Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

24,541 Full-Text Articles 22,230 Authors 4,922,860 Downloads 217 Institutions

All Articles in Computer Sciences

Faceted Search

24,541 full-text articles. Page 1 of 598.

On Abstract Modular Inference Systems And Solvers, Yuliya Lierler, Miroslaw Truszczyński 2016 University of Nebraska at Omaha

On Abstract Modular Inference Systems And Solvers, Yuliya Lierler, Miroslaw Truszczyński

Computer Science Faculty Publications

Integrating diverse formalisms into modular knowledge representation systems offers increased expressivity, modeling convenience, and computational benefits. We introduce the concepts of abstract inference modules and abstract modular inference systems to study general principles behind the design and analysis of model generating programs, or solvers, for integrated multi-logic systems. We show how modules and modular systems give rise to transition graphs, which are a natural and convenient representation of solvers, an idea pioneered by the SAT community. These graphs lend themselves well to extensions that capture such important solver design features as learning. In the paper, we consider two flavors of ...


Energy Consumption Prediction With Big Data: Balancing Prediction Accuracy And Computational Resources, Katarina Grolinger, Miriam AM Capretz, Luke Seewald 2016 Western University

Energy Consumption Prediction With Big Data: Balancing Prediction Accuracy And Computational Resources, Katarina Grolinger, Miriam Am Capretz, Luke Seewald

Electrical and Computer Engineering Publications

In recent years, advances in sensor technologies and expansion of smart meters have resulted in massive growth of energy data sets. These Big Data have created new opportunities for energy prediction, but at the same time, they impose new challenges for traditional technologies. On the other hand, new approaches for handling and processing these Big Data have emerged, such as MapReduce, Spark, Storm, and Oxdata H2O. This paper explores how findings from machine learning with Big Data can benefit energy consumption prediction. An approach based on local learning with support vector regression (SVR) is presented. Although local learning itself is ...


Contributing To Astropy: A Community Python Library For Astronomers, Asra Nizami 2016 Macalester College

Contributing To Astropy: A Community Python Library For Astronomers, Asra Nizami

Macalester Journal of Physics and Astronomy

This paper discusses the author’s contributions to two packages affiliated with Astropy, a community Python library for astronomers. The packages the author contributed to were modeling, a sub-package within the core Astropy package, and WCSAxes, an Astropy affiliated package, outside the core package.


Efficient Pair-Wise Similarity Computation Using Apache Spark, Parineetha Gandhi Tirumali 2016 San Jose State University

Efficient Pair-Wise Similarity Computation Using Apache Spark, Parineetha Gandhi Tirumali

Master's Projects

Entity matching is the process of identifying different manifestations of the same real world entity. These entities can be referred to as objects(string) or data instances. These entities are in turn split over several databases or clusters based on the signatures of the entities. When entity matching algorithms are performed on these databases or clusters, there is a high possibility that a particular entity pair is compared more than once. The number of comparison for any two entities depend on the number of common signatures or keys they possess. This effects the performance of any entity matching algorithm. This ...


Engaging Students In Information Storage Management Courses, Vladan Jovanovic, Timur Mirzoev, Lee Toderick, Rick Homkes, Mark Stockman 2016 Georgia Southern University

Engaging Students In Information Storage Management Courses, Vladan Jovanovic, Timur Mirzoev, Lee Toderick, Rick Homkes, Mark Stockman

Vladan Jovanovic

This panel will elaborate on faculty experiences with specific ways used to engage students in the Information Storage and Management, formerly Storage Technology, and the Virtualization coursework. The emphasize of the discussion will be on the mechanisms used in engaging students in learning and on experiences with various activities helpful for varying learning preferences/modes. All invited panelists are experienced faculty involved with subject matter courses via EMC’s Academic Alliance program. The resources made available via this alliance and through exchange among the faculty involved in teaching related subjects in IT and CS programs will be discussed and evaluated ...


Data Warehouse And Master Data Management Evolution- A Meta- Data Vault Approach, Danijela Subotic, Vladan Jovanovic, Patrizia Poscic 2016 University of Rijeka

Data Warehouse And Master Data Management Evolution- A Meta- Data Vault Approach, Danijela Subotic, Vladan Jovanovic, Patrizia Poscic

Vladan Jovanovic

The paper presents a: a) brief overview and analysis of existing approaches to the data warehouse (DW) evolution problem, and b) detailed description of the research idea for the DW evolution problem (primarily intended for structured data sources and realizations with relational database engines). We observe the DW evolution problem as a double issue - from the DW perspective, and from the master data management (MDM) perspective. The proposed general solution will include a Data Vault (DV) model based metadata repository that will integrate the DW data and metadata with the MDM data and metadata. This historicized metadata repository will manage ...


