Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Emergency Management (2)
- Emerging Technologies (2)
- Global Positioning Systems (2)
- Location-Based Services (2)
- National Security (2)
-
- Radio (2)
- SBS (2)
- Social Implications of ICT (2)
- ARCGIS (1)
- Alert (1)
- Alternative splicing (1)
- Ancillary Services (1)
- Architecture (1)
- Artificial Intelligence (1)
- Australia (1)
- Bayesian Networks (1)
- Big data (1)
- Big data, technology architecture, software system stack, new model, new paradigm, security and trustworthy (1)
- Blockchain (1)
- Brooklyn (1)
- CA (1)
- Capacity (1)
- Cetificate Authority (1)
- Cloud computing (1)
- Clustering, Dirichlet mixture model, DNS behavior tracking (1)
- Convergence (1)
- Data analysis (1)
- Degradations (1)
- Delayed Observations (1)
- ESRI (1)
- Publication
- Publication Type
Articles 1 - 16 of 16
Full-Text Articles in Engineering
Synthetic Heart Sound Dataset, Davoud Shariat Panah, Andrew Hines, Susan Mckeever
Synthetic Heart Sound Dataset, Davoud Shariat Panah, Andrew Hines, Susan Mckeever
Datasets
The repository contains synthetic heart sound recordings. The publication related to this dataset is "Exploring the impact of noise and degradations on heart sound classification models", Biomedical Signal Processing and Control journal.
Data From: Machine Learning Predictions Of Electricity Capacity, Marcus Harris, Elizabeth Kirby, Ameeta Agrawal, Rhitabrat Pokharel, Francis Puyleart, Martin Zwick
Data From: Machine Learning Predictions Of Electricity Capacity, Marcus Harris, Elizabeth Kirby, Ameeta Agrawal, Rhitabrat Pokharel, Francis Puyleart, Martin Zwick
Systems Science Faculty Datasets
This research applies machine learning methods to build predictive models of Net Load Imbalance for the Resource Sufficiency Flexible Ramping Requirement in the Western Energy Imbalance Market. Several methods are used in this research, including Reconstructability Analysis, developed in the systems community, and more well-known methods such as Bayesian Networks, Support Vector Regression, and Neural Networks. The aims of the research are to identify predictive variables and obtain a new stand-alone model that improves prediction accuracy and reduces the INC (ability to increase generation) and DEC (ability to decrease generation) Resource Sufficiency Requirements for Western Energy Imbalance Market participants. This …
Bcse: Blockchain-Based Trusted Service Evaluation Model Over Big Data, Fengyin Li, Xinying Yu, Rui Ge, Yanli Wang, Yang Cui, Huiyu Zhou
Bcse: Blockchain-Based Trusted Service Evaluation Model Over Big Data, Fengyin Li, Xinying Yu, Rui Ge, Yanli Wang, Yang Cui, Huiyu Zhou
Big Data Mining and Analytics
The blockchain, with its key characteristics of decentralization, persistence, anonymity, and auditability, has become a solution to overcome the overdependence and lack of trust for a traditional public key infrastructure on third-party institutions. Because of these characteristics, the blockchain is suitable for solving certain open problems in the service-oriented social network, where the unreliability of submitted reviews of service vendors can cause serious security problems. To solve the unreliability problems of submitted reviews, this paper first proposes a blockchain-based identity authentication scheme and a new trusted service evaluation model by introducing the scheme into a service evaluation model. The new …
Big Data With Cloud Computing: Discussions And Challenges, Amanpreet Kaur Sandhu
Big Data With Cloud Computing: Discussions And Challenges, Amanpreet Kaur Sandhu
Big Data Mining and Analytics
With the recent advancements in computer technologies, the amount of data available is increasing day by day. However, excessive amounts of data create great challenges for users. Meanwhile, cloud computing services provide a powerful environment to store large volumes of data. They eliminate various requirements, such as dedicated space and maintenance of expensive computer hardware and software. Handling big data is a time-consuming task that requires large computational clusters to ensure successful data storage and processing. In this work, the definition, classification, and characteristics of big data are discussed, along with various cloud services, such as Microsoft Azure, Google Cloud, …
Exploiting More Associations Between Slots For Multi-Domain Dialog State Tracking, Hui Bai, Yan Yang, Jie Wang
Exploiting More Associations Between Slots For Multi-Domain Dialog State Tracking, Hui Bai, Yan Yang, Jie Wang
Big Data Mining and Analytics
Dialog State Tracking (DST) aims to extract the current state from the conversation and plays an important role in dialog systems. Existing methods usually predict the value of each slot independently and do not consider the correlations among slots, which will exacerbate the data sparsity problem because of the increased number of candidate values. In this paper, we propose a multi-domain DST model that integrates slot-relevant information. In particular, certain connections may exist among slots in different domains, and their corresponding values can be obtained through explicit or implicit reasoning. Therefore, we use the graph adjacency matrix to determine the …
