Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

31,872 Full-Text Articles 31,889 Authors 7,711,165 Downloads 298 Institutions

All Articles in Computer Sciences

Faceted Search

31,872 full-text articles. Page 2 of 922.

Rubik's Cube: A Visual And Tactile Learning Of Algorithms And Patterns, Lawrence Muller 2019 CUNY La Guardia Community College

Rubik's Cube: A Visual And Tactile Learning Of Algorithms And Patterns, Lawrence Muller

Open Educational Resources

This is a classroom activity report on teaching algorithms as part of a second course in computer programming. Teaching an algorithm in an introductory level programming class is often a dry task for the instructor and the rewards for the student are abstract. To make the learning of algorithms and software more rewarding, this assignment employs a Rubik’s cube.


Extending Set Functors To Generalised Metric Spaces, Adriana Balan, Alexander Kurz, Jiří Velebil 2019 University Politehnica of Bucharest

Extending Set Functors To Generalised Metric Spaces, Adriana Balan, Alexander Kurz, Jiří Velebil

Mathematics, Physics, and Computer Science Faculty Articles and Research

For a commutative quantale V, the category V-cat can be perceived as a category of generalised metric spaces and non-expanding maps. We show that any type constructor T (formalised as an endofunctor on sets) can be extended in a canonical way to a type constructor TV on V-cat. The proof yields methods of explicitly calculating the extension in concrete examples, which cover well-known notions such as the Pompeiu-Hausdorff metric as well as new ones.

Conceptually, this allows us to to solve the same recursive domain equation X ≅ TX in different categories (such as sets and metric spaces) and we ...


An Internet Based Intelligent Argumentation System For Collaborative Engineering Design, Xiaoqing Frank Liu, Samir Raorane, Man Zheng, Ming-Chuan Leu 2019 Missouri University of Science and Technology

An Internet Based Intelligent Argumentation System For Collaborative Engineering Design, Xiaoqing Frank Liu, Samir Raorane, Man Zheng, Ming-Chuan Leu

Ming C. Leu

Modern product design is a very complicated process which involves groups of designers, manufacturers, suppliers, and customer representatives. Conflicts are unavoidable in collaboration among multiple stakeholders, who have different objectives, requirements, and priorities. Unfortunately, current web-based collaborative engineering design systems do not support collaborative conflict resolution. In this paper, we will develop an intelligent computational argumentation model to enable management of a large scale argumentation network, and resolution of conflicts based on argumentation from many participants. A web-based intelligent argumentation tool is developed as a part of a web-based collaborative engineering design system based on the above model to resolve ...


Modeling Of Cloud-Based Digital Twins For Smart Manufacturing With Mt Connect, Liwen Hu, Ngoc-Tu Nguyen, Wenjin Tao, Ming-Chuan Leu, Xiaoqing Frank Liu, Rakib Shahriar, S M Nahian Al Sunny 2019 Missouri University of Science and Technology

Modeling Of Cloud-Based Digital Twins For Smart Manufacturing With Mt Connect, Liwen Hu, Ngoc-Tu Nguyen, Wenjin Tao, Ming-Chuan Leu, Xiaoqing Frank Liu, Rakib Shahriar, S M Nahian Al Sunny

Ming C. Leu

The common modeling of digital twins uses an information model to describe the physical machines. The integration of digital twins into productive cyber-physical cloud manufacturing (CPCM) systems imposes strong demands such as reducing overhead and saving resources. In this paper, we develop and investigate a new method for building cloud-based digital twins (CBDT), which can be adapted to the CPCM platform. Our method helps reduce computing resources in the information processing center for efficient interactions between human users and physical machines. We introduce a knowledge resource center (KRC) built on a cloud server for information intensive applications. An information model ...


An Overview Of Cryptography (Updated Version 24 January 2019), Gary C. Kessler 2019 Embry-Riddle Aeronautical University

An Overview Of Cryptography (Updated Version 24 January 2019), Gary C. Kessler

Publications

There are many aspects to security and many applications, ranging from secure commerce and payments to private communications and protecting health care information. One essential aspect for secure communications is that of cryptography. But it is important to note that while cryptography is necessary for secure communications, it is not by itself sufficient. The reader is advised, then, that the topics covered here only describe the first of many steps necessary for better security in any number of situations.


