Open Access. Powered by Scholars. Published by Universities.®

OS and Networks Commons

Open Access. Powered by Scholars. Published by Universities.®

1,596 Full-Text Articles 1,451 Authors 267,473 Downloads 85 Institutions

All Articles in OS and Networks

Faceted Search

1,596 full-text articles. Page 6 of 53.

What Are People Tweeting About Zika? An Exploratory Study Concerning Its Symptoms, Treatment, Transmission, And Prevention, Michele Miller, Tanvi Banerjee, RoopTeja Muppalla, William L. Romine, Amit Sheth 2017 Wright State University - Main Campus

What Are People Tweeting About Zika? An Exploratory Study Concerning Its Symptoms, Treatment, Transmission, And Prevention, Michele Miller, Tanvi Banerjee, Roopteja Muppalla, William L. Romine, Amit Sheth

Kno.e.sis Publications

Background: In order to harness what people are tweeting about Zika, there needs to be a computational framework that leverages machine learning techniques to recognize relevant Zika tweets and, further, categorize these into disease-specific categories to address specific societal concerns related to the prevention, transmission, symptoms, and treatment of Zika virus.

Objective: The purpose of this study was to determine the relevancy of the tweets and what people were tweeting about the 4 disease characteristics of Zika: symptoms, transmission, prevention, and treatment.

Methods: A combination of natural language processing and machine learning techniques was used to determine what people were ...


A Comprehensive Context-Aware Interruption Management System, April Chunjiao Song 2017 Marquette University

A Comprehensive Context-Aware Interruption Management System, April Chunjiao Song

Master's Theses (2009 -)

The interruption system is an application that prevents the user from noticing phone calls when he/she is busy, by turning off the ringtone. In a previous project, the user can enter his/her class and work schedule on Google Calendar. The intelligent interruption system can detect if the current time matches the range of one of the events in the user's Google Calendar. Other contexts considered were: driving, relationship of the callers, and proximity of Bluetooth devices. This project is a continuation of the interruption system. We consider additional context, social media such as Twitter. Research is done ...


Java Server Reliability In The Presence Of Failures, Rich Coe 2017 Marquette University

Java Server Reliability In The Presence Of Failures, Rich Coe

Master's Theses (2009 -)

A design for the separation of a server interface and work processing. Numerous sources, Tanenbaum (Tanenbaum Modern Operating Systems, 493), Goscinski (Goscinski Distributed operating systems, 203), and Birman (Birman Reliable distributed systems, 265), all discuss the concept of Two-Phase Commit, where a coordinator directs one or more processes to perform a transaction. If the transaction or any of the processes fail, the coordinator can decide how to proceed by either retrying or aborting the request. The popular web browser Chrome utilizes a separate process for each tab displayed. Should the rendering and display of a web page cause a crash ...


Characterizing Malicious Android Apps By Mining Topic-Specific Data Flow Signatures, XInli YANG, David LO, Li LI, Xin XIA, Tegawendé F. BISSYANDE, Jacques KLEIN 2017 Singapore Management University

Characterizing Malicious Android Apps By Mining Topic-Specific Data Flow Signatures, Xinli Yang, David Lo, Li Li, Xin Xia, Tegawendé F. Bissyande, Jacques Klein

Research Collection School Of Information Systems

Context: State-of-the-art works on automated detection of Android malware have leveraged app descriptionsto spot anomalies w.r.t the functionality implemented, or have used data flow information as afeature to discriminate malicious from benign apps. Although these works have yielded promising performance,we hypothesize that these performances can be improved by a better understanding of maliciousbehavior.Objective: To characterize malicious apps, we take into account both information on app descriptions,which are indicative of apps’ topics, and information on sensitive data flow, which can be relevant todiscriminate malware from benign apps.Method: In this paper, we propose a topic-specific approach ...


An Indoor Navigation System Using A Sensor Fusion Scheme On Android Platform, Jiayi Xin 2017 Marquette University

An Indoor Navigation System Using A Sensor Fusion Scheme On Android Platform, Jiayi Xin

Master's Theses (2009 -)

With the development of wireless communication networks, smart phones have become a necessity for people’s daily lives, and they meet not only the needs of basic functions for users such as sending a message or making a phone call, but also the users’ demands for entertainment, surfing the Internet and socializing. Navigation functions have been commonly utilized, however the navigation function is often based on GPS (Global Positioning System) in outdoor environments, whereas a number of applications need to navigate indoors. This paper presents a system to achieve high accurate indoor navigation based on Android platform. To do this ...


