Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

55,201 Full-Text Articles 71,983 Authors 23,183,657 Downloads 375 Institutions

All Articles in Computer Sciences

Faceted Search

55,201 full-text articles. Page 929 of 2009.

Constrained K-Means Clustering Validation Study, Nicholas McDaniel, Stephen Burgess, Jeremy Evert 2018 Southwestern Oklahoma State University

Constrained K-Means Clustering Validation Study, Nicholas Mcdaniel, Stephen Burgess, Jeremy Evert

Student Research

Machine Learning (ML) is a growing topic within Computer Science with applications in many fields. One open problem in ML is data separation, or data clustering. Our project is a validation study of, “Constrained K-means Clustering with Background Knowledge" by Wagstaff et. al. Our data validates the finding by Wagstaff et. al., which shows that a modified k-means clustering approach can outperform more general unsupervised learning algorithms when some domain information about the problem is available. Our data suggests that k-means clustering augmented with domain information can be a time efficient means for segmenting data sets. Our validation study focused …


Validation Study Of Image Recognition Algorithms, Jacob Miller, Jeremy Evert 2018 Southwestern Oklahoma State University

Validation Study Of Image Recognition Algorithms, Jacob Miller, Jeremy Evert

Student Research

Developments in machine learning in recent years have created opportunities that previously never existed. One such field with an explosion of opportunity is image recognition, also known as computer vision; the process in which a machine analyzes a digital image.

In order for a machine to ‘see’ as a human does, it must break down the image in a process called image segmentation. The way the machine goes about doing this is important, and many algorithms exist to determine just how a machine will decide to group the pixels in an image.

This research is a validation study of related …


Criticality Assessments For Improving Algorithmic Robustness, Thomas B. Jones 2018 University of New Mexico

Criticality Assessments For Improving Algorithmic Robustness, Thomas B. Jones

Computer Science ETDs

Though computational models typically assume all program steps execute flawlessly, that does not imply all steps are equally important if a failure should occur. In the "Constrained Reliability Allocation" problem, sufficient resources are guaranteed for operations that prompt eventual program termination on failure, but those operations that only cause output errors are given a limited budget of some vital resource, insufficient to ensure correct operation for each of them.

In this dissertation, I present a novel representation of failures based on a combination of their timing and location combined with criticality assessments---a method used to predict the behavior of systems …


An Enhanced Mobility And Temperature Aware Routing Protocol Through Multi-Criteria Decision Making Method In Wireless Body Area Networks, Beom Su Kim, Babar Shah, Feras Al-Obediat, Sana Ullah, Kyong Hoon Kim, Ki Il Kim 2018 Chungnam National University

An Enhanced Mobility And Temperature Aware Routing Protocol Through Multi-Criteria Decision Making Method In Wireless Body Area Networks, Beom Su Kim, Babar Shah, Feras Al-Obediat, Sana Ullah, Kyong Hoon Kim, Ki Il Kim

All Works

© 2018 by the authors. In wireless body area networks, temperature-aware routing plays an important role in preventing damage of surrounding body tissues caused by the temperature rise of the nodes. However, existing temperature-aware routing protocols tend to choose the next hop according to the temperature metric without considering transmission delay and data loss caused by human posture. To address this problem, multiple research efforts exploit different metrics such as temperature, hop count and link quality. Because their approaches are fundamentally based on simple computation through weighted factor for each metric, it is rarely feasible to obtain reasonable weight value …


X-Search: An Open Access Interface For Cross-Cohort Exploration Of The National Sleep Research Resource, Licong Cui, Ningzhou Zeng, Matthew Kim, Remo Mueller, Emily Ruth Hankosky, Susan Redline, Guo-Qiang Zhang 2018 University of Kentucky

X-Search: An Open Access Interface For Cross-Cohort Exploration Of The National Sleep Research Resource, Licong Cui, Ningzhou Zeng, Matthew Kim, Remo Mueller, Emily Ruth Hankosky, Susan Redline, Guo-Qiang Zhang

Computer Science Faculty Publications

Background: The National Sleep Research Resource (NSRR) is a large-scale, openly shared, data repository of de-identified, highly curated clinical sleep data from multiple NIH-funded epidemiological studies. Although many data repositories allow users to browse their content, few support fine-grained, cross-cohort query and exploration at study-subject level. We introduce a cross-cohort query and exploration system, called X-search, to enable researchers to query patient cohort counts across a growing number of completed, NIH-funded studies in NSRR and explore the feasibility or likelihood of reusing the data for research studies.