Spectral Clustering For Electrical Phase Identification Using Advanced Metering Infrastructure Voltage Time Series, Logan Blakely 2019 Portland State University

Spectral Clustering For Electrical Phase Identification Using Advanced Metering Infrastructure Voltage Time Series, Logan Blakely

Dissertations and Theses

The increasing demand for and prevalence of distributed energy resources (DER) such as solar power, electric vehicles, and energy storage, present a unique set of challenges for integration into a legacy power grid, and accurate models of the low-voltage distribution systems are critical for accurate simulations of DER. Accurate labeling of the phase connections for each customer in a utility model is one area of grid topology that is known to have errors and has implications for the safety, efficiency, and hosting capacity of a distribution system. This research presents a methodology for the phase identification of customers solely using ...


An Evaluation Of Training Size Impact On Validation Accuracy For Optimized Convolutional Neural Networks, Jostein Barry-Straume, Adam Tschannen, Daniel W. Engels, Edward Fine 2019 Southern Methodist University

An Evaluation Of Training Size Impact On Validation Accuracy For Optimized Convolutional Neural Networks, Jostein Barry-Straume, Adam Tschannen, Daniel W. Engels, Edward Fine

SMU Data Science Review

In this paper, we present an evaluation of training size impact on validation accuracy for an optimized Convolutional Neural Network (CNN). CNNs are currently the state-of-the-art architecture for object classification tasks. We used Amazon’s machine learning ecosystem to train and test 648 models to find the optimal hyperparameters with which to apply a CNN towards the Fashion-MNIST (Mixed National Institute of Standards and Technology) dataset. We were able to realize a validation accuracy of 90% by using only 40% of the original data. We found that hidden layers appear to have had zero impact on validation accuracy, whereas the ...


Comparisons Of Performance Between Quantum And Classical Machine Learning, Christopher Havenstein, Damarcus Thomas, Swami Chandrasekaran 2019 Southern Methodist University

Comparisons Of Performance Between Quantum And Classical Machine Learning, Christopher Havenstein, Damarcus Thomas, Swami Chandrasekaran

SMU Data Science Review

In this paper, we present a performance comparison of machine learning algorithms executed on traditional and quantum computers. Quantum computing has potential of achieving incredible results for certain types of problems, and we explore if it can be applied to machine learning. First, we identified quantum machine learning algorithms with reproducible code and had classical machine learning counterparts. Then, we found relevant data sets with which we tested the comparable quantum and classical machine learning algorithm's performance. We evaluated performance with algorithm execution time and accuracy. We found that quantum variational support vector machines in some cases had higher ...


Comparative Study Of Sentiment Analysis With Product Reviews Using Machine Learning And Lexicon-Based Approaches, Heidi Nguyen, Aravind Veluchamy, Mamadou Diop, Rashed Iqbal 2019 Southern Methodist University

Comparative Study Of Sentiment Analysis With Product Reviews Using Machine Learning And Lexicon-Based Approaches, Heidi Nguyen, Aravind Veluchamy, Mamadou Diop, Rashed Iqbal

SMU Data Science Review

In this paper, we present a comparative study of text sentiment classification models using term frequency inverse document frequency vectorization in both supervised machine learning and lexicon-based techniques. There have been multiple promising machine learning and lexicon-based techniques, but the relative goodness of each approach on specific types of problems is not well understood. In order to offer researchers comprehensive insights, we compare a total of six algorithms to each other. The three machine learning algorithms are: Logistic Regression (LR), Support Vector Machine (SVM), and Gradient Boosting. The three lexicon-based algorithms are: Valence Aware Dictionary and Sentiment Reasoner (VADER), Pattern ...


