Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

Other

Institution
Keyword
Publication Year
Publication
Publication Type

Articles 1 - 16 of 16

Full-Text Articles in Engineering

Synthetic Heart Sound Dataset, Davoud Shariat Panah, Andrew Hines, Susan Mckeever Jan 2023

Synthetic Heart Sound Dataset, Davoud Shariat Panah, Andrew Hines, Susan Mckeever

Datasets

The repository contains synthetic heart sound recordings. The publication related to this dataset is "Exploring the impact of noise and degradations on heart sound classification models", Biomedical Signal Processing and Control journal.


Data From: Machine Learning Predictions Of Electricity Capacity, Marcus Harris, Elizabeth Kirby, Ameeta Agrawal, Rhitabrat Pokharel, Francis Puyleart, Martin Zwick Dec 2022

Data From: Machine Learning Predictions Of Electricity Capacity, Marcus Harris, Elizabeth Kirby, Ameeta Agrawal, Rhitabrat Pokharel, Francis Puyleart, Martin Zwick

Systems Science Faculty Datasets

This research applies machine learning methods to build predictive models of Net Load Imbalance for the Resource Sufficiency Flexible Ramping Requirement in the Western Energy Imbalance Market. Several methods are used in this research, including Reconstructability Analysis, developed in the systems community, and more well-known methods such as Bayesian Networks, Support Vector Regression, and Neural Networks. The aims of the research are to identify predictive variables and obtain a new stand-alone model that improves prediction accuracy and reduces the INC (ability to increase generation) and DEC (ability to decrease generation) Resource Sufficiency Requirements for Western Energy Imbalance Market participants. This …


Bcse: Blockchain-Based Trusted Service Evaluation Model Over Big Data, Fengyin Li, Xinying Yu, Rui Ge, Yanli Wang, Yang Cui, Huiyu Zhou Mar 2022

Bcse: Blockchain-Based Trusted Service Evaluation Model Over Big Data, Fengyin Li, Xinying Yu, Rui Ge, Yanli Wang, Yang Cui, Huiyu Zhou

Big Data Mining and Analytics

The blockchain, with its key characteristics of decentralization, persistence, anonymity, and auditability, has become a solution to overcome the overdependence and lack of trust for a traditional public key infrastructure on third-party institutions. Because of these characteristics, the blockchain is suitable for solving certain open problems in the service-oriented social network, where the unreliability of submitted reviews of service vendors can cause serious security problems. To solve the unreliability problems of submitted reviews, this paper first proposes a blockchain-based identity authentication scheme and a new trusted service evaluation model by introducing the scheme into a service evaluation model. The new …


Big Data With Cloud Computing: Discussions And Challenges, Amanpreet Kaur Sandhu Mar 2022

Big Data With Cloud Computing: Discussions And Challenges, Amanpreet Kaur Sandhu

Big Data Mining and Analytics

With the recent advancements in computer technologies, the amount of data available is increasing day by day. However, excessive amounts of data create great challenges for users. Meanwhile, cloud computing services provide a powerful environment to store large volumes of data. They eliminate various requirements, such as dedicated space and maintenance of expensive computer hardware and software. Handling big data is a time-consuming task that requires large computational clusters to ensure successful data storage and processing. In this work, the definition, classification, and characteristics of big data are discussed, along with various cloud services, such as Microsoft Azure, Google Cloud, …


Exploiting More Associations Between Slots For Multi-Domain Dialog State Tracking, Hui Bai, Yan Yang, Jie Wang Mar 2022

Exploiting More Associations Between Slots For Multi-Domain Dialog State Tracking, Hui Bai, Yan Yang, Jie Wang

Big Data Mining and Analytics

Dialog State Tracking (DST) aims to extract the current state from the conversation and plays an important role in dialog systems. Existing methods usually predict the value of each slot independently and do not consider the correlations among slots, which will exacerbate the data sparsity problem because of the increased number of candidate values. In this paper, we propose a multi-domain DST model that integrates slot-relevant information. In particular, certain connections may exist among slots in different domains, and their corresponding values can be obtained through explicit or implicit reasoning. Therefore, we use the graph adjacency matrix to determine the …


Sampling With Prior Knowledge For High-Dimensional Gravitational Wave Data Analysis, He Wang, Zhoujian Cao, Yue Zhou, Zong-Kuan Guo, Zhixiang Ren Mar 2022