Methods: X-search has been designed as a general framework with two loosely-coupled components: …


Receiver-Initiated Handshaking Mac Based On Traffic Estimation For Underwater Sensor Networks, Yuan Dong, Lina Pu, Yu Luo, Zheng Peng, Haining Mo, Yun Meng, Yi Zhao, Yuzhi Zhang 2018 Chang'an University

Receiver-Initiated Handshaking Mac Based On Traffic Estimation For Underwater Sensor Networks, Yuan Dong, Lina Pu, Yu Luo, Zheng Peng, Haining Mo, Yun Meng, Yi Zhao, Yuzhi Zhang

Faculty Publications

In underwater sensor networks (UWSNs), the unique characteristics of acoustic channels have posed great challenges for the design of medium access control (MAC) protocols. The long propagation delay problem has been widely explored in recent literature. However, the long preamble problem with acoustic modems revealed in real experiments brings new challenges to underwater MAC design. The overhead of control messages in handshaking-based protocols becomes significant due to the long preamble in underwater acoustic modems. To address this problem, we advocate the receiver-initiated handshaking method with parallel reservation to improve the handshaking efficiency. Despite some existing works along this direction, the …


Exchanging Personal Health Data With Electronic Health Records: A Standardized Information Model For Patient Generated Health Data And Observations Of Daily Living, Panagiotis Plastiras, Dympna O'Sullivan 2018 City University of London

Exchanging Personal Health Data With Electronic Health Records: A Standardized Information Model For Patient Generated Health Data And Observations Of Daily Living, Panagiotis Plastiras, Dympna O'Sullivan

Articles

Objective: The development of a middleware information model to facilitate better interoperability between Personal and Electronic Health Record systems in order to allow exchange of Patient Generated Health Data and Observations of Daily Leaving between patients and providers in order to encourage patient self-management.

Materials and methods: An information model based on HL7 standards for interoperability has been extended to support PGHD and ODL data types. The new information models uses HL7 CDA to represent data, is instantiated as a Protégé ontology and uses a set of mapping rules to transfer data between Personal and Electronic Health Record …


Project Management Madness: 3 Key Programs For Communication, Personal Tasks And Large Projects, Rachel S. Evans 2018 University of Georgia School of Law Library

Project Management Madness: 3 Key Programs For Communication, Personal Tasks And Large Projects, Rachel S. Evans

Presentations

No matter what member of a team you are, be it content editor, web designer, database manager or systems administrator, getting things done and meeting goals depends largely on how you communicate with one another, handle your time and effectively collaborate on small and big projects. This session will use our own team's preferred platforms to show specific examples of how we are managing our taskflow across three different programs to tackle business as usual, short and long term work, and major special projects.

The three programs that will be compared for pros, cons, and their integration with one another …


Exploring Online Novelty Detection Using First Story Detection Models, Fei Wang, Robert J. Ross, John D. Kelleher 2018 Technological University Dublin

Exploring Online Novelty Detection Using First Story Detection Models, Fei Wang, Robert J. Ross, John D. Kelleher

Conference papers

Online novelty detection is an important technology in understanding and exploiting streaming data. One application of online novelty detection is First Story Detection (FSD) which attempts to find the very first story about a new topic, e.g. the first news report discussing the “Beast from the East” hitting Ireland. Although hundreds of FSD models have been developed, the vast majority of these only aim at improving the performance of the detection for some specific dataset, and very few focus on the insight of novelty itself. We believe that online novelty detection, framed as an unsupervised learning problem, always requires a …


Enhancing The Design Of A Cybersecurity Risk Management Solution For Communities Of Trust, James E. Fulford Jr. 2018 University of South Florida

Enhancing The Design Of A Cybersecurity Risk Management Solution For Communities Of Trust, James E. Fulford Jr.

