Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

PDF

2012

Institution
Keyword
Publication
Publication Type

Articles 31 - 60 of 610

Full-Text Articles in Engineering

The Surface Distribution Of Oil Spills, The Environmental Status Of The Visoka Oilfield, Its Rehabilitation Ways: Case Study, Nevton Kodhelaj, Aida Bode, Piro Zoga, Nevina Koja, Esmeralda Zeqo, Dulian Zeqiraj Nov 2012

The Surface Distribution Of Oil Spills, The Environmental Status Of The Visoka Oilfield, Its Rehabilitation Ways: Case Study, Nevton Kodhelaj, Aida Bode, Piro Zoga, Nevina Koja, Esmeralda Zeqo, Dulian Zeqiraj

UBT International Conference

Visoka oilfield was explored in 1963 through