Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

55,403 Full-Text Articles 72,345 Authors 23,183,657 Downloads 377 Institutions

All Articles in Computer Sciences

Faceted Search

55,403 full-text articles. Page 1080 of 2018.

Improving Version-Aware Word Documents, Alexandre Gustavo Valenca de Azevedo Filho 2017 University of Wisconsin-Milwaukee

Improving Version-Aware Word Documents, Alexandre Gustavo Valenca De Azevedo Filho

Theses and Dissertations

Coakley~\textit{et al.} described how they developed Version Aware Word Documents, which is an enhanced document representation that includes a detailed version history that is self-contained and portable. However, they were not able to adopt the unique-ID-based techniques that have been shown to support efficient merging and differencing algorithms.

This thesis describes how it is possible to adapt existing features of MS Word's OOXML representation to provide a system of unique element IDs suitable for those algorithms. This requires taking over Word's Revision Save ID (RSID) system and also defining procedures for specifying ID values for elements that do not support …


Utilizing Consumer Health Posts For Pharmacovigilance: Identifying Underlying Factors Associated With Patients’ Attitudes Towards Antidepressants, Maryam Zolnoori 2017 University of Wisconsin-Milwaukee

Utilizing Consumer Health Posts For Pharmacovigilance: Identifying Underlying Factors Associated With Patients’ Attitudes Towards Antidepressants, Maryam Zolnoori

Theses and Dissertations

Non-adherence to antidepressants is a major obstacle to antidepressants therapeutic benefits, resulting in increased risk of relapse, emergency visits, and significant burden on individuals and the healthcare system. Several studies showed that non-adherence is weakly associated with personal and clinical variables, but strongly associated with patients’ beliefs and attitudes towards medications. The traditional methods for identifying the key dimensions of patients’ attitudes towards antidepressants are associated with some methodological limitations, such as concern about confidentiality of personal information. In this study, attempts have been made to address the limitations by utilizing patients’ self report experiences in online healthcare forums to …


A Compact Representation Of Human Actions By Sliding Coordinate Coding, Runwei DING, Qianru SUN, Mengyuan LIU, Hong LIU 2017 Peking University

A Compact Representation Of Human Actions By Sliding Coordinate Coding, Runwei Ding, Qianru Sun, Mengyuan Liu, Hong Liu

Research Collection School Of Computing and Information Systems

Human action recognition remains challenging in realistic videos, where scale and viewpoint changes make the problem complicated. Many complex models have been developed to overcome these difficulties, while we explore using low-level features and typical classifiers to achieve the state-of-the-art performance. The baseline model of feature encoding for action recognition is bag-of-words model, which has shown high efficiency but ignores the arrangement of local features. Refined methods compensate for this problem by using a large number of co-occurrence descriptors or a concatenation of the local distributions in designed segments. In contrast, this article proposes to encode the relative position of …


Law Enforcement Resource Optimization With Response Time Guarantees, Jonathan CHASE, Jiali DU, Na FU, Truc Viet LE, Hoong Chuin LAU 2017 Singapore Management University

Law Enforcement Resource Optimization With Response Time Guarantees, Jonathan Chase, Jiali Du, Na Fu, Truc Viet Le, Hoong Chuin Lau

Research Collection School Of Computing and Information Systems

In a security-conscious world, and with the rapid increase in the global urbanized population, there is a growing challenge for law enforcement agencies to efficiently respond to emergency calls. We consider the problem of spatially and temporally optimizing the allocation of law enforcement resources such that the quality of service (QoS) in terms of emergency response time can be guaranteed. To solve this problem, we provide a spatio-temporal MILP optimization model, which we learn from a real-world dataset of incidents and dispatching records, and solve by existing solvers. One key feature of our proposed model is the introduction of risk …


Vkse-Mo: Verifiable Keyword Search Over Encrypted Data In Multi-Owner Settings, Yinbin MIAO, Jianfeng MA, Ximeng LIU, Junwei ZHANG, Zhiquan LIU 2017 Xidian University

Vkse-Mo: Verifiable Keyword Search Over Encrypted Data In Multi-Owner Settings, Yinbin Miao, Jianfeng Ma, Ximeng Liu, Junwei Zhang, Zhiquan Liu

Research Collection School Of Computing and Information Systems

Searchable encryption (SE) techniques allow cloud clients to easily store data and search encrypted data in a privacy-preserving manner, where most of SE schemes treat the cloud server as honest-but-curious. However, in practice, the cloud server is a semi-honest-but-curious third-party, which only executes a fraction of search operations and returns a fraction of false search results to save its computational and bandwidth resources. Thus, it is important to provide a results verification method to guarantee the correctness of the search results. Existing SE schemes allow multiple data owners to upload different records to the cloud server, but these schemes have …


