Open Access. Powered by Scholars. Published by Universities.®

Other Computer Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

1,724 Full-Text Articles 2,445 Authors 1,301,256 Downloads 163 Institutions

All Articles in Other Computer Sciences

Faceted Search

1,724 full-text articles. Page 1 of 77.

Communicative Information Visualizations: How To Make Data More Understandable By The General Public, Alyxander Burns 2022 University of Massachusetts Amherst

Communicative Information Visualizations: How To Make Data More Understandable By The General Public, Alyxander Burns

Doctoral Dissertations

Although data visualizations have been around for centuries and are encountered frequently by the general public, existing evidence suggests that a significant portion of people have difficulty understanding and interpreting them. It might not seem like a big problem when a reader misreads a weather map and finds themselves without an umbrella in a rainstorm, but for those who lack the means, experience, or ability to make sense of data, misreading a data visualization concerning public health and safety could be a matter of life and death. However, figuring out how to make visualizations truly usable for a diverse audience ...


Computing Concept: Genealogy Potential, Power, Arithmetic, Algorithm And Ritual Of Computation, Yuhang LIU, Fei ZHANG 2022 Institute of Computing Technology, Chinese Academy of Sciences, Beijing 100190, China

Computing Concept: Genealogy Potential, Power, Arithmetic, Algorithm And Ritual Of Computation, Yuhang Liu, Fei Zhang

Bulletin of Chinese Academy of Sciences (Chinese Version)

In the new era, China needs more rational, firm, dialectical, and practical cultural confidence in the field of computational technology. The study conducted rigorous literature research, and established the correspondence between the ancient Chinese ideologies and different focuses of computation. The study proposes the computation concept genealogy (i.e., potential, power, arithmetic, algorithm, and ritual of computation) to deepen the multi-dimensional understanding of the concept of computation, and gives some suggestions for cultivating the computational culture that is facing the world and is of Chinese characteristics.


An Investigation Into Time Gazed At Traffic Objects By Drivers, Kolby R. Sarson 2022 The University of Western Ontario

An Investigation Into Time Gazed At Traffic Objects By Drivers, Kolby R. Sarson

Electronic Thesis and Dissertation Repository

Several studies have considered driver’s attention for a multitude of distinct purposes, ranging from the analysis of a driver’s gaze and perception, to possible use in Advanced Driving Assistance Systems (ADAS). These works typically rely on simple definitions of what it means to “see,” considering a driver gazing upon an object for a single frame as being seen. In this work, we bolster this definition by introducing the concept of time. We consider a definition of ”seen” which requires an object to be gazed upon for a set length of time, or frames, before it can be considered ...


Agglomerative Hierarchical Clustering With Dynamic Time Warping For Household Load Curve Clustering, Fadi AlMahamid, Katarina Grolinger 2022 Western University

Agglomerative Hierarchical Clustering With Dynamic Time Warping For Household Load Curve Clustering, Fadi Almahamid, Katarina Grolinger

Electrical and Computer Engineering Publications

Energy companies often implement various demand response (DR) programs to better match electricity demand and supply by offering the consumers incentives to reduce their demand during critical periods. Classifying clients according to their consumption patterns enables targeting specific groups of consumers for DR. Traditional clustering algorithms use standard distance measurement to find the distance between two points. The results produced by clustering algorithms such as K-means, K-medoids, and Gaussian Mixture Models depend on the clustering parameters or initial clusters. In contrast, our methodology uses a shape-based approach that combines Agglomerative Hierarchical Clustering (AHC) with Dynamic Time Warping (DTW) to classify ...


Virtual Sensor Middleware: Managing Iot Data For The Fog-Cloud Platform, Fadi AlMahamid, Hanan Lutfiyya, Katarina Grolinger 2022 Western University

Virtual Sensor Middleware: Managing Iot Data For The Fog-Cloud Platform, Fadi Almahamid, Hanan Lutfiyya, Katarina Grolinger

Electrical and Computer Engineering Publications

This paper introduces the Virtual Sensor Middleware (VSM), which facilitates distributed sensor data processing on multiple fog nodes. VSM uses a Virtual Sensor as the core component of the middleware. The virtual sensor concept is redesigned to support functionality beyond sensor/device virtualization, such as deploying a set of virtual sensors to represent an IoT application and distributed sensor data processing across multiple fog nodes. Furthermore, the virtual sensor deals with the heterogeneous nature of IoT devices and the various communication protocols using different adapters to communicate with the IoT devices and the underlying protocol. VSM uses the publish-subscribe design ...