USF Tampa Graduate Theses and Dissertations

Research into cybersecurity risks and various methods of evaluating those threats has become an increasingly important area of academic and practitioner investigations. Of particular interest in this field is enhancing the designs and informing capabilities of cybersecurity risk management solutions for users who desire to understand how organizations are impacted when such risks are exploited. Many of the cybersecurity risk management solutions are extremely technical and require their users to have a commensurate level of technical acumen. In the situation evaluated during this research project, the founders of the company being researched had created a highly technical risk management solution …


A Secure Computing Platform For Building Automation Using Microkernel-Based Operating Systems, Xiaolong Wang 2018 University of South Florida

A Secure Computing Platform For Building Automation Using Microkernel-Based Operating Systems, Xiaolong Wang

USF Tampa Graduate Theses and Dissertations

Building Automation System (BAS) is a complex distributed control system that is widely deployed in commercial, residential, industrial buildings for monitoring and controlling mechanical/electrical equipment. Through increasing industrial and technological advances, the control components of BAS are becoming increasingly interconnected. Along with potential benefits, integration also introduces new attack vectors, which tremendous increases safety and security risks in the control system. Historically, BAS lacks security design and relies on physical isolation and "security through obscurity". These methods are unacceptable with the "smart building" technologies. The industry needs to reevaluate the safety and security of the current building automation system, and …


A Model-Based Ai-Driven Test Generation System, Dionny Santiago 2018 Florida International University

A Model-Based Ai-Driven Test Generation System, Dionny Santiago

FIU Electronic Theses and Dissertations

Achieving high software quality today involves manual analysis, test planning, documentation of testing strategy and test cases, and development of automated test scripts to support regression testing. This thesis is motivated by the opportunity to bridge the gap between current test automation and true test automation by investigating learning-based solutions to software testing. We present an approach that combines a trainable web component classifier, a test case description language, and a trainable test generation and execution system that can learn to generate new test cases. Training data was collected and hand-labeled across 7 systems, 95 web pages, and 17,360 elements. …


Policy And Security Configuration Management Systems In Cross-Organisational Settings, Sascha Pudenz, Markus Manhart, Daniel Bachlechner, Stefan Thalmann 2018 University of Innsbruck

Policy And Security Configuration Management Systems In Cross-Organisational Settings, Sascha Pudenz, Markus Manhart, Daniel Bachlechner, Stefan Thalmann

International Journal of Business and Technology

A context of use analysis is an important step in every software engineering project. Comprising the identification of the key system users as well as an analysis of the system environment and the activities supported, this engineering step is crucial for the successful development of information systems. Clarity with respect to the users’ demand for system support and their participation in the activities supported by the system is considered particularly important for systems which are critical for organizational continuity and which are used across organizational boundaries. Systems supporting policy and security configuration management in networks of IT service providers, their …


Mobile-Cloud Cross Development (Mcx), Sachin Ahuja 2018 University for Business and Technology in Kosovo

Mobile-Cloud Cross Development (Mcx), Sachin Ahuja

International Journal of Business and Technology

There is a multitude of Mobile Operating Systems (MOSs) with iOS, Android, Windows Phone and, BlackBerry leading the space. New players continue to enter the market. Without a de-facto leader in this space, it has become necessary for businesses & developers to target multiple devices & MOSs in order to establish a relevant presence within their target audience. Cross-platform Mobile Development Tools (XMTs) were born out of this need to reduce developer effort in creating mobile applications by providing “write once run anywhere” (WORA) functionality. However, most of these tools sacrifice performance, features or maintainability in order to provide WORA …


Autonomous Agents As Tools For Modeling And Building Complex Control Systems That Operate In Dynamic And Unpredictable Environment, Alketa Hyso, Eva Çipi 2018 University of Vlora

Autonomous Agents As Tools For Modeling And Building Complex Control Systems That Operate In Dynamic And Unpredictable Environment, Alketa Hyso, Eva Çipi