Sampling With Prior Knowledge For High-Dimensional Gravitational Wave Data Analysis, He Wang, Zhoujian Cao, Yue Zhou, Zong-Kuan Guo, Zhixiang Ren

Big Data Mining and Analytics

Extracting knowledge from high-dimensional data has been notoriously difficult, primarily due to the so-called "curse of dimensionality" and the complex joint distributions of these dimensions. This is a particularly profound issue for high-dimensional gravitational wave data analysis where one requires to conduct Bayesian inference and estimate joint posterior distributions. In this study, we incorporate prior physical knowledge by sampling from desired interim distributions to develop the training dataset. Accordingly, the more relevant regions of the high-dimensional feature space are covered by additional data points, such that the model can learn the subtle but important details. We adapt the normalizing flow …


Toward Intelligent Financial Advisors For Identifying Potential Clients: A Multitask Perspective, Qixiang Shao, Runlong Yu, Hongke Zhao, Chunli Liu, Mengyi Zhang, Hongmei Song, Qi Liu Mar 2022

Toward Intelligent Financial Advisors For Identifying Potential Clients: A Multitask Perspective, Qixiang Shao, Runlong Yu, Hongke Zhao, Chunli Liu, Mengyi Zhang, Hongmei Song, Qi Liu

Big Data Mining and Analytics

Intelligent Financial Advisors (IFAs) in online financial applications (apps) have brought new life to personal investment by providing appropriate and high-quality portfolios for users. In real-world scenarios, identifying potential clients is a crucial issue for IFAs, i.e., identifying users who are willing to purchase the portfolios. Thus, extracting useful information from various characteristics of users and further predicting their purchase inclination are urgent. However, two critical problems encountered in real practice make this prediction task challenging, i.e., sample selection bias and data sparsity. In this study, we formalize a potential conversion relationship, i.e., user→activated user→client and decompose this relationship into …


A Comparison Of Computational Approaches For Intron Retention Detection, Jiantao Zheng, Cuixiang Lin, Zhenpeng Wu, Hong-Dong Li Mar 2022

A Comparison Of Computational Approaches For Intron Retention Detection, Jiantao Zheng, Cuixiang Lin, Zhenpeng Wu, Hong-Dong Li

Big Data Mining and Analytics

Intron Retention (IR) is an alternative splicing mode through which introns are retained in mature RNAs rather than being spliced in most cases. IR has been gaining increasing attention in recent years because of its recognized association with gene expression regulation and complex diseases. Continuous efforts have been dedicated to the development of IR detection methods. These methods differ in their metrics to quantify retention propensity, performance to detect IR events, functional enrichment of detected IRs, and computational speed. A systematic experimental comparison would be valuable to the selection and use of existing methods. In this work, we conduct an …


Thinking On New System For Big Data Technology, Xueqi Chegn, Shenghua Liu, Ruqing Zhang Jan 2022

Thinking On New System For Big Data Technology, Xueqi Chegn, Shenghua Liu, Ruqing Zhang

Bulletin of Chinese Academy of Sciences (Chinese Version)

In recent years, there are such significant improvements on the performance and efficiency of big data technology and system. As it is widely applied in various fields, big data has empowered industrial intelligence, and is the key step into the intelligent stage of information society. Therefore, we are facing greater challenges nowadays, such as the paradox of data flooding and high-value data lacking, the complexity and uncertainty of big data analysis, and the difficulty to balance the data on sharing and circulation, and trustworthiness and security. Moreover, these challenges will not only promote the innovation and change of big data …


Mapping In The Humanities: Gis Lessons For Poets, Historians, And Scientists, Emily W. Fairey May 2019

Mapping In The Humanities: Gis Lessons For Poets, Historians, And Scientists, Emily W. Fairey

Open Educational Resources

User-friendly Geographic Information Systems (GIS) is the common thread of this collection of presentations, and activities with full lesson plans. The first section of the site contains an overview of cartography, the art of creating maps, and then looks at historical mapping platforms like Hypercities and Donald Rumsey Historical Mapping Project. In the next section Google Earth Desktop Pro is introduced, with lessons and activities on the basics of GE such as pins, paths, and kml files, as well as a more complex activity on "georeferencing" an historic map over Google Earth imagery. The final section deals with ARCGIS Online …