Sampling With Prior Knowledge For High-Dimensional Gravitational Wave Data Analysis, He Wang, Zhoujian Cao, Yue Zhou, Zong-Kuan Guo, Zhixiang Ren
Sampling With Prior Knowledge For High-Dimensional Gravitational Wave Data Analysis, He Wang, Zhoujian Cao, Yue Zhou, Zong-Kuan Guo, Zhixiang Ren
Big Data Mining and Analytics
Extracting knowledge from high-dimensional data has been notoriously difficult, primarily due to the so-called "curse of dimensionality" and the complex joint distributions of these dimensions. This is a particularly profound issue for high-dimensional gravitational wave data analysis where one requires to conduct Bayesian inference and estimate joint posterior distributions. In this study, we incorporate prior physical knowledge by sampling from desired interim distributions to develop the training dataset. Accordingly, the more relevant regions of the high-dimensional feature space are covered by additional data points, such that the model can learn the subtle but important details. We adapt the normalizing flow …
Toward Intelligent Financial Advisors For Identifying Potential Clients: A Multitask Perspective, Qixiang Shao, Runlong Yu, Hongke Zhao, Chunli Liu, Mengyi Zhang, Hongmei Song, Qi Liu
Toward Intelligent Financial Advisors For Identifying Potential Clients: A Multitask Perspective, Qixiang Shao, Runlong Yu, Hongke Zhao, Chunli Liu, Mengyi Zhang, Hongmei Song, Qi Liu
Big Data Mining and Analytics
Intelligent Financial Advisors (IFAs) in online financial applications (apps) have brought new life to personal investment by providing appropriate and high-quality portfolios for users. In real-world scenarios, identifying potential clients is a crucial issue for IFAs, i.e., identifying users who are willing to purchase the portfolios. Thus, extracting useful information from various characteristics of users and further predicting their purchase inclination are urgent. However, two critical problems encountered in real practice make this prediction task challenging, i.e., sample selection bias and data sparsity. In this study, we formalize a potential conversion relationship, i.e., user→activated user→client and decompose this relationship into …
A Comparison Of Computational Approaches For Intron Retention Detection, Jiantao Zheng, Cuixiang Lin, Zhenpeng Wu, Hong-Dong Li
A Comparison Of Computational Approaches For Intron Retention Detection, Jiantao Zheng, Cuixiang Lin, Zhenpeng Wu, Hong-Dong Li
Big Data Mining and Analytics
Intron Retention (IR) is an alternative splicing mode through which introns are retained in mature RNAs rather than being spliced in most cases. IR has been gaining increasing attention in recent years because of its recognized association with gene expression regulation and complex diseases. Continuous efforts have been dedicated to the development of IR detection methods. These methods differ in their metrics to quantify retention propensity, performance to detect IR events, functional enrichment of detected IRs, and computational speed. A systematic experimental comparison would be valuable to the selection and use of existing methods. In this work, we conduct an …
Thinking On New System For Big Data Technology, Xueqi Chegn, Shenghua Liu, Ruqing Zhang
Thinking On New System For Big Data Technology, Xueqi Chegn, Shenghua Liu, Ruqing Zhang
Bulletin of Chinese Academy of Sciences (Chinese Version)
In recent years, there are such significant improvements on the performance and efficiency of big data technology and system. As it is widely applied in various fields, big data has empowered industrial intelligence, and is the key step into the intelligent stage of information society. Therefore, we are facing greater challenges nowadays, such as the paradox of data flooding and high-value data lacking, the complexity and uncertainty of big data analysis, and the difficulty to balance the data on sharing and circulation, and trustworthiness and security. Moreover, these challenges will not only promote the innovation and change of big data …
Mapping In The Humanities: Gis Lessons For Poets, Historians, And Scientists, Emily W. Fairey
Mapping In The Humanities: Gis Lessons For Poets, Historians, And Scientists, Emily W. Fairey
Open Educational Resources
User-friendly Geographic Information Systems (GIS) is the common thread of this collection of presentations, and activities with full lesson plans. The first section of the site contains an overview of cartography, the art of creating maps, and then looks at historical mapping platforms like Hypercities and Donald Rumsey Historical Mapping Project. In the next section Google Earth Desktop Pro is introduced, with lessons and activities on the basics of GE such as pins, paths, and kml files, as well as a more complex activity on "georeferencing" an historic map over Google Earth imagery. The final section deals with ARCGIS Online …