International Journal of Business and Technology

Complex control systems that operate in not entirely predictable environment have to deal with this environment in an autonomous manner using adaptability, the ability to predict environmental changes, and to maintain their integrity. Elements of the system must be able to find a new solution in a dynamic way. In this paper, we present the modeling of a traffic lights’ control system using a multivalent system. This is a large-scale distributed system, consisting of autonomous and rational traffic light agents, in which there is no centre imposing an outcome. Multiagent system brings another kind of organization of the distributed control. …


An Innovative Web Application For Managing Academic Documents, Krenare Pireva, Petros Kefalas 2018 University for Business and Technology

An Innovative Web Application For Managing Academic Documents, Krenare Pireva, Petros Kefalas

International Journal of Business and Technology

Archiving versions of academic documents in consideration of green thinking was the motivation to develop an innovative tool that could organize academic documents in a centralized database. This paper presents a new web application, which aims to move towards a paperless University model for managing academic documents that are used within an educational institution, such as proposal courses, syllabuses etc. AcaDocMan, the developed application can be used by academic staff and quality assurance officers of institutions who are able not only to manage their course syllabuses but also to generate different consistent document formats for various purposes.


Dynamic Modeling And Analysis Of Propulsion Effect Of 3 Dof Robot, Ahmet Shala, Xhevahir Bajrami 2018 University for Business and Technology

Dynamic Modeling And Analysis Of Propulsion Effect Of 3 Dof Robot, Ahmet Shala, Xhevahir Bajrami

International Journal of Business and Technology

Dynamical Modeling of robots is commonly first important step of Modeling, Analysis and Control of robotic systems. This paper is focused on using Denavit-Hartenberg (DH) convention for kinematics and Newton- Euler Formulations for dynamic modeling of 3 DoF - Degree of Freedom of 3D robot. The process of deriving of dynamical model is done using Software Maple. Simulations are done using Matlab/Simulink for analysis of propulsion effect under Earth gravity when First Link rotates with 1000 rpm, second Link can move free in vertical direction and Third Link can rotates free around their rotations axle. Simulations results shows very good …


Material Balance Adjustement In Raw Material Processing, Migena Hoxha, Piro Zoga, Aida Bode 2018 University of Tirana

Material Balance Adjustement In Raw Material Processing, Migena Hoxha, Piro Zoga, Aida Bode

International Journal of Business and Technology

Circuit of one processing plant was studied in order to adjust the mass balance. The granulometric composition of the streams that belong to grinding and classifying processes was analyzed, while the chemical content was determined only at the streams related to separation process. Three connection matrixes are considered in this paper, one corresponding to the size fraction equations, the second corresponding to the chemical content measurements and the third, the solid flow rate balance. The technique used consisted of filtering all the data by a weighted least-squares procedure. Then running the output data in a custom designed feature of the …


The Effectiveness Of The Use Of Solar Panels In Hotels Of Durres Area, Asllan Hajderi, Shkelqim Gjevori 2018 Aleksander Moisiu University

The Effectiveness Of The Use Of Solar Panels In Hotels Of Durres Area, Asllan Hajderi, Shkelqim Gjevori

International Journal of Business and Technology

In the present study is analyzing the case of the application of solar energy with vacuum tube collectors for heating water for sanitary needs in hotels of Durres areas. In recent years there has been a special interest by the leading authorities to the EU countries and the U.S., for the use of renewable energies in general and solar energy in particular. This is mainly related with the reduction of environmental pollution from gas CO2, which directly influences the greenhouse effect and global warming.

Unlike other forms of renewable energy, like wind turbines, photovoltaic panels and biomass usages, the use …


Advancement Of The Plastering Machine, Bujar Ademi, Peter Kopacek 2018 Vienna University of Technology

Advancement Of The Plastering Machine, Bujar Ademi, Peter Kopacek

International Journal of Business and Technology

Automation of water flow at plastering machines is a solution which serves the process of plastering, to adhere international standards. Automation of water flow by taking signals from the condition of the material depending on humidity. So its output is used to influence the increase or decrease of the amount of water flow in the valve. Water flow automation is a system which consists of several components in which the already, develop different processes. To release the feedback we need a sensor which is built by piezoelemnt in which we have the phenomenon of the frequency. With which we have …


Digital Commons powered by bepress