Towards Qos-Based Embedded Machine Learning, Tom Springer, Erik Linstead, Peiyi Zhao, Chelsea Parlett-Pelleriti 2022 Chapman University

Towards Qos-Based Embedded Machine Learning, Tom Springer, Erik Linstead, Peiyi Zhao, Chelsea Parlett-Pelleriti

Engineering Faculty Articles and Research

Due to various breakthroughs and advancements in machine learning and computer architectures, machine learning models are beginning to proliferate through embedded platforms. Some of these machine learning models cover a range of applications including computer vision, speech recognition, healthcare efficiency, industrial IoT, robotics and many more. However, there is a critical limitation in implementing ML algorithms efficiently on embedded platforms: the computational and memory expense of many machine learning models can make them unsuitable in resource-constrained environments. Therefore, to efficiently implement these memory-intensive and computationally expensive algorithms in an embedded computing environment, innovative resource management techniques are required at the ...


(Si10-124) Inverse Reconstruction Methodologies: A Review, Deepika Saini 2022 Graphic Era Deemed to be University

(Si10-124) Inverse Reconstruction Methodologies: A Review, Deepika Saini

Applications and Applied Mathematics: An International Journal (AAM)

The three-dimensional reconstruction problem is a longstanding ill-posed problem, which has made enormous progress in the field of computer vision. This field has attracted increasing interest and demonstrated an impressive performance. Due to a long era of increasing evolution, this paper presents an extensive review of the developments made in this field. For the three dimensional visualization, researchers have focused on the developments of three dimensional information and acquisition methodologies from two dimensional scenes or objects. These acquisition methodologies require a complex calibration procedure which is not practical in general. Hence, the requirement of flexibility was much needed in all ...


Cov-Inception: Covid-19 Detection Tool Using Chest X-Ray, Aswini Thota, Ololade Awodipe, Rashmi Patel 2022 Southern Methodist University

Cov-Inception: Covid-19 Detection Tool Using Chest X-Ray, Aswini Thota, Ololade Awodipe, Rashmi Patel

SMU Data Science Review

Since the pandemic started, researchers have been trying to find a way to detect COVID-19 which is a cost-effective, fast, and reliable way to keep the economy viable and running. This research details how chest X-ray radiography can be utilized to detect the infection. This can be for implementation in Airports, Schools, and places of business. Currently, Chest imaging is not a first-line test for COVID-19 due to low diagnostic accuracy and confounding with other viral pneumonia. Different pre-trained algorithms were fine-tuned and applied to the images to train the model and the best model obtained was fine-tuned InceptionV3 model ...


A Roller Coaster For The Mind: Virtual Reality Sickness Modes, Metrics, And Mitigation, Dalton C. Sparks 2022 University of Louisville

A Roller Coaster For The Mind: Virtual Reality Sickness Modes, Metrics, And Mitigation, Dalton C. Sparks

The Cardinal Edge

Understanding and preventing virtual reality sickness(VRS), or cybersickness, is vital in removing barriers for the technology's adoption. Thus, this article aims to synthesize a variety of academic sources to demonstrate the modes by which VRS occurs, the metrics by which it is judged, and the methods to mitigate it. The predominant theories on the biological origins of VRS are discussed, as well as the individual factors which increase the likelihood of a user developing VRS. Moreover, subjective and physiological measurements of VRS are discussed in addition to the development of a predictive model and conceptual framework. Finally, several ...


