Ralescu

MAICS: The Modern Artificial Intelligence and Cognitive Science Conference

Android OS is one of the widely used mobile Operating Systems. The number of malicious applications and adwares are increasing constantly on par with the number of mobile devices. A great number of commercial signature based tools are available on the market which prevent to an extent the penetration and distribution of malicious applications. Numerous researches have been conducted which claims that traditional signature based detection system work well up to certain level and malware authors use numerous techniques to evade these tools. So given this state of affairs, there is an increasing need for an alternative, really tough malware ...


Extended Pixel Representation For Image Segmentation, Deeptha Girish, Vineeta Singh, Anca Ralescu 2016 University of Cincinnati - Main Campus

Extended Pixel Representation For Image Segmentation, Deeptha Girish, Vineeta Singh, Anca Ralescu

MAICS: The Modern Artificial Intelligence and Cognitive Science Conference

We explore the use of extended pixel representation for color based image segmentation using the K-means clustering algorithm. Various extended pixel representations have been implemented in this paper and their results have been compared. By extending the representation of pixels an image is mapped to a higher dimensional space. Unlike other approaches, where data is mapped into an implicit features space of higher dimension (kernel methods), in the approach considered here, the higher dimensions are defined explicitly. Preliminary experimental results which illustrate the proposed approach are promising.


An Autonomic Computing System Based On A Rule-Based Policy Engine And Artificial Immune Systems, Rahmira Rufus, William Nick, Joseph Shelton, Albert Esterline 2016 North Carolina A & T State University

An Autonomic Computing System Based On A Rule-Based Policy Engine And Artificial Immune Systems, Rahmira Rufus, William Nick, Joseph Shelton, Albert Esterline

MAICS: The Modern Artificial Intelligence and Cognitive Science Conference

Autonomic computing systems arose from the notion that complex computing systems should have properties like those of the autonomic nervous system, which coordinates bodily functions and allows attention to be directed to more pressing needs. An autonomic system allows the system administrator to specify high-level policies, which the system maintains without administrator assistance. Policy enforcement can be done with a rule based system such as Jess (a java expert system shell). An autonomic system must be able to monitor itself, and this is often a limiting factor. We are developing an automatic system that has a policy engine and uses ...


Towards The Development Of A Cyber Analysis & Advisement Tool (Caat) For Mitigating De-Anonymization Attacks, Siobahn Day, Henry Williams, Joseph Shelton, Gerry Dozier 2016 North Carolina A & T State University

Towards The Development Of A Cyber Analysis & Advisement Tool (Caat) For Mitigating De-Anonymization Attacks, Siobahn Day, Henry Williams, Joseph Shelton, Gerry Dozier

MAICS: The Modern Artificial Intelligence and Cognitive Science Conference

We are seeing a rise in the number of Anonymous Social Networks (ASN) that claim to provide a sense of user anonymity. However, what many users of ASNs do not know that a person can be identified by their writing style.

In this paper, we provide an overview of a number of author concealment techniques, their impact on the semantic meaning of an author's original text, and introduce AuthorCAAT, an application for mitigating de-anonymization attacks. Our results show that iterative paraphrasing performs the best in terms of author concealment and performs well with respect to Latent Semantic Analysis.


Situations And Evidence For Identity Using Dempster-Shafer Theory, William Nick, Yenny Dominguez, Albert Esterline 2016 North Carolina A & T State University

Situations And Evidence For Identity Using Dempster-Shafer Theory, William Nick, Yenny Dominguez, Albert Esterline

MAICS: The Modern Artificial Intelligence and Cognitive Science Conference

We present a computational framework for identity based on Barwise and Devlin’s situation theory. We present an example with constellations of situations identifying an individual to create what we call id-situations, where id-actions are performed, along with supporting situations. We use Semantic Web standards to represent and reason about the situations in our example. We show how to represent the strength of the evidence, within the situations, as a measure of the support for judgments reached in the id-situation. To measure evidence of an identity from the supporting situations, we use the Dempster-Shafer theory of evidence. We enhance Dempster- ...


Digital Commons powered by bepress