Network-On-Chip Based H.264 Video Decoder On A Field Programmable Gate Array, Ian Barge 2017 Marquette University

Network-On-Chip Based H.264 Video Decoder On A Field Programmable Gate Array, Ian Barge

Master's Theses (2009 -)

This thesis develops the first fully network-on-chip (NoC) based h.264 video decoder implemented in real hardware on a field programmable gate array (FPGA). This thesis starts with an overview of the h.264 video coding standard and an introduction to the NoC communication paradigm. Following this, a series of processing elements (PEs) are developed which implement the component algorithms making up the h.264 video decoder. These PEs, described primarily in VHDL with some Verilog and C, are then mapped to an NoC which is generated using the CONNECT NoC generation tool. To demonstrate the scalability of the proposed ...


Recurrent Neural Networks With Auxiliary Labels For Cross-Domain Opinion Target Extraction, DING YING, YU, JIANFEI, Jing JIANG 2017 Singapore Management University

Recurrent Neural Networks With Auxiliary Labels For Cross-Domain Opinion Target Extraction, Ding Ying, Yu, Jianfei, Jing Jiang

Research Collection School Of Information Systems

Opinion target extractionis a fundamental task in opinion mining. In recent years,neural network based supervised learning methods haveachieved competitive performance on this task. However, aswith any supervised learning method, neural network basedmethods for this task cannot work well when the training datacomes from a different domain than the test data. On the otherhand, some rule-based unsupervisedmethods have shown to berobust when applied to different domains. In this work, weuse rule-based unsupervised methods to create auxiliary labelsand use neural network models to learn a hiddenrepresentation that works well for different domains. When this hiddenrepresentation is used for opinion target extraction ...


Robust Optimization For Tree-Structured Stochastic Network Design, Xiaojian WU, Akshat KUMAR, Daniel SHELDON 2017 Singapore Management University

Robust Optimization For Tree-Structured Stochastic Network Design, Xiaojian Wu, Akshat Kumar, Daniel Sheldon

Research Collection School Of Information Systems

Stochastic network design is a general framework for optimizing network connectivity. It has several applications in computational sustainability including spatial conservation planning, pre-disaster network preparation, and river network optimization. A common assumption in previous work has been made that network parameters (e.g., probability of species colonization) are precisely known, which is unrealistic in real- world settings. We therefore address the robust river network design problem where the goal is to optimize river connectivity for fish movement by removing barriers. We assume that fish passability probabilities are known only imprecisely, but are within some interval bounds. We then develop a ...


Developments Of 5g Technology, Ankit Nilesh Ganatra 2017 Governors State University

Developments Of 5g Technology, Ankit Nilesh Ganatra

All Student Theses

This technology is the future of current LTE technology which would be a boost to the future of wireless and computer networks, as the speeds would be way higher than the current LTE networks, which will push the technology to a new level. This technology will make the radio channels to support data access speeds up to 10 Gb/s which will turn the bandwidth radio channels as WiFi. Comparing it with other LTE technology's it has high speed and capacity, support interactive multimedia, voice, internet and its data rate is 1 Gbps which makes it faster than other ...


On Leveraging Multi-Path Transport In Mobile Networks, Yeon-sup Lim 2017 University of Massachusetts Amherst

On Leveraging Multi-Path Transport In Mobile Networks, Yeon-Sup Lim

Doctoral Dissertations

Multi-Path TCP (MPTCP) is a new transport protocol that enables mobile devices to simultaneously use several physical paths through multiple network interfaces. MPTCP is particularly useful for mobile devices, which usually have multiple wireless interfaces such as IEEE 802.11 (WiFi), cellular (3G/LTE), and Bluetooth. However, applying MPTCP to mobile devices introduces new concerns since they operate in harsh environments with resource constraints due to intermittent path availability and limited power supply. The goal of this thesis is to resolve these problems so as to be able to practically deploy MPTCP in mobile devices.

The first part of the ...