Parasol: Efficient Parallel Synthesis Of Large Model Spaces, Clay Stevens, Hamid Bagheri 2022 University of Nebraska - Lincoln

Parasol: Efficient Parallel Synthesis Of Large Model Spaces, Clay Stevens, Hamid Bagheri

CSE Conference and Workshop Papers

Formal analysis is an invaluable tool for software engineers, yet state-of-the-art formal analysis techniques suffer from well-known limitations in terms of scalability. In particular, some software design domains—such as tradeoff analysis and security analysis—require systematic exploration of potentially huge model spaces, which further exacerbates the problem. Despite this present and urgent challenge, few techniques exist to support the systematic exploration of large model spaces. This paper introduces Parasol, an approach and accompanying tool suite, to improve the scalability of large-scale formal model space exploration. Parasol presents a novel parallel model space synthesis approach, backed with unsupervised learning to ...


Algorithm-Based Fault Tolerance At Scale, Hayden Estes 2022 University of Alabama in Huntsville

Algorithm-Based Fault Tolerance At Scale, Hayden Estes

Summer Community of Scholars Posters (RCEU and HCR Combined Programs)

No abstract provided.


Influence Level Prediction On Social Media Through Multi-Task And Sociolinguistic User Characteristics Modeling, Denys Katerenchuk 2022 The Graduate Center, City University of New York

Influence Level Prediction On Social Media Through Multi-Task And Sociolinguistic User Characteristics Modeling, Denys Katerenchuk

Dissertations, Theses, and Capstone Projects

Prediction of a user’s influence level on social networks has attracted a lot of attention as human interactions move online. Influential users have the ability to influence others’ behavior to achieve their own agenda. As a result, predicting users’ level of influence online can help to understand social networks, forecast trends, prevent misinformation, etc. The research on user influence in social networks has attracted much attention across multiple disciplines, from social sciences to mathematics, yet it is still not well understood. One of the difficulties is that the definition of influence is specific to a particular problem or a ...


Finite Gaussian Neurons: Defending Against Adversarial Attacks By Making Neural Networks Say "I Don’T Know", Felix Grezes 2022 The Graduate Center, City University of New York

Finite Gaussian Neurons: Defending Against Adversarial Attacks By Making Neural Networks Say "I Don’T Know", Felix Grezes

Dissertations, Theses, and Capstone Projects

In this work, I introduce the Finite Gaussian Neuron (FGN), a novel neuron architecture for artificial neural networks aimed at protecting against adversarial attacks.
Since 2014, artificial neural networks have been known to be vulnerable to adversarial attacks, which can fool the network into producing wrong or nonsensical outputs by making humanly imperceptible alterations to inputs. While defenses against adversarial attacks have been proposed, they usually involve retraining a new neural network from scratch, a costly task.

My works aims to:
- easily convert existing models to Finite Gaussian Neuron architecture,
- while preserving the existing model's behavior on real data ...


Towards Explaining Variation In Entrainment, Andreas Weise 2022 The Graduate Center, City University of New York

Towards Explaining Variation In Entrainment, Andreas Weise

Dissertations, Theses, and Capstone Projects

Entrainment refers to the tendency of human speakers to adapt to their interlocutors to become more similar to them. This affects various dimensions and occurs in many contexts, allowing for rich applications in human-computer interaction. However, it is not exhibited by every speaker in every conversation but varies widely across features, speakers, and contexts, hindering broad application. This variation, whose guiding principles are poorly understood even after decades of entrainment research, is the subject of this thesis. We begin with a comprehensive literature review that serves as the foundation of our own work and provides a reference to guide future ...


How Facial Features Convey Attention In Stationary Environments, Janelle Domantay, Brendan Morris 2022 University of Nevada, Las Vegas

How Facial Features Convey Attention In Stationary Environments, Janelle Domantay, Brendan Morris

Spectra Undergraduate Research Journal

Awareness detection technologies have been gaining traction in a variety of enterprises; most often used for driver fatigue detection, recent research has shifted towards using computer vision technologies to analyze user attention in environments such as online classrooms. This paper aims to extend previous research on distraction detection by analyzing which visual features contribute most to predicting awareness and fatigue. We utilized the open-source facial analysis toolkit OpenFace in order to analyze visual data of subjects at varying levels of attentiveness. Then, using a Support-Vector Machine (SVM) we created several prediction models for user attention and identified the Histogram of ...


