Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

32,677 Full-Text Articles 32,650 Authors 10,216,521 Downloads 300 Institutions

All Articles in Computer Sciences

Faceted Search

32,677 full-text articles. Page 9 of 956.

Online Sharing Of Documents: The Mobile Office, Rebecca Sulyma, Sanjay Ram, Steven C. Hatch 2019 University of Massachusetts Medical School

Online Sharing Of Documents: The Mobile Office, Rebecca Sulyma, Sanjay Ram, Steven C. Hatch

PEER Liberia Project

This presentation provides an overview of cloud-based office programs, cloud computing, and filesharing, covering products such as Google docs, Microsoft Office, OneDrive, and Dropbox.


Understanding Open Ports In Android Applications: Discovery, Diagnosis, And Security Assessment, Daoyuan WU, Debin GAO, Rocky K. C. CHANG, En HE, Eric K. T. CHENG, Robert H. DENG 2019 Singapore Management University

Understanding Open Ports In Android Applications: Discovery, Diagnosis, And Security Assessment, Daoyuan Wu, Debin Gao, Rocky K. C. Chang, En He, Eric K. T. Cheng, Robert H. Deng

Research Collection School Of Information Systems

Open TCP/UDP ports are traditionally used by servers to provide application services, but they are also found in many Android apps. In this paper, we present the first open-port analysis pipeline, covering the discovery, diagnosis, and security assessment, to systematically understand open ports in Android apps and their threats. We design and deploy a novel on-device crowdsourcing app and its server-side analytic engine to continuously monitor open ports in the wild. Over a period of ten months, we have collected over 40 million port monitoring records from 3,293 users in 136 countries worldwide, which allow us to observe ...


Cryptocurrency Mining On Mobile As An Alternative Monetization Approach, Nguyen Phan Sinh HUYNH, Kenny CHOO, Rajesh Krishna BALAN, Youngki LEE 2019 Singapore Management University

Cryptocurrency Mining On Mobile As An Alternative Monetization Approach, Nguyen Phan Sinh Huynh, Kenny Choo, Rajesh Krishna Balan, Youngki Lee

Research Collection School Of Information Systems

Can cryptocurrency mining (crypto-mining) be a practical ad-free monetization approach for mobile app developers? We conducted a lab experiment and a user study with 228 real Android users to investigate different aspects of mobile crypto-mining. In particular, we show that mobile devices have computational resources to spare and that these can be utilized for crypto-mining with minimal impact on the mobile user experience. We also examined the profitability of mobile crypto-mining and its stability as compared to mobile advertising. In many cases, the profit of mining can exceed mobile advertising's. Most importantly, our study shows that the majority (72 ...


Adaptive Cost-Sensitive Online Classification, Peilin ZHAO, Yifan ZHANG, Min WU, Steven C. H. HOI, Mingkui TAN, Junzhou HUANG 2019 Singapore Management University

Adaptive Cost-Sensitive Online Classification, Peilin Zhao, Yifan Zhang, Min Wu, Steven C. H. Hoi, Mingkui Tan, Junzhou Huang

Research Collection School Of Information Systems

Cost-Sensitive Online Classification has drawn extensive attention in recent years, where the main approach is to directly online optimize two well-known cost-sensitive metrics: (i) weighted sum of sensitivity and specificity; (ii) weighted misclassification cost. However, previous existing methods only considered first-order information of data stream. It is insufficient in practice, since many recent studies have proved that incorporating second-order information enhances the prediction performance of classification models. Thus, we propose a family of cost-sensitive online classification algorithms with adaptive regularization in this paper. We theoretically analyze the proposed algorithms and empirically validate their effectiveness and properties in extensive experiments. Then ...


Bots In Libraries: They're Coming For Your Jobs (Or Is It?), Salihin MOHAMMED ALI 2019 Singapore Management University

Bots In Libraries: They're Coming For Your Jobs (Or Is It?), Salihin Mohammed Ali

Research Collection Library

With advancements in Artificial Intelligence (AI) and Machine Learning (ML), we have seen a rise in the use of bots, specifically chatbots, to deliver information services. Motivated by the Smart Nation programme, these chatbots have sprung up in sectors as transport, healthcare, banking and education in Singapore. What are these chatbots? How do they work? Will they take our jobs?SMU Libraries tries to answer these questions by delving into the mechanics of creating chatbots. The proof-of-concept aims to find out and understand use cases where these bots can be useful to delivering library information services to its campus community.