Road Accidents Bigdata Mining And Visualization Using Support Vector Machines, Usha Lokala, Srinivas Nowduri, Prabhakar K. Sharma 2017 Wright State University - Main Campus

Road Accidents Bigdata Mining And Visualization Using Support Vector Machines, Usha Lokala, Srinivas Nowduri, Prabhakar K. Sharma

Kno.e.sis Publications

Useful information has been extracted from the road accident data in United Kingdom (UK), using data analytics method, for avoiding possible accidents in rural and urban areas. This analysis make use of several methodologies such as data integration, support vector machines (SVM), correlation machines and multinomial goodness. The entire datasets have been imported from the traffic department of UK with due permission. The information extracted from these huge datasets forms a basis for several predictions, which in turn avoid unnecessary memory lapses. Since data is expected to grow continuously over a period of time, this work primarily proposes a new ...


Identifying Depressive Disorder In The Twitter Population, Goonmeet Bajaj, Amir Hossein Yazdavar, Krishnaprasad Thirunarayan, Amit Sheth 2017 Wright State University - Main Campus

Identifying Depressive Disorder In The Twitter Population, Goonmeet Bajaj, Amir Hossein Yazdavar, Krishnaprasad Thirunarayan, Amit Sheth

Kno.e.sis Publications

Depression is a highly prevalent public health challenge and a major cause of disability across the globe.

  • Annually 6.7% of Americans (that is, more than 16 million).
  • Traditional approaches to curb depression involve survey·based methods via phone or online questionnaires.
  • Large temporal gaps and cognitive bias.

Social media provides a method for learning users' feelings, emotions, behaviors, and decisions in real-time.


A Semantics-Based Measure Of Emoji Similarity, Sanjaya Wijeratne, Lakshika Balasuriya, Amit Sheth, Derek Doran 2017 Wright State University - Main Campus

A Semantics-Based Measure Of Emoji Similarity, Sanjaya Wijeratne, Lakshika Balasuriya, Amit Sheth, Derek Doran

Kno.e.sis Publications

Emoji have grown to become one of the most important forms of communication on the web. With its widespread use, measuring the similarity of emoji has become an important problem for contemporary text processing since it lies at the heart of sentiment analysis, search, and interface design tasks. This paper presents a comprehensive analysis of the semantic similarity of emoji through embedding models that are learned over machine-readable emoji meanings in the EmojiNet knowledge base. Using emoji descriptions, emoji sense labels and emoji sense definitions, and with different training corpora obtained from Twitter and Google News, we develop and test ...


A Novel Approach For Classifying Gene Expression Data Using Topic Modeling, Soon Jye Kho, Himi Yalamanchili, Michael L. Raymer, Amit Sheth 2017 Wright State University - Main Campus

A Novel Approach For Classifying Gene Expression Data Using Topic Modeling, Soon Jye Kho, Himi Yalamanchili, Michael L. Raymer, Amit Sheth

Kno.e.sis Publications

Understanding the role of differential gene expression in cancer etiology and cellular process is a complex problem that continues to pose a challenge due to sheer number of genes and inter-related biological processes involved. In this paper, we employ an unsupervised topic model, Latent Dirichlet Allocation (LDA) to mitigate overfitting of high-dimensionality gene expression data and to facilitate understanding of the associated pathways. LDA has been recently applied for clustering and exploring genomic data but not for classification and prediction. Here, we proposed to use LDA inclustering as well as in classification of cancer and healthy tissues using lung cancer ...


Relatedness-Based Multi-Entity Summarization, Kalpa Gunaratna, Amir Hossein Yazdavar, Krishnaprasad Thirunarayan, Amit Sheth, Gong Cheng 2017 Wright State University - Main Campus

Relatedness-Based Multi-Entity Summarization, Kalpa Gunaratna, Amir Hossein Yazdavar, Krishnaprasad Thirunarayan, Amit Sheth, Gong Cheng

Kno.e.sis Publications

Representing world knowledge in a machine processable format is important as entities and their descriptions have fueled tremendous growth in knowledge-rich information processing platforms, services, and systems. Prominent applications of knowledge graphs include search engines (e.g., Google Search and Microsoft Bing), email clients (e.g., Gmail), and intelligent personal assistants (e.g., Google Now, Amazon Echo, and Apple’s Siri). In this paper, we present an approach that can summarize facts about a collection of entities by analyzing their relatedness in preference to summarizing each entity in isolation. Specifically, we generate informative entity summaries by selecting: (i) inter-entity facts ...