D-Watch: Embracing “Bad” Multipaths For Device-Free Localization With Cots Rfid Devices, Ju WANG, Jie XIONG, Hongbo JIANG, Xiaojiang CHEN, Dingyi FANG 2017 Northwest University Xi'an

D-Watch: Embracing “Bad” Multipaths For Device-Free Localization With Cots Rfid Devices, Ju Wang, Jie Xiong, Hongbo Jiang, Xiaojiang Chen, Dingyi Fang

Research Collection School Of Computing and Information Systems

Device-free localization, which does not require any device attached to the target, is playing a critical role in many applications, such as intrusion detection, elderly monitoring and so on. This paper introduces D-Watch, a device-free system built on the top of low cost commodity-off-the-shelf RFID hardware. Unlike previous works which consider multipaths detrimental, D-Watch leverages the ''bad'' multipaths to provide a decimeter-level localization accuracy without offline training. D-Watch harnesses the angle-of-arrival information from the RFID tags' backscatter signals. The key intuition is that whenever a target blocks a signal's propagation path, the signal power experiences a drop which can be …


Home Health Care Delivery Problem, Aldy GUNAWAN, Hoong Chuin LAU, Kun LU 2017 Singapore Management University

Home Health Care Delivery Problem, Aldy Gunawan, Hoong Chuin Lau, Kun Lu

Research Collection School Of Computing and Information Systems

We address the Home Health Care Delivery Problem (HHCDP), which is concerned with staff scheduling in the home health care industry. The goal is to schedule health care providers to serve patients at their homes that maximizes the total collected preference scores from visited patients subject to several constraints, such as workload of the health care providers, time budget for each provider and so on. The complexity lies in the possibility of cancellation of patient bookings dynamically, and the generated schedule should attempt to patients’ preferred time windows. To cater to these requirements, we model the preference score as a …


A Selective-Discrete Particle Swarm Optimization Algorithm For Solving A Class Of Orienteering Problems, Aldy GUNAWAN, Vincent F. YU, Perwira REDI, Parida JEWPANYA, Hoong Chuin LAU 2017 Singapore Management University

A Selective-Discrete Particle Swarm Optimization Algorithm For Solving A Class Of Orienteering Problems, Aldy Gunawan, Vincent F. Yu, Perwira Redi, Parida Jewpanya, Hoong Chuin Lau

Research Collection School Of Computing and Information Systems

This study addresses a class of NP-hard problem called the Orienteering Problem (OP), which belongs to a well-known class of vehicle routing problems. In the OP, a set of nodes that associated with a location and a score is given. The time required to travel between each pair of nodes is known in advance. The total travel time is limited by a predetermined time budget. The objective is to select a subset of nodes to be visited that maximizes the total collected score within a path. The Team OP (TOP) is an extension of OP that incorporates multiple paths. Another …


Leveraging Auxiliary Tasks For Document-Level Cross-Domain Sentiment Classification, Jianfei YU, Jing JIANG 2017 Singapore Management University

Leveraging Auxiliary Tasks For Document-Level Cross-Domain Sentiment Classification, Jianfei Yu, Jing Jiang

Research Collection School Of Computing and Information Systems

In this paper, we study domain adaptationwith a state-of-the-art hierarchicalneural network for document-level sentimentclassification. We first design a newauxiliary task based on sentiment scoresof domain-independent words. We thenpropose two neural network architecturesto respectively induce document embeddingsand sentence embeddings that workwell for different domains. When thesedocument and sentence embeddings areused for sentiment classification, we findthat with both pseudo and external sentimentlexicons, our proposed methods canperform similarly to or better than severalhighly competitive domain adaptationmethods on a benchmark dataset of productreviews.


Btci: A New Framework For Identifying Congestion Cascades Using Bus Trajectory Data, Meng-Fen CHIANG, Ee Peng LIM, Wang-Chien LEE, Agus Trisnajaya KWEE 2017 Singapore Management University

Btci: A New Framework For Identifying Congestion Cascades Using Bus Trajectory Data, Meng-Fen Chiang, Ee Peng Lim, Wang-Chien Lee, Agus Trisnajaya Kwee

Research Collection School Of Computing and Information Systems

The knowledge of traffic health status is essential to the general public and urban traffic management. To identify congestion cascades, an important phenomenon of traffic health, we propose a Bus Trajectory based Congestion Identification (BTCI) framework that explores the anomalous traffic health status and structure properties of congestion cascades using bus trajectory data. BTCI consists of two main steps, congested segment extraction and congestion cascades identification. The former constructs path speed models from historical vehicle transitions and design a non-parametric Kernel Density Estimation (KDE) function to derive a measure of congestion score. The latter aggregates congested segments (i.e., those with …