Tracking User Activity While Safeguarding Data From Attackers, Justin Dahmubed 2016 San Jose State University

Tracking User Activity While Safeguarding Data From Attackers, Justin Dahmubed

Master's Projects

Companies constantly look for ways to better understand customer activity on their websites. Website owners may want to be able to analyze customer activity without having to concern themselves with a government agency forcing them to reveal their information. Multiple analytical tools have been created, most notably Google Analytics.

In my thesis, I demonstrate how analytics data can be stored so that only the site owners can view the data about their customers. With my design, even the analytics site itself cannot decrypt the data after a given window of time has elapsed. The novel aspect of my design is ...


Malicious Javascript Detection Using Statistical Language Model, Anumeha Shah 2016 San Jose State University

Malicious Javascript Detection Using Statistical Language Model, Anumeha Shah

Master's Projects

The Internet has an immense importance in our day to day life, but at the same time, it has become the medium of infecting computers, attacking users, and distributing malicious code. As JavaScript is the principal language of client side pro- gramming, it is frequently used in conducting such attacks. Various approaches have been made to overcome the JavaScript security issues. Some advanced approaches utilize machine learning technology in combination with de-obfuscation and emula- tion. Many methods of analysis incorporate static analysis and dynamic analysis. Our solution is entirely based on static analysis, which avoids unnecessary runtime overhead.

The central ...


Library Writers Reward Project, Saravana Kumar Gajendran 2016 San Jose State University

Library Writers Reward Project, Saravana Kumar Gajendran

Master's Projects

Open-source library development exploits the distributed intelligence of participants in Internet communities. Nowadays, contribution to the open-source community is fading [16] (Stackalytics, 2016) as there is not much recognition for library writers. They can start exploring ways to generate revenue as they actively contribute to the open-source community.

This project helps library writers to generate revenue in the form of bitcoins for their contribution. Our solution to generate revenue for library writers is to integrate bitcoin mining with existing JavaScript libraries, such as jQuery. More use of the library leads to more revenue for the library writers. It uses the ...


Movie Script Shot Lister, David Robert Smith 2016 San Jose State University

Movie Script Shot Lister, David Robert Smith

Master's Projects

The making of a motion picture almost always starts with the script, the written version of a story envisioned within the mind of its creator. The script is then broken down into shots. Each individual shot is filmed and then they are edited together to create the motion picture. The goal of the Movie Script Shot Lister thesis project is to be able to read in a script for a movie or television show, and automatically generate a shot list. While a script is text, a shot list is the blue print for how to visualize that script, so the ...


Visual Knowledge Representation Of Conceptual Semantic Networks, Leyla Zhuhadar, Olfa Nasraoui, Robert Wyatt, Rong Yang 2016 Western Kentucky Univeristy

Visual Knowledge Representation Of Conceptual Semantic Networks, Leyla Zhuhadar, Olfa Nasraoui, Robert Wyatt, Rong Yang

Leyla Zhuhadar

This article presents methods of using visual analysis to visually represent large amounts of massive, dynamic, ambiguous data allocated in a repository of learning objects. These methods are based on the semantic representation of these resources. We use a graphical model represented as a semantic graph. The formalization of the semantic graph has been intuitively built to solve a real problem which is browsing and searching for lectures in a vast repository of colleges/courses located at Western Kentucky University1. This study combines Formal Concept Analysis (FCA) with Semantic Factoring to decompose complex, vast concepts into their primitives in order ...


Visual Knowledge Representation Of Conceptual Semantic Networks, Leyla Zhuhadar, Olfa Nasraoui, Robert Wyatt, Rong Yang 2016 Western Kentucky Univeristy

Visual Knowledge Representation Of Conceptual Semantic Networks, Leyla Zhuhadar, Olfa Nasraoui, Robert Wyatt, Rong Yang

Leyla Zhuhadar

This article presents methods of using visual analysis to visually represent large amounts of massive, dynamic, ambiguous data allocated in a repository of learning objects. These methods are based on the semantic representation of these resources. We use a graphical model represented as a semantic graph. The formalization of the semantic graph has been intuitively built to solve a real problem which is browsing and searching for lectures in a vast repository of colleges/courses located at Western Kentucky University1. This study combines Formal Concept Analysis (FCA) with Semantic Factoring to decompose complex, vast concepts into their primitives in order ...


Hill's Diagrammatic Method And Reduced Graph Powers, Gregory D. Smith, Richard Hammack 2016 The College of William & Mary

Hill's Diagrammatic Method And Reduced Graph Powers, Gregory D. Smith, Richard Hammack

Biology and Medicine Through Mathematics Conference

No abstract provided.