Smart Underground Antenna Arrays: A Soil Moisture Adaptive Beamforming Approach, Abdul Salam, Mehmet C. Vuran 2017 University of Nebraska-Lincoln

Smart Underground Antenna Arrays: A Soil Moisture Adaptive Beamforming Approach, Abdul Salam, Mehmet C. Vuran

CSE Technical reports

In this paper, a novel framework for underground beamforming using adaptive antenna arrays is presented. Based on the analysis of propagation in wireless underground channel, a theoretical model is developed which uses soil moisture information and feedback mechanism to improve performance wireless underground communications. Array element in soil has been analyzed empirically and impacts of soil type and soil moisture on return loss and resonant frequency are investigated. Beam patterns are investigated to communicate with both underground and above ground devices. Depending on the incident angle, refraction from soil-air interface has the adverse effects in the UG communications. It is ...


Gradient Descent Localization In Wireless Sensor Networks, Nuha A.S. Alwan, Zahir M. Hussain 2017 Edith Cowan University

Gradient Descent Localization In Wireless Sensor Networks, Nuha A.S. Alwan, Zahir M. Hussain

ECU Publications Post 2013

Meaningful information sharing between the sensors of a wireless sensor network (WSN) necessitates node localization, especially if the information to be shared is the location itself, such as in warehousing and information logistics. Trilateration and multilateration positioning methods can be employed in two-dimensional and threedimensional space respectively. These methods use distance measurements and analytically estimate the target location; they suffer from decreased accuracy and computational complexity especially in the three-dimensional case. Iterative optimization methods, such as gradient descent (GD), offer an attractive alternative and enable moving target tracking as well. This chapter focuses on positioning in three dimensions using time-of-arrival ...


Correcting Pedestrian Dead Reckoning With Monte Carlo Localization Boxed For Indoor Navigation, Akira T. Murphy 2017 Colby College

Correcting Pedestrian Dead Reckoning With Monte Carlo Localization Boxed For Indoor Navigation, Akira T. Murphy

Honors Theses

Localization of phones is a ubiquitous part of the modern mobile electronics landscape. However, there are many situations where the current method of networked localization fails. A Pedestrian Dead Reckoning System where the location of the user is calculated by counting the steps and direction of the user was implemented as an iOS app with python for data analysis. A novel algorithm for wireless sensor localization using Ad-Hoc Bluetooth networks was proposed. A small experiment was performed proving that the system is nearly equal to state of the art algorithms.


Preliminary Investigation Of Walking Motion Using A Combination Of Image And Signal Processing, Bradley Schneider, Tanvi Banerjee 2016 Wright State University - Main Campus

Preliminary Investigation Of Walking Motion Using A Combination Of Image And Signal Processing, Bradley Schneider, Tanvi Banerjee

Kno.e.sis Publications

We present the results of analyzing gait motion in first-person video taken from a commercially available wearable camera embedded in a pair of glasses. The video is analyzed with three different computer vision methods to extract motion vectors from different gait sequences from four individuals for comparison against a manually annotated ground truth dataset. Using a combination of signal processing and computer vision techniques, gait features are extracted to identify the walking pace of the individual wearing the camera as well as validated using the ground truth dataset. Our preliminary results indicate that the extraction of activity from the video ...


Android Drone: Remote Quadcopter Control With A Phone, Aubrey John Russell 2016 California Polytechnic State University, San Luis Obispo

Android Drone: Remote Quadcopter Control With A Phone, Aubrey John Russell

Computer Engineering

The purpose of the “Android Drone” project was to create a quadcopter that can be controlled by user input sent over the phone’s Wi-Fi connection or 4G internet connection. Furthermore, the purpose was also to be able to receive live video feedback over the internet connection, thus making the drone an inexpensive option compared to other, equivalent drones that might cost thousands of dollars. Not only that, but the Android phone also has a host of other useful features that could be utilized by the drone: this includes GPS, pathing, picture taking, data storage, networking and TCP/IP, a ...


Digital Commons powered by bepress