Adapting An Online Learning Quality Assurance Framework In A Developing Country Setting: The Case Of A Hei In Malawi, Bennett Kankuzi, Menard Phiri, Robert Chanunkha, Jonathan Makuwira, Paul Makocho 2022 Malawi University of Science and Technology

Adapting An Online Learning Quality Assurance Framework In A Developing Country Setting: The Case Of A Hei In Malawi, Bennett Kankuzi, Menard Phiri, Robert Chanunkha, Jonathan Makuwira, Paul Makocho

African Conference on Information Systems and Technology

Covid-19 prompted many higher education institutions (HEIs), even in developing countries like Malawi, to abruptly shift from their traditional face-to-face mode of delivery to online learning. However, quality issues with online learning remain one of the greatest challenges to acceptance of online learning by many students and stakeholders. This paper presents an action research based study at the Malawi University of Science and Technology, in which an online learning quality assurance framework is adapted to a developed country setting. The adapted framework builds on the Online Learning Consortium (OLC) Quality Scorecard for the Administration of Online Programs. The contextualization and ...


Towards The Development Of A Cost-Effective Image-Sensing-Smart-Parking Systems (Isensmap), Aakriti Sharma 2022 The University of Western Ontario

Towards The Development Of A Cost-Effective Image-Sensing-Smart-Parking Systems (Isensmap), Aakriti Sharma

Electronic Thesis and Dissertation Repository

Finding parking in a busy city has been a major daily problem in today’s busy life. Researchers have proposed various parking spot detection systems to overcome the problem of spending a long time searching for a parking spot. These works include a wide variety of sensors to detect the presence of a vehicle in a parking spot. These approaches are expensive to implement and ineffective in extreme weather conditions in an outdoor parking environment. As a result, a cost-effective, dependable, and time-saving parking solution is much more desirable. In this thesis, we proposed and developed an image processing-based real-time ...


Characterization Of End-Users’ Engagement And Interaction Experience With Social Media Technologies, Yemisi Oyedele, Darelle van Greunen 2022 Nelson Mandela University

Characterization Of End-Users’ Engagement And Interaction Experience With Social Media Technologies, Yemisi Oyedele, Darelle Van Greunen

African Conference on Information Systems and Technology

People, particularly digital citizens, gain more technological experiences from their frequent usage of social media technologies. Their experience as end-users occurs before, during, and after their engagement and interaction with the technologies and is popularly described using behaviour-related definitions. However, an end-user's experience with technologies goes beyond the 'click-and-type" definition. This prompts the question, "what are the user experience elements that define and characterise end-users' engagement and interaction with social media technologies?". Using a case study-based approach, end-users' engagement and interaction with social media technologies were identified. The study's findings indicated that several user experience elements were characterised ...


Exploring Artificial Intelligence (Ai) Techniques For Forecasting Network Traffic: Network Qos And Security Perspectives, Ibrahim Mohammed Sayem 2022 The University of Western Ontario

Exploring Artificial Intelligence (Ai) Techniques For Forecasting Network Traffic: Network Qos And Security Perspectives, Ibrahim Mohammed Sayem

Electronic Thesis and Dissertation Repository

This thesis identifies the research gaps in the field of network intrusion detection and network QoS prediction, and proposes novel solutions to address these challenges. Our first topic presents a novel network intrusion detection system using a stacking ensemble technique using UNSW-15 and CICIDS-2017 datasets. In contrast to earlier research, our proposed novel network intrusion detection techniques not only determine if the network traffic is benign or normal, but also reveal the type of assault in the flow. Our proposed stacking ensemble model provides a more effective detection capability than the existing works. Our proposed stacking ensemble technique can detect ...


How Can Social Networks Impact Careers In Game Development?, Tongzhang Wang 2022 Western University

How Can Social Networks Impact Careers In Game Development?, Tongzhang Wang

Undergraduate Student Research Internships Conference

The game development industry is one characterized by young workers and fast worker turnover. The popularity of using twitter as a professional tool within the video games industry presents a potentially insightful view port into a professional's informal network. Investigating characteristics of the social networks of newly graduated students in the game development industry may reveal what factors contribute to fast worker turnover and how certain cohorts may face additional barriers.


Digital Commons powered by bepress