Analyzing The E-Learning Video Environment Requirements Of Generation Z Students Using Echo360 Platform, Swapna GOTTIPATI, Venky SHANKARARAMAN 2017 Singapore Management University

Analyzing The E-Learning Video Environment Requirements Of Generation Z Students Using Echo360 Platform, Swapna Gottipati, Venky Shankararaman

Research Collection School Of Computing and Information Systems

As with any other generational cohort,Generation Z students have their own unique characteristics that influencetheir approach to learning process. They are the future workforce and severalefforts are undertaken by Government and education institutes to consider thecharacteristics of Gen-Z in developing the curriculum and teaching environmentsuitable for these students. E-learning plays a key role in students learningprocess and has been widely adopted by many education institutions. Inparticular, videos play a major role in the learning process of Gen-Zstudents. The purpose of this paper isto focus the on requirements of Gen-Z students and to provide suggestions forhow to create a e-learning video …


Who Are Your Users? Comparing Media Professionals' Preconception Of Users To Data-Driven Personas, Lene NIELSEN, Soon-Gyu JUNG, Jisun AN, Joni SALMINEN, Haewoon KWAK, Bernard J. JANSEN 2017 Singapore Management University

Who Are Your Users? Comparing Media Professionals' Preconception Of Users To Data-Driven Personas, Lene Nielsen, Soon-Gyu Jung, Jisun An, Joni Salminen, Haewoon Kwak, Bernard J. Jansen

Research Collection School Of Computing and Information Systems

One of the reasons for using personas is to align user understandings across project teams and sites. As part of a larger persona study, at Al Jazeera English (AJE), we conducted 16 qualitative interviews with media producers, the end users of persona descriptions. We asked the participants about their understanding of a typical AJE media consumer, and the variety of answers shows that the understandings are not aligned and are built on a mix of own experiences, own self, assumptions, and data given by the company. The answers are sometimes aligned with the data-driven personas and sometimes not. The end …


A Novel Density Peak Clustering Algorithm Based On Squared Residual Error, Milan PARMAR, Di WANG, Ah-hwee TAN, Chunyan MIAO, Jianhua JIANG, You ZHOU 2017 Singapore Management University

A Novel Density Peak Clustering Algorithm Based On Squared Residual Error, Milan Parmar, Di Wang, Ah-Hwee Tan, Chunyan Miao, Jianhua Jiang, You Zhou

Research Collection School Of Computing and Information Systems

The density peak clustering (DPC) algorithm is designed to quickly identify intricate-shaped clusters with high dimensionality by finding high-density peaks in a non-iterative manner and using only one threshold parameter. However, DPC has certain limitations in processing low-density data points because it only takes the global data density distribution into account. As such, DPC may confine in forming low-density data clusters, or in other words, DPC may fail in detecting anomalies and borderline points. In this paper, we analyze the limitations of DPC and propose a novel density peak clustering algorithm to better handle low-density clustering tasks. Specifically, our algorithm …


High Performance Computing Techniques For Analyzing Risky Decision Making, Vinay B. Gavirangaswamy 2017 Western Michigan University

High Performance Computing Techniques For Analyzing Risky Decision Making, Vinay B. Gavirangaswamy

Dissertations

The process or activity of making choices when subject to gain or loss can be understood as risky decision making (RDM). Risky Decisions consists of outcomes of decisions that may probabilistically result in unfavorable results. Every organism that lives faces this challenge and recent research suggests that there is a computational process involved in making these decisions. This has led to new approaches in the study of RDM. My dissertation is towards contributing to expand on the existing knowledge of RDM processes.

The core contribution of my work is an analysis and development of high performance computing techniques that improves …


Pose Guided Person Image Generation, Liqian MA, Xu JIA, Qianru SUN, Bernt SCHIELE, Tinne TUYTELAARS, Luc VAN GOOL 2017 Katholieke Universiteit Leuven

Pose Guided Person Image Generation, Liqian Ma, Xu Jia, Qianru Sun, Bernt Schiele, Tinne Tuytelaars, Luc Van Gool

Research Collection School Of Computing and Information Systems

This paper proposes the novel Pose Guided Person Generation Network (PG$^2$) that allows to synthesize person images in arbitrary poses, based on an image of that person and a novel pose. Our generation framework PG^2 utilizes the pose information explicitly and consists of two key stages: pose integration and image refinement. In the first stage the condition image and the target pose are fed into a U-Net-like network to generate an initial but coarse image of the person with the target pose. The second stage then refines the initial and blurry result by training a U-Net-like generator in an adversarial …