Mitchell, M. (2019). Artificial Intelligence Hits The Barrier Of Meaning. Information, 10(2), 51., Melanie Mitchell 2019 Portland State University

Mitchell, M. (2019). Artificial Intelligence Hits The Barrier Of Meaning. Information, 10(2), 51., Melanie Mitchell

Computer Science Faculty Publications and Presentations

Today’s AI systems sorely lack the essence of human intelligence: Understanding the situations we experience, being able to grasp their meaning. The lack of humanlike understanding in machines is underscored by recent studies demonstrating lack of robustness of state-of-the-art deep-learning systems. Deeper networks and larger datasets alone are not likely to unlock AI’s “barrier of meaning”; instead the field will need to embrace its original roots as an interdisciplinary science of intelligence.


Rubik's Cube: A Visual And Tactile Learning Of Algorithms And Patterns, Lawrence Muller 2019 CUNY La Guardia Community College

Rubik's Cube: A Visual And Tactile Learning Of Algorithms And Patterns, Lawrence Muller

Open Educational Resources

This is a classroom activity report on teaching algorithms as part of a second course in computer programming. Teaching an algorithm in an introductory level programming class is often a dry task for the instructor and the rewards for the student are abstract. To make the learning of algorithms and software more rewarding, this assignment employs a Rubik’s cube.


Extending Set Functors To Generalised Metric Spaces, Adriana Balan, Alexander Kurz, Jiří Velebil 2019 University Politehnica of Bucharest

Extending Set Functors To Generalised Metric Spaces, Adriana Balan, Alexander Kurz, Jiří Velebil

Mathematics, Physics, and Computer Science Faculty Articles and Research

For a commutative quantale V, the category V-cat can be perceived as a category of generalised metric spaces and non-expanding maps. We show that any type constructor T (formalised as an endofunctor on sets) can be extended in a canonical way to a type constructor TV on V-cat. The proof yields methods of explicitly calculating the extension in concrete examples, which cover well-known notions such as the Pompeiu-Hausdorff metric as well as new ones.

Conceptually, this allows us to to solve the same recursive domain equation X ≅ TX in different categories (such as sets and metric spaces) and we ...


Energy Efficiency And Renewable Energy Management With Multi-State Power-Down Systems, James Andro-Vasko, Wolfgang W. Bein, Hiro Ito 2019 University of Nevada, Las Vegas

Energy Efficiency And Renewable Energy Management With Multi-State Power-Down Systems, James Andro-Vasko, Wolfgang W. Bein, Hiro Ito

Computer Science Faculty Publications

A power-down system has an on-state, an off-state, and a finite or infinite number of intermediate states. In the off-state, the system uses no energy and in the on-state energy it is used fully. Intermediate states consume only some fraction of energy but switching back to the on-state comes at a cost. Previous work has mainly focused on asymptotic results for systems with a large number of states. In contrast, the authors study problems with a few states as well as systems with one continuous state. Such systems play a role in energy-efficiency for information technology but are especially important ...


An Internet Based Intelligent Argumentation System For Collaborative Engineering Design, Xiaoqing Frank Liu, Samir Raorane, Man Zheng, Ming-Chuan Leu 2019 Missouri University of Science and Technology

An Internet Based Intelligent Argumentation System For Collaborative Engineering Design, Xiaoqing Frank Liu, Samir Raorane, Man Zheng, Ming-Chuan Leu

Ming C. Leu

Modern product design is a very complicated process which involves groups of designers, manufacturers, suppliers, and customer representatives. Conflicts are unavoidable in collaboration among multiple stakeholders, who have different objectives, requirements, and priorities. Unfortunately, current web-based collaborative engineering design systems do not support collaborative conflict resolution. In this paper, we will develop an intelligent computational argumentation model to enable management of a large scale argumentation network, and resolution of conflicts based on argumentation from many participants. A web-based intelligent argumentation tool is developed as a part of a web-based collaborative engineering design system based on the above model to resolve ...