Improving Vix Futures Forecasts Using Machine Learning Methods, James Hosker, Slobodan Djurdjevic, Hieu Nguyen, Robert Slater 2019 Southern Methodist University

Improving Vix Futures Forecasts Using Machine Learning Methods, James Hosker, Slobodan Djurdjevic, Hieu Nguyen, Robert Slater

SMU Data Science Review

The problem of forecasting market volatility is a difficult task for most fund managers. Volatility forecasts are used for risk management, alpha (risk) trading, and the reduction of trading friction. Improving the forecasts of future market volatility assists fund managers in adding or reducing risk in their portfolios as well as in increasing hedges to protect their portfolios in anticipation of a market sell-off event. Our analysis compares three existing financial models that forecast future market volatility using the Chicago Board Options Exchange Volatility Index (VIX) to six machine/deep learning supervised regression methods. This analysis determines which models provide ...


Improving Gas Well Economics With Intelligent Plunger Lift Optimization Techniques, Atsu Atakpa, Emmanuel Farrugia, Ryan Tyree, Daniel W. Engels, Charles Sparks 2019 Southern Methodist University

Improving Gas Well Economics With Intelligent Plunger Lift Optimization Techniques, Atsu Atakpa, Emmanuel Farrugia, Ryan Tyree, Daniel W. Engels, Charles Sparks

SMU Data Science Review

In this paper, we present an approach to reducing bottom hole plunger dwell time for artificial lift systems. Lift systems are used in a process to remove contaminants from a natural gas well. A plunger is a mechanical device used to deliquefy natural gas wells by removing contaminants in the form of water, oil, wax, and sand from the wellbore. These contaminants decrease bottom-hole pressure which in turn hampers gas production by forming a physical barrier within the well tubing. As the plunger descends through the well it emits sounds which are recorded at the surface by an echo-meter that ...


Analyzing Neuronal Dendritic Trees With Convolutional Neural Networks, Olivier Trottier, Jonathon Howard 2019 Yale University

Analyzing Neuronal Dendritic Trees With Convolutional Neural Networks, Olivier Trottier, Jonathon Howard

Yale Day of Data

In the biological sciences, image analysis software are used to detect, segment or classify a variety of features encountered in living matter. However, the algorithms that accomplish these tasks are often designed for a specific dataset, making them hardly portable to accomplish the same tasks on images of different biological structures. Recently, convolutional neural networks have been used to perform complex image analysis on a multitude of datasets. While applications of these networks abound in the technology industry and computer science, use cases are not as common in the academic sciences. Motivated by the generalizability of neural networks, we aim ...


Computer Organization With Mips, Seth D. Bergmann 2019 Rowan University

Computer Organization With Mips, Seth D. Bergmann

Open Educational Resources

This book is intended to be used for a first course in computer organization, or computer architecture. It assumes that all digital components can be constructed from fundamental logic gates. The book begins with number representation schemes and assembly language for the MIPS architecture, including assembler directives, pseudo-operations, and floating point instructions. It then describes the machine language instruction formats, and shows the student how to translate an assembly language program to machine language. This is followed by a chapter which describes how to construct an assembler for MIPS. This chapter may be omitted without loss of continuity. This is ...


A Comparative Evaluation Of Recommender Systems For Hotel Reviews, Ryan Khaleghi, Kevin Cannon, Raghuram Srinivas 2019 Southern Methodist University

A Comparative Evaluation Of Recommender Systems For Hotel Reviews, Ryan Khaleghi, Kevin Cannon, Raghuram Srinivas

SMU Data Science Review

There has been increasing growth in deployment of recommender systems across Internet sites, with various models being used. These systems have been particularly valuable for review sites, as they seek to add value to the user experience to gain market share and to create new revenue streams through deals. Hotels are a prime target for this effort, as there is a large number for most destinations and a lot of differentiation between them. In this paper, we present an evaluation of two of the most popular methods for hotel review recommender systems: collaborative filtering and matrix factorization. The accuracy of ...


Social Engineering In Call Centers And Ways To Reduce It, Maureen York 2019 La Salle University

Social Engineering In Call Centers And Ways To Reduce It, Maureen York

Economic Crime Forensics Capstones

Social engineering is the use of trickery, deception, persuasion, emotional manipulation, impersonation, and abuse of trust to gain information or access through the use of a human interface (Thompson, 2006). Social engineering relies on the human behavior in order to gain information or access. The technique of social engineering can be performed in numerous ways and has been proven to be an effective way for perpetrators to obtain valuable information.

This capstone project, I will focus on social engineering of call centers and the steps organizations can take to reduce it. For most organizations, the call centers or customer support ...


Development Of A Personal Logbook Android Application, John Byrnes 2019 La Salle University

Development Of A Personal Logbook Android Application, John Byrnes

Economic Crime Forensics Capstones

Development of a mobile app to keep up with animal information.


The Benefits Of Artificial Intelligence In Cybersecurity, Ricardo Calderon 2019 La Salle University

The Benefits Of Artificial Intelligence In Cybersecurity, Ricardo Calderon

Economic Crime Forensics Capstones

Cyberthreats have increased extensively during the last decade. Cybercriminals have become more sophisticated. Current security controls are not enough to defend networks from the number of highly skilled cybercriminals. Cybercriminals have learned how to evade the most sophisticated tools, such as Intrusion Detection and Prevention Systems (IDPS), and botnets are almost invisible to current tools. Fortunately, the application of Artificial Intelligence (AI) may increase the detection rate of IDPS systems, and Machine Learning (ML) techniques are able to mine data to detect botnets’ sources. However, the implementation of AI may bring other risks, and cybersecurity experts need to find a ...


Accepting Blockchain Tech To Increase Bitcoin Acceptance, Oscar Nawrot 2019 La Salle University

Accepting Blockchain Tech To Increase Bitcoin Acceptance, Oscar Nawrot

Economic Crime Forensics Capstones

Cryptocurrencies, with Bitcoin leading the charge, are the beginning of something new because this ideology is attempting to change the way people store and use money - led by an influx of technological innovation and success. If executed accordingly, blockchain has the chance to completely change our world for the better. With Bitcoin being driven by advanced blockchain technology, this digital currency has the ability to decentralize one of the most important aspects of life - money. This in turn would allow for people to take direct control of their money without the need for being completely dependent on bank systems and ...


Lowering Legal Barriers To Rpki Adoption, Christopher S. Yoo, David A. Wishnick 2019 University of Pennsylvania Law School

Lowering Legal Barriers To Rpki Adoption, Christopher S. Yoo, David A. Wishnick

Faculty Scholarship at Penn Law

Across the Internet, mistaken and malicious routing announcements impose significant costs on users and network operators. To make routing announcements more reliable and secure, Internet coordination bodies have encouraged network operators to adopt the Resource Public Key Infrastructure (“RPKI”) framework. Despite this encouragement, RPKI’s adoption rates are low, especially in North America.

This report presents the results of a year-long investigation into the hypothesis—widespread within the network operator community—that legal issues pose barriers to RPKI adoption and are one cause of the disparities between North America and other regions of the world. On the basis of interviews ...


Automated Trading Systems Statistical And Machine Learning Methods And Hardware Implementation: A Survey, Boming Huang, Yuziang Huan, Li Da Xu, Lirong Zheng, Zhuo Zou 2019 Old Dominion University

Automated Trading Systems Statistical And Machine Learning Methods And Hardware Implementation: A Survey, Boming Huang, Yuziang Huan, Li Da Xu, Lirong Zheng, Zhuo Zou

Information Technology & Decision Sciences Faculty Publications

Automated trading, which is also known as algorithmic trading, is a method of using a predesigned computer program to submit a large number of trading orders to an exchange. It is substantially a real-time decision-making system which is under the scope of Enterprise Information System (EIS). With the rapid development of telecommunication and computer technology, the mechanisms underlying automated trading systems have become increasingly diversified. Considerable effort has been exerted by both academia and trading firms towards mining potential factors that may generate significantly higher profits. In this paper, we review studies on trading systems built using various methods and ...


Digital Commons powered by bepress