Tracking You Through Dns Traffic: Linking User Sessions By Clustering With Dirichlet Mixture Model, Mingxuan Sun, Junjie Zhang, Guangyue Xu, Dae Wook Kim
Tracking You Through Dns Traffic: Linking User Sessions By Clustering With Dirichlet Mixture Model, Mingxuan Sun, Junjie Zhang, Guangyue Xu, Dae Wook Kim
Computer Science and Engineering Faculty Publications
The Domain Name System (DNS), which does not encrypt domain names such as "bank.us" and "dentalcare.com", commonly accurately reflects the specific network services. Therefore, DNS-based behavioral analysis is extremely attractive for many applications such as forensics investigation and online advertisement. Traditionally, a user can be trivially and uniquely identified by the device’s IP address if it is static (i.e., a desktop or a laptop). As more and more wireless and mobile devices are deeply ingrained in our lives and the dynamic IP address such as DHCP has been widely applied, it becomes almost impossible to use one IP address to …
Panorama: Multi-Path Ssl Authentication Using Peer Network Perspectives, William P. Harris
Panorama: Multi-Path Ssl Authentication Using Peer Network Perspectives, William P. Harris
Computer Engineering
SSL currently uses certificates signed by Certificate Authorities (CAs) to authenticate connections. e.g. Google will pay a CA to sign a certificate for them, so that they can prove that they're not someone pretending to be Google. Unfortunately, this system has had multiple problems, and many believe that an alternative needs to be found.
One of the ideas for alternatives is using multiple "network perspectives" to authenticate a server. The idea behind this is that, though playing man-in-the-middle (MITM) with one connection is easy, it should be difficult for an adversary to do so with many connections, especially if they …
Natural Disasters And Early Warning Systems In Australia, Emma Papaemanuel, Katina Michael, Peter Johnston
Natural Disasters And Early Warning Systems In Australia, Emma Papaemanuel, Katina Michael, Peter Johnston
Professor Katina Michael
Australia's national emergency warning system alerts. Radio program in Greek.
Are Disaster Early Warnings Effective?, Kerri Worthington, Katina Michael, Peter Johnson, Paul Barnes
Are Disaster Early Warnings Effective?, Kerri Worthington, Katina Michael, Peter Johnson, Paul Barnes
Professor Katina Michael
Australia's summer is traditionally a time of heightened preparation for natural disasters, with cyclones and floods menacing the north and bushfires a constant threat in the south. And the prospect of more frequent, and more intense, disasters thanks to climate change has brought the need for an effective early warning system to the forefront of policy-making. Technological advances and improved telecommunication systems have raised expectations that warning of disasters will come early enough to keep people safe. But are those expectations too high? Kerri Worthington reports. Increasingly, the world's governments -- and their citizens -- rely on technology-based early warning …
Concern People Without Latest Technology Will Miss Fire Warnings, Sally Sara, Ashley Hall, Peter Johnson, Katina Michael
Concern People Without Latest Technology Will Miss Fire Warnings, Sally Sara, Ashley Hall, Peter Johnson, Katina Michael
Professor Katina Michael
But what if the website goes down in the way Victoria's Country Fire Authority website crashed as fires raged a few weeks ago? What about those people who don't own the latest technology? And what happens when the power goes out?
KATINA MICHAEL: Well there's no television, there isn't ability to access the internet potentially.
ASHLEY HALL: Professor Katina Michael is Associate Professor at the School of Information Systems and Technology at the University of Wollongong.
KATINA MICHAEL: I would suggest a long lasting powered radio because we don't want is we don't want when the lights go out, or …
Delayed Observation Planning In Partially Observable Domains, Pradeep Reddy Varakantham, Janusz Marecki
Delayed Observation Planning In Partially Observable Domains, Pradeep Reddy Varakantham, Janusz Marecki
Research Collection School Of Computing and Information Systems
Traditional models for planning under uncertainty such as Markov Decision Processes (MDPs) or Partially Observable MDPs (POMDPs) assume that the observations about the results of agent actions are instantly available to the agent. In so doing, they are no longer applicable to domains where observations are received with delays caused by temporary unavailability of information (e.g. delayed response of the market to a new product). To that end, we make the following key contributions towards solving Delayed observation POMDPs (D-POMDPs): (i) We first provide an parameterized approximate algorithm for solving D-POMDPs efficiently, with desired accuracy; and (ii) We then propose …