Modeling Of Cloud-Based Digital Twins For Smart Manufacturing With Mt Connect, Liwen Hu, Ngoc-Tu Nguyen, Wenjin Tao, Ming-Chuan Leu, Xiaoqing Frank Liu, Rakib Shahriar, S M Nahian Al Sunny 2019 Missouri University of Science and Technology

Modeling Of Cloud-Based Digital Twins For Smart Manufacturing With Mt Connect, Liwen Hu, Ngoc-Tu Nguyen, Wenjin Tao, Ming-Chuan Leu, Xiaoqing Frank Liu, Rakib Shahriar, S M Nahian Al Sunny

Ming C. Leu

The common modeling of digital twins uses an information model to describe the physical machines. The integration of digital twins into productive cyber-physical cloud manufacturing (CPCM) systems imposes strong demands such as reducing overhead and saving resources. In this paper, we develop and investigate a new method for building cloud-based digital twins (CBDT), which can be adapted to the CPCM platform. Our method helps reduce computing resources in the information processing center for efficient interactions between human users and physical machines. We introduce a knowledge resource center (KRC) built on a cloud server for information intensive applications. An information model ...


An Overview Of Cryptography (Updated Version 24 January 2019), Gary C. Kessler 2019 Embry-Riddle Aeronautical University

An Overview Of Cryptography (Updated Version 24 January 2019), Gary C. Kessler

Publications

There are many aspects to security and many applications, ranging from secure commerce and payments to private communications and protecting health care information. One essential aspect for secure communications is that of cryptography. But it is important to note that while cryptography is necessary for secure communications, it is not by itself sufficient. The reader is advised, then, that the topics covered here only describe the first of many steps necessary for better security in any number of situations.


Spectral Clustering For Electrical Phase Identification Using Advanced Metering Infrastructure Voltage Time Series, Logan Blakely 2019 Portland State University

Spectral Clustering For Electrical Phase Identification Using Advanced Metering Infrastructure Voltage Time Series, Logan Blakely

Dissertations and Theses

The increasing demand for and prevalence of distributed energy resources (DER) such as solar power, electric vehicles, and energy storage, present a unique set of challenges for integration into a legacy power grid, and accurate models of the low-voltage distribution systems are critical for accurate simulations of DER. Accurate labeling of the phase connections for each customer in a utility model is one area of grid topology that is known to have errors and has implications for the safety, efficiency, and hosting capacity of a distribution system. This research presents a methodology for the phase identification of customers solely using ...


An Evaluation Of Training Size Impact On Validation Accuracy For Optimized Convolutional Neural Networks, Jostein Barry-Straume, Adam Tschannen, Daniel W. Engels, Edward Fine 2019 Southern Methodist University

An Evaluation Of Training Size Impact On Validation Accuracy For Optimized Convolutional Neural Networks, Jostein Barry-Straume, Adam Tschannen, Daniel W. Engels, Edward Fine

SMU Data Science Review

In this paper, we present an evaluation of training size impact on validation accuracy for an optimized Convolutional Neural Network (CNN). CNNs are currently the state-of-the-art architecture for object classification tasks. We used Amazon’s machine learning ecosystem to train and test 648 models to find the optimal hyperparameters with which to apply a CNN towards the Fashion-MNIST (Mixed National Institute of Standards and Technology) dataset. We were able to realize a validation accuracy of 90% by using only 40% of the original data. We found that hidden layers appear to have had zero impact on validation accuracy, whereas the ...


Comparisons Of Performance Between Quantum And Classical Machine Learning, Christopher Havenstein, Damarcus Thomas, Swami Chandrasekaran 2019 Southern Methodist University

Comparisons Of Performance Between Quantum And Classical Machine Learning, Christopher Havenstein, Damarcus Thomas, Swami Chandrasekaran

SMU Data Science Review

In this paper, we present a performance comparison of machine learning algorithms executed on traditional and quantum computers. Quantum computing has potential of achieving incredible results for certain types of problems, and we explore if it can be applied to machine learning. First, we identified quantum machine learning algorithms with reproducible code and had classical machine learning counterparts. Then, we found relevant data sets with which we tested the comparable quantum and classical machine learning algorithm's performance. We evaluated performance with algorithm execution time and accuracy. We found that quantum variational support vector machines in some cases had higher ...