Leveraging The Trade-Off Between Accuracy And Interpretability In A Hybrid Intelligent System, Di WANG, Chai QUEK, Ah-hwee TAN, Chunyan MIAO, Geok See NG, You ZHOU 2017 Singapore Management University

Leveraging The Trade-Off Between Accuracy And Interpretability In A Hybrid Intelligent System, Di Wang, Chai Quek, Ah-Hwee Tan, Chunyan Miao, Geok See Ng, You Zhou

Research Collection School Of Computing and Information Systems

Neural Fuzzy Inference System (NFIS) is a widely adopted paradigm to develop a data-driven learning system. This hybrid system has been widely adopted due to its accurate reasoning procedure and comprehensible inference rules. Although most NFISs primarily focus on accuracy, we have observed an ever increasing demand on improving the interpretability of NFISs and other types of machine learning systems. In this paper, we illustrate how we leverage the trade-off between accuracy and interpretability in an NFIS called Genetic Algorithm and Rough Set Incorporated Neural Fuzzy Inference System (GARSINFIS). In a nutshell, GARSINFIS self-organizes its network structure with a small …


Inferring Social Media Users’ Demographics From Profile Pictures: A Face++ Analysis On Twitter Users, Soon-Gyo JUNG, Jisun AN, Haewoon KWAK, Joni SALMINEN, Bernard J. JANSEN 2017 Singapore Management University

Inferring Social Media Users’ Demographics From Profile Pictures: A Face++ Analysis On Twitter Users, Soon-Gyo Jung, Jisun An, Haewoon Kwak, Joni Salminen, Bernard J. Jansen

Research Collection School Of Computing and Information Systems

In this research, we evaluate the applicability of using facial recognition of social media account profile pictures to infer the demographic attributes of gender, race, and age of the account owners leveraging a commercial and well-known image service, specifically Face++. Our goal is to determine the feasibility of this approach for actual system implementation. Using a dataset of approximately 10,000 Twitter profile pictures, we use Face++ to classify this set of images for gender, race, and age. We determine that about 30% of these profile pictures contain identifiable images of people using the current state-of-the-art automated means. We then employ …


Decision Support For Shared Responsibility Of Cloud Security Metrics, Moteeb Aieed Al Moteri 2017 Florida Institute of Technology

Decision Support For Shared Responsibility Of Cloud Security Metrics, Moteeb Aieed Al Moteri

Theses and Dissertations

With the rapid growth of cloud computing and the increasing importance of measuring the security of cloud systems, more attention has been focused on the need for security metrics that are specific to cloud computing. The use of metrics in cloud computing enables improved service selection, service agreement, and service verification. This dissertation presents a taxonomy of cloud security metrics and guideline and a framework for allocating cloud security metrics shared responsibility. The taxonomy considers several novel viewpoints. Metrics are organized by cloud capability type (Application, Platform, Infrastructure) along with the type of cloud deployment (public, private, hybrid, community), and …


Web Application For Graduate Course Advising System, Sanjay Karrolla 2017 California State University, San Bernardino

Web Application For Graduate Course Advising System, Sanjay Karrolla

Electronic Theses, Projects, and Dissertations

The main aim of the course recommendation system is to build a course recommendation path for students to help them plan courses to successfully graduate on time. The Model-View-Controller (MVC) architecture is used to isolate the user interface (UI) design from the business logic. The front-end of the application develops the UI using AngularJS. The front-end design is done by gathering the functionality system requirements -- input controls, navigational components, informational components and containers and usability testing. The back-end of the application involves setting up the database and server-side routing. Server-side routing is done using Express JS.


An Unmanned Aerial System For Prescribed Fires, Evan M. Beachly 2017 University of Nebraska-Lincoln

An Unmanned Aerial System For Prescribed Fires, Evan M. Beachly

Department of Computer Science and Engineering: Dissertations, Theses, and Student Research

Prescribed fires can lessen wildfire severity and control invasive species, but some terrains may be difficult, dangerous, or costly to burn with existing tools. This thesis presents the design of an unmanned aerial system that can ignite prescribed fires from the air, with less cost and risk than with aerial ignition from a manned aircraft. The prototype was evaluated in-lab and successfully used to ignite interior areas of two prescribed fires. Additionally, we introduce an approach that integrates a lightweight fire simulation to autonomously plan safe flight trajectories and suggest effective fire lines. Both components are unique in that they …


Digital Commons powered by bepress