Visualization Of Deep Convolutional Neural Networks, Dingwen Li 2016 Washington University in St. Louis

Visualization Of Deep Convolutional Neural Networks, Dingwen Li

Engineering and Applied Science Theses & Dissertations

Deep learning has achieved great accuracy in large scale image classification and scene recognition tasks, especially after the Convolutional Neural Network (CNN) model was introduced. Although a CNN often demonstrates very good classification results, it is usually unclear how or why a classification result is achieved. The objective of this thesis is to explore several existing visualization approaches which offer intuitive visual results. The thesis focuses on three visualization approaches: (1) image masking which highlights the region of image with high influence on the classification, (2) Taylor decomposition back-propagation which generates a per pixel heat map that describes each pixel ...


Hive - An Agent Based Modeling Framework, Roohi Bharti 2016 San Jose State Universi

Hive - An Agent Based Modeling Framework, Roohi Bharti

Master's Projects

This thesis begins by defining agent based modeling. Agent based models are used to model the emergent behavior of complex systems with many interacting components, known as agents. Several model examples are given using NetLogo, which is a popular agent-based modeling platform. A model of concurrent computation is described that uses message passing as the only form of communication between the model’s components, which are called actors. The model is called an actor model. Actors are primitive objects of concurrency in an actor model. In particular, we describe the actor model implemented by Akka, which is Scala’s new ...


Interactive Computer Science Exercises In Edx, Hong Le 2016 San Jose State University

Interactive Computer Science Exercises In Edx, Hong Le

Master's Projects

This project focuses on improving online learning courses for Computer Science. My approach is to create a platform in which interactive exercises can be implemented for students to work on. Methodology includes creating plugins for interactive exercises using XBlock, a component architecture for building independent online courses on edX. The exercises are based on existing exercises like CodeCheck and Wiley’s InterActivities Exercise System. In order to integrate these exercises, I implemented CodeCheck XBlock and Interactive XBlock. These Xblocks allow students to work on interactive exercises on edX, and instructors to view and download students’ submissions.


Secure Declassification In Faceted Javascript, Tam Wing 2016 San Jose State University

Secure Declassification In Faceted Javascript, Tam Wing

Master's Projects

Information leaks currently represent a major security vulnerability. Malicious code, when injected into a trusted environment and executed in the context of the victim’s privileges, often results in the loss of sensitive information. To address this security issue, this paper focuses on the idea of information flow control using faceted execution [3]. This mechanism allows the interpreter to efficiently keep track of variables across multiple security levels, achieving termination-insensitive non-interference (TINI). With TINI, a program can only leak one bit of data, caused by the termination of a program. One key benefit of having faceted execution is that flow ...


Processing Posting Lists Using Opencl, Radha Kotipalli 2016 San Jose State University

Processing Posting Lists Using Opencl, Radha Kotipalli

Master's Projects

One of the main requirements of internet search engines is the ability to retrieve relevant results with faster response times. Yioop is an open source search engine designed and developed in PHP by Dr. Chris Pollett. The goal of this project is to explore the possibilities of enhancing the performance of Yioop by substituting resource-intensive existing PHP functions with C based native PHP extensions and the parallel data processing technology OpenCL. OpenCL leverages the Graphical Processing Unit (GPU) of a computer system for performance improvements.

Some of the critical functions in search engines are resource-intensive in terms of processing power ...


Consideration Of The Versatility Of The Open Prototype For Educational Nanosats Cubesat Design, Jeremy Straub 2016 Selected Works

Consideration Of The Versatility Of The Open Prototype For Educational Nanosats Cubesat Design, Jeremy Straub

Jeremy Straub

The Open Prototype for Educational NanoSats (OPEN) was created with the goal of providing institutions worldwide with access to a set of low-cost designs that could be easily modified and augmented for mission-specific needs.  The basic design set has been created for and used to construct the University of North Dakota’s OpenOrbiter CubeSat, which is currently awaiting a NASA launch awarded through the Educational Launch of Nanosatellites program.  This paper considers the value of the OPEN design in the context of re-use through the presentation and analysis of several other missions that have successfully made use of elements of ...


Detection Of Locations Of Key Points On Facial Images, Manoj Gyanani 2016 San Jose State University

Detection Of Locations Of Key Points On Facial Images, Manoj Gyanani

Master's Projects

In field of computer vision research, One of the most important branch is Face recognition. It targets at finding size and location of human face on digital image, by identifying and separating faces from the surrounding objects like building, plants etc. For the purpose of developing an advanced face recognition algorithm, Detection of facial key points is the basic and very important task, basically it is about finding out the location of specific key points on facial images. This key points can be mouths, noses, left eyes, right eyes and so on.

For implementation of solution, I have used amazon ...


Digital Commons powered by bepress