Comparative Study Of Sentiment Analysis With Product Reviews Using Machine Learning And Lexicon-Based Approaches, Heidi Nguyen, Aravind Veluchamy, Mamadou Diop, Rashed Iqbal 2019 Southern Methodist University

Comparative Study Of Sentiment Analysis With Product Reviews Using Machine Learning And Lexicon-Based Approaches, Heidi Nguyen, Aravind Veluchamy, Mamadou Diop, Rashed Iqbal

SMU Data Science Review

In this paper, we present a comparative study of text sentiment classification models using term frequency inverse document frequency vectorization in both supervised machine learning and lexicon-based techniques. There have been multiple promising machine learning and lexicon-based techniques, but the relative goodness of each approach on specific types of problems is not well understood. In order to offer researchers comprehensive insights, we compare a total of six algorithms to each other. The three machine learning algorithms are: Logistic Regression (LR), Support Vector Machine (SVM), and Gradient Boosting. The three lexicon-based algorithms are: Valence Aware Dictionary and Sentiment Reasoner (VADER), Pattern ...


Improving Vix Futures Forecasts Using Machine Learning Methods, James Hosker, Slobodan Djurdjevic, Hieu Nguyen, Robert Slater 2019 Southern Methodist University

Improving Vix Futures Forecasts Using Machine Learning Methods, James Hosker, Slobodan Djurdjevic, Hieu Nguyen, Robert Slater

SMU Data Science Review

The problem of forecasting market volatility is a difficult task for most fund managers. Volatility forecasts are used for risk management, alpha (risk) trading, and the reduction of trading friction. Improving the forecasts of future market volatility assists fund managers in adding or reducing risk in their portfolios as well as in increasing hedges to protect their portfolios in anticipation of a market sell-off event. Our analysis compares three existing financial models that forecast future market volatility using the Chicago Board Options Exchange Volatility Index (VIX) to six machine/deep learning supervised regression methods. This analysis determines which models provide ...


Improving Gas Well Economics With Intelligent Plunger Lift Optimization Techniques, Atsu Atakpa, Emmanuel Farrugia, Ryan Tyree, Daniel W. Engels, Charles Sparks 2019 Southern Methodist University

Improving Gas Well Economics With Intelligent Plunger Lift Optimization Techniques, Atsu Atakpa, Emmanuel Farrugia, Ryan Tyree, Daniel W. Engels, Charles Sparks

SMU Data Science Review

In this paper, we present an approach to reducing bottom hole plunger dwell time for artificial lift systems. Lift systems are used in a process to remove contaminants from a natural gas well. A plunger is a mechanical device used to deliquefy natural gas wells by removing contaminants in the form of water, oil, wax, and sand from the wellbore. These contaminants decrease bottom-hole pressure which in turn hampers gas production by forming a physical barrier within the well tubing. As the plunger descends through the well it emits sounds which are recorded at the surface by an echo-meter that ...


Analyzing Neuronal Dendritic Trees With Convolutional Neural Networks, Olivier Trottier, Jonathon Howard 2019 Yale University

Analyzing Neuronal Dendritic Trees With Convolutional Neural Networks, Olivier Trottier, Jonathon Howard

Yale Day of Data

In the biological sciences, image analysis software are used to detect, segment or classify a variety of features encountered in living matter. However, the algorithms that accomplish these tasks are often designed for a specific dataset, making them hardly portable to accomplish the same tasks on images of different biological structures. Recently, convolutional neural networks have been used to perform complex image analysis on a multitude of datasets. While applications of these networks abound in the technology industry and computer science, use cases are not as common in the academic sciences. Motivated by the generalizability of neural networks, we aim ...


Computer Organization With Mips, Seth D. Bergmann 2019 Rowan University

Computer Organization With Mips, Seth D. Bergmann

Open Educational Resources

This book is intended to be used for a first course in computer organization, or computer architecture. It assumes that all digital components can be constructed from fundamental logic gates. The book begins with number representation schemes and assembly language for the MIPS architecture, including assembler directives, pseudo-operations, and floating point instructions. It then describes the machine language instruction formats, and shows the student how to translate an assembly language program to machine language. This is followed by a chapter which describes how to construct an assembler for MIPS. This chapter may be omitted without loss of continuity. This is ...


Digital Commons powered by bepress