Tracking You Through Dns Traffic: Linking User Sessions By Clustering With Dirichlet Mixture Model, Mingxuan Sun, Junjie Zhang, Guangyue Xu, Dae Wook Kim Nov 2017

Tracking You Through Dns Traffic: Linking User Sessions By Clustering With Dirichlet Mixture Model, Mingxuan Sun, Junjie Zhang, Guangyue Xu, Dae Wook Kim

Computer Science and Engineering Faculty Publications

The Domain Name System (DNS), which does not encrypt domain names such as "bank.us" and "dentalcare.com", commonly accurately reflects the specific network services. Therefore, DNS-based behavioral analysis is extremely attractive for many applications such as forensics investigation and online advertisement. Traditionally, a user can be trivially and uniquely identified by the device’s IP address if it is static (i.e., a desktop or a laptop). As more and more wireless and mobile devices are deeply ingrained in our lives and the dynamic IP address such as DHCP has been widely applied, it becomes almost impossible to use one IP address to …


Panorama: Multi-Path Ssl Authentication Using Peer Network Perspectives, William P. Harris Jun 2015

Panorama: Multi-Path Ssl Authentication Using Peer Network Perspectives, William P. Harris

Computer Engineering

SSL currently uses certificates signed by Certificate Authorities (CAs) to authenticate connections. e.g. Google will pay a CA to sign a certificate for them, so that they can prove that they're not someone pretending to be Google. Unfortunately, this system has had multiple problems, and many believe that an alternative needs to be found.

One of the ideas for alternatives is using multiple "network perspectives" to authenticate a server. The idea behind this is that, though playing man-in-the-middle (MITM) with one connection is easy, it should be difficult for an adversary to do so with many connections, especially if they …


Natural Disasters And Early Warning Systems In Australia, Emma Papaemanuel, Katina Michael, Peter Johnston Jan 2013

Natural Disasters And Early Warning Systems In Australia, Emma Papaemanuel, Katina Michael, Peter Johnston

Professor Katina Michael

Australia's national emergency warning system alerts. Radio program in Greek.


Are Disaster Early Warnings Effective?, Kerri Worthington, Katina Michael, Peter Johnson, Paul Barnes Jan 2013

Are Disaster Early Warnings Effective?, Kerri Worthington, Katina Michael, Peter Johnson, Paul Barnes

Professor Katina Michael

Australia's summer is traditionally a time of heightened preparation for natural disasters, with cyclones and floods menacing the north and bushfires a constant threat in the south. And the prospect of more frequent, and more intense, disasters thanks to climate change has brought the need for an effective early warning system to the forefront of policy-making. Technological advances and improved telecommunication systems have raised expectations that warning of disasters will come early enough to keep people safe. But are those expectations too high? Kerri Worthington reports. Increasingly, the world's governments -- and their citizens -- rely on technology-based early warning …


Concern People Without Latest Technology Will Miss Fire Warnings, Sally Sara, Ashley Hall, Peter Johnson, Katina Michael Jan 2013

Concern People Without Latest Technology Will Miss Fire Warnings, Sally Sara, Ashley Hall, Peter Johnson, Katina Michael

Professor Katina Michael

But what if the website goes down in the way Victoria's Country Fire Authority website crashed as fires raged a few weeks ago? What about those people who don't own the latest technology? And what happens when the power goes out?

KATINA MICHAEL: Well there's no television, there isn't ability to access the internet potentially.

ASHLEY HALL: Professor Katina Michael is Associate Professor at the School of Information Systems and Technology at the University of Wollongong.

KATINA MICHAEL: I would suggest a long lasting powered radio because we don't want is we don't want when the lights go out, or …


Delayed Observation Planning In Partially Observable Domains, Pradeep Reddy Varakantham, Janusz Marecki Jun 2012

Delayed Observation Planning In Partially Observable Domains, Pradeep Reddy Varakantham, Janusz Marecki

Research Collection School Of Computing and Information Systems

Traditional models for planning under uncertainty such as Markov Decision Processes (MDPs) or Partially Observable MDPs (POMDPs) assume that the observations about the results of agent actions are instantly available to the agent. In so doing, they are no longer applicable to domains where observations are received with delays caused by temporary unavailability of information (e.g. delayed response of the market to a new product). To that end, we make the following key contributions towards solving Delayed observation POMDPs (D-POMDPs): (i) We first provide an parameterized approximate algorithm for solving D-POMDPs efficiently, with desired accuracy; and (ii) We then propose …