Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

56,656 Full-Text Articles 74,064 Authors 23,183,657 Downloads 378 Institutions

All Articles in Computer Sciences

Faceted Search

56,656 full-text articles. Page 381 of 2069.

A Deep Recurrent Neural Network With Iterative Optimization For Inverse Image Processing Applications, Masaki Ikuta 2021 University of Wisconsin-Milwaukee

A Deep Recurrent Neural Network With Iterative Optimization For Inverse Image Processing Applications, Masaki Ikuta

Theses and Dissertations

Many algorithms and methods have been proposed for inverse image processing applications, such as super-resolution, image de-noising, and image reconstruction, particularly with the recent surge of interest in machine learning and deep learning methods.

As for Computed Tomography (CT) image reconstruction, the most recently proposed methods are limited to image domain processing, where deep learning is used to learn the mapping between a true image data set and a noisy image data set in the image domain. While deep learning-based methods can produce higher quality images than conventional model-based algorithms, these methods have a limitation. Deep learning-based methods used in …


Component Damage Source Identification For Critical Infrastructure Systems, Nathan Davis 2021 University of Arkansas, Fayetteville

Component Damage Source Identification For Critical Infrastructure Systems, Nathan Davis

Graduate Theses and Dissertations

Cyber-Physical Systems (CPS) are becoming increasingly prevalent for both Critical Infrastructure and the Industry 4.0 initiative. Bad values within components of the software portion of CPS, or the computer systems, have the potential to cause major damage if left unchecked, and so detection and locating of where these occur is vital. We further define features of these computer systems and create a use-based system topology. We then introduce a function to monitor system integrity and the presence of bad values as well as an algorithm to locate them. We then show an improved version, taking advantage of several system properties …


Privacy-Aware And Hardware-Based Accleration Authentication Scheme For Internet Of Drones, Tom Henson 2021 The University of Southern Mississippi

Privacy-Aware And Hardware-Based Accleration Authentication Scheme For Internet Of Drones, Tom Henson

Master's Theses

Drones are becoming increasingly present into today’s society through many different means such as outdoor sports, surveillance, delivery of goods etc. With such a rapid increase, a means of control and monitoring is needed as the drones become more interconnected and readily available. Thus, the idea of Internet of drones (IoD) is formed, an infrastructure in place to do those types of things. However, without an authentication system in place anyone could gain access or control to real time data to multiple drones within an area. This is a problem that I choose to tackle using a Field Programmable Gate …


An Analysis Of Significant Cyber Incidents And The Impact On The Past, Present, And Future, Seth E. Smith 2021 Old Dominion University

An Analysis Of Significant Cyber Incidents And The Impact On The Past, Present, And Future, Seth E. Smith

Cybersecurity Undergraduate Research Showcase

This report discusses data collected on significant cybersecurity incidents from the early 2000s to present. The first part of the report addresses previously discussed information, data, and literature (e.g. case studies), pertinent to cybersecurity incidents. The findings from this study are framed by scholarly sources and information from the Federal Bureau of Investigation, a number of notable universities, and literature online, of which all support information discussed within this report. The second part of the report discusses data compiled upon analyzing significant cyber incidents and events from the Center for Strategic and International Affairs (CSIS). Finally, the last portion of …


Material Handling With Embodied Loco-Manipulation, Jean Chagas Vaz 2021 University of Nevada, Las Vegas

Material Handling With Embodied Loco-Manipulation, Jean Chagas Vaz

UNLV Theses, Dissertations, Professional Papers, and Capstones

Material handling is an intrinsic component of disaster response. Typically, first responders, such as firefighters and/or paramedics, must carry, push, pull, and handle objects, facilitating the transportation of goods. For many years, researchers from around the globe have sought to enable full-sized humanoid robots to perform such essential material handling tasks. This work aims to tackle current limitations of humanoids in the realm of interaction with common objects such as carts, wheelbarrows, etc. Throughout this research, many methods will be applied to ensure a stable Zero Moment Point (ZMP) trajectory to allow a robust gait while loco-manipulating a cart. The …


Machine Learning Analysis Of Single Nucleotide Polymorphism (Snp) Data To Predict Bone Mineral Density In African American Women, Erick Githua Wakayu 2021 University of Nevada, Las Vegas

Machine Learning Analysis Of Single Nucleotide Polymorphism (Snp) Data To Predict Bone Mineral Density In African American Women, Erick Githua Wakayu

UNLV Theses, Dissertations, Professional Papers, and Capstones

Osteoporosis is a debilitating disease in which an individual’s bones weaken, making bones fragile and more susceptible to fracture. While commonly found amongst postmenopausal Caucasian and Asian women based on previous studies, those of African descent (African American/Black) have largely been ignored when it comes to osteoporotic studies, especially when it comes to Genome Wide Association Studies (GWAS). From GWA studies, we gain access to single nucleotide poly-morphisms (SNPs) that may contribute to certain illnesses, such as osteoporosis. With low Bone Mineral Density (BMD) being one of the primary markers of potential osteoporosis, it is prudent that proper research is …


Electronic Evidence Locker: An Ontology For Electronic Evidence, Daniel Smith 2021 East Tennessee State University

Electronic Evidence Locker: An Ontology For Electronic Evidence, Daniel Smith

Electronic Theses and Dissertations

With the rapid growth of crime data, overwhelming amounts of electronic evidence need to be stored and shared with the relevant agencies. Without addressing this challenge, the sharing of crime data and electronic evidence will be highly inefficient, and the resource requirements for this task will continue to increase. Relational database solutions face size limitations in storing larger amounts of crime data where each instance has unique attributes with unstructured nature.

In this thesis, the Electronic Evidence Locker (EEL) was proposed and developed to address such problems. The EEL was built using a NoSQL database and a C# website for …


Integration Of Information Technology Certifications Into Undergraduate Computing Curriculum, Eng Lieh OUH, Kyong Jin SHIM 2021 Singapore Management University

Integration Of Information Technology Certifications Into Undergraduate Computing Curriculum, Eng Lieh Ouh, Kyong Jin Shim

Research Collection School Of Computing and Information Systems

This innovative practice full paper describes our experiences of integrating information technology certifications into an undergraduate computing curriculum. As the technology landscape evolves, a common challenge for educators in computing programs is designing an industry-relevant curriculum. Over the years, industry practitioners have taken technology certifications to validate themselves against a base level of technical knowledge currently in demand in industry. Information technology (IT) certifications can also offer paths for academic computing programs to stay relevant to industry needs. However, identifying relevant IT certifications and integrating it into an academic curriculum requires a careful design approach as substantial efforts are needed …


On Analysing Student Resilience In Higher Education Programs Using A Data-Driven Approach, Audrey Tedja WIDJAJA, Ee-Peng LIM, Aldy GUNAWAN 2021 Singapore Management University

On Analysing Student Resilience In Higher Education Programs Using A Data-Driven Approach, Audrey Tedja Widjaja, Ee-Peng Lim, Aldy Gunawan

Research Collection School Of Computing and Information Systems

Analysing student resilience is important as research has shown that resilience is related to students’ academic performance and their persistence through academic setbacks. While questionnaires can be conducted to assess student resilience directly, they suffer from human recall errors and deliberate suppression of true responses. In this paper, we propose ACREA, ACademic REsilience Analytics framework which adopts a data-driven approach to analyse student resilient behavior with the use of student-course data. ACREA defines academic setbacks experienced by students and measures how well students overcome such setbacks using a quasi-experimental design. By applying ACREA on a real world student-course dataset, we …


Modelling Customers Credit Card Behaviour Using Bidirectional Lstm Neural Networks, Maher Ala’raj, Maysam F. Abbod, Munir Majdalawieh 2021 Zayed University

Modelling Customers Credit Card Behaviour Using Bidirectional Lstm Neural Networks, Maher Ala’Raj, Maysam F. Abbod, Munir Majdalawieh

All Works

With the rapid growth of consumer credit and the huge amount of financial data developing effective credit scoring models is very crucial. Researchers have developed complex credit scoring models using statistical and artificial intelligence (AI) techniques to help banks and financial institutions to support their financial decisions. Neural networks are considered as a mostly wide used technique in finance and business applications. Thus, the main aim of this paper is to help bank management in scoring credit card clients using machine learning by modelling and predicting the consumer behaviour with respect to two aspects: the probability of single and consecutive …


Hybrid Feature Selection Approach To Identify Optimal Features Of Profile Metadata To Detect Social Bots In Twitter, Eiman Alothali, Kadhim Hayawi, Hany Alashwal 2021 United Arab Emirates University

Hybrid Feature Selection Approach To Identify Optimal Features Of Profile Metadata To Detect Social Bots In Twitter, Eiman Alothali, Kadhim Hayawi, Hany Alashwal

All Works

The last few years have revealed that social bots in social networks have become more sophisticated in design as they adapt their features to avoid detection systems. The deceptive nature of bots to mimic human users is due to the advancement of artificial intelligence and chatbots, where these bots learn and adjust very quickly. Therefore, finding the optimal features needed to detect them is an area for further investigation. In this paper, we propose a hybrid feature selection (FS) method to evaluate profile metadata features to find these optimal features, which are evaluated using random forest, naïve Bayes, support vector …


Estimation And Interpretation Of Machine Learning Models With Customized Surrogate Model, Mudabbir Ali, Asad Masood Khattak, Zain Ali, Bashir Hayat, Muhammad Idrees, Zeeshan Pervez, Kashif Rizwan, Tae Eung Sung, Ki Il Kim 2021 COMSATS University Islamabad

Estimation And Interpretation Of Machine Learning Models With Customized Surrogate Model, Mudabbir Ali, Asad Masood Khattak, Zain Ali, Bashir Hayat, Muhammad Idrees, Zeeshan Pervez, Kashif Rizwan, Tae Eung Sung, Ki Il Kim

All Works

Machine learning has the potential to predict unseen data and thus improve the productivity and processes of daily life activities. Notwithstanding its adaptiveness, several sensitive applications based on such technology cannot compromise our trust in them; thus, highly accurate machine learning models require reason. Such models are black boxes for end-users. Therefore, the concept of interpretability plays the role if assisting users in a couple of ways. Interpretable models are models that possess the quality of explaining predictions. Different strategies have been proposed for the aforementioned concept but some of these require an excessive amount of effort, lack generalization, are …


Neurolkh: Combining Deep Learning Model With Lin-Kernighan-Helsgaun Heuristic For Solving The Traveling Salesman Problem, Liang XIN, Wen SONG, Zhiguang CAO, Jie ZHANG 2021 Singapore Management University

Neurolkh: Combining Deep Learning Model With Lin-Kernighan-Helsgaun Heuristic For Solving The Traveling Salesman Problem, Liang Xin, Wen Song, Zhiguang Cao, Jie Zhang

Research Collection School Of Computing and Information Systems

We present NeuroLKH, a novel algorithm that combines deep learning with the strong traditional heuristic Lin-Kernighan-Helsgaun (LKH) for solving Traveling Salesman Problem. Specifically, we train a Sparse Graph Network (SGN) with supervised learning for edge scores and unsupervised learning for node penalties, both of which are critical for improving the performance of LKH. Based on the output of SGN, NeuroLKH creates the edge candidate set and transforms edge distances to guide the searching process of LKH. Extensive experiments firmly demonstrate that, by training one model on a wide range of problem sizes, NeuroLKH significantly outperforms LKH and generalizes well to …


Learning To Iteratively Solve Routing Problems With Dual-Aspect Collaborative Transformer, Yining MA, Jingwen LI, Zhiguang CAO, Wen SONG, Le ZHANG, Zhenghua CHEN, Jing TANG 2021 Singapore Management University

Learning To Iteratively Solve Routing Problems With Dual-Aspect Collaborative Transformer, Yining Ma, Jingwen Li, Zhiguang Cao, Wen Song, Le Zhang, Zhenghua Chen, Jing Tang

Research Collection School Of Computing and Information Systems

Recently, Transformer has become a prevailing deep architecture for solving vehicle routing problems (VRPs). However, it is less effective in learning improvement models for VRP because its positional encoding (PE) method is not suitable in representing VRP solutions. This paper presents a novel Dual-Aspect Collaborative Transformer (DACT) to learn embeddings for the node and positional features separately, instead of fusing them together as done in existing ones, so as to avoid potential noises and incompatible correlations. Moreover, the positional features are embedded through a novel cyclic positional encoding (CPE) method to allow Transformer to effectively capture the circularity and symmetry …


Fair And Diverse Group Formation Based On Multidimensional Features, Mohammed Saad A Alqahtani 2021 University of Arkansas, Fayetteville

Fair And Diverse Group Formation Based On Multidimensional Features, Mohammed Saad A Alqahtani

Graduate Theses and Dissertations

The goal of group formation is to build a team to accomplish a specific task. Algorithms are being developed to improve the team's effectiveness so formed and the efficiency of the group selection process. However, there is concern that team formation algorithms could be biased against minorities due to the algorithms themselves or the data on which they are trained. Hence, it is essential to build fair team formation systems that incorporate demographic information into the process of building the group. Although there has been extensive work on modeling individuals’ expertise for expert recommendation and/or team formation, there has been …


Risk-Based Machine Learning Approaches For Probabilistic Transient Stability, Umair Shahzad 2021 University of Nebraska-Lincoln

Risk-Based Machine Learning Approaches For Probabilistic Transient Stability, Umair Shahzad

Department of Electrical and Computer Engineering: Dissertations, Theses, and Student Research

Power systems are getting more complex than ever and are consequently operating close to their limit of stability. Moreover, with the increasing demand of renewable wind generation, and the requirement to maintain a secure power system, the importance of transient stability cannot be overestimated. Considering its significance in power system security, it is important to propose a different approach for enhancing the transient stability, considering uncertainties. Current deterministic industry practices of transient stability assessment ignore the probabilistic nature of variables (fault type, fault location, fault clearing time, etc.). These approaches typically provide a conservative criterion and can result in expensive …


Comparative Analysis Of Kmer Counting And Estimation Tools, Ankitha Vejandla 2021 University of Nebraska - Lincoln

Comparative Analysis Of Kmer Counting And Estimation Tools, Ankitha Vejandla

Department of Computer Science and Engineering: Dissertations, Theses, and Student Research

The rapid development of next-generation sequencing (NGS) technologies for determining the sequence of DNA has revolutionized genome research in recent years. De novo assemblers are the most commonly used tools to perform genome assembly. Most of the assemblers use de Bruijn graphs that break the sequenced reads into smaller sequences (sub-strings), called kmers, where k denotes the length of the sub-strings. The kmer counting and analysis of kmer frequency distribution are important in genome assembly. The main goal of this research is to provide a detailed analysis of the performance of different kmer counting and estimation tools that are currently …


Agent Based Modeling Of The Spread Of Social Unrest Based On Infectious Disease Spread Model, Anup Adhikari 2021 University of Nebraska-Lincoln

Agent Based Modeling Of The Spread Of Social Unrest Based On Infectious Disease Spread Model, Anup Adhikari

Department of Computer Science and Engineering: Dissertations, Theses, and Student Research

Social unrest activities are the tools for people to show dissatisfaction, and often people are motivated by similar unrest activities in another region. This causes a spread of unrest activities across space and time. In this thesis, we model the spread of social unrest across time and space. The underlying novel methodology is to model the regions as agents that transition from one state to another based on changes in their environment. The methodology involves (1) creating a region vector for each agent based on socio-demographic, cultural, economic, infrastructural, geographic, and environmental (SCEIGE) factors, (2) formulating neighborhood distance function to …


Explainable Transfer-Learning And Knowledge Distillation For Fast And Accurate Head-Pose Estimation, Nima Aghli 2021 Florida Institute of Technology

Explainable Transfer-Learning And Knowledge Distillation For Fast And Accurate Head-Pose Estimation, Nima Aghli

Theses and Dissertations

Head-pose estimation from facial images is an important research topic in computer-vision. It has many applications in detecting the focus of attention, monitoring driver behavior, and human-computer interaction. As with other computer-vision topics, recent research on head-pose estimation has been focused on using deep convolutional neural networks (CNNs). Although deeper networks improve prediction accuracy, they suffer from dependency on expensive hardware such as GPUs to perform real-time inference. As a result, CNN model compression becomes an important concept. In this work, we propose a novel CNN compression method by combing weight pruning and knowledge distillation. Additionally, we improve the state-of-the-art …


An Assessment Of Image-Cloaking Techniques Against Automated Face Recognition For Biometric Privacy, Brandon Scott Ledford 2021 Florida Institute of Technology

An Assessment Of Image-Cloaking Techniques Against Automated Face Recognition For Biometric Privacy, Brandon Scott Ledford

Theses and Dissertations

Over the past two decades, Americans have aggressively increased the amount of facial data uploaded to the internet primarily via social media. This data is largely unprotected due to the dire lack of existing regulations protecting users from large scale face recognition in the United States, where the value of data trade is in the tens of billions. In its current state, facial privacy in the United States depends on American corporations opting not to collect the public data, an option rarely chosen. Much research has been done in the area of suppressing recognition abilities, giving users the ability to …


Digital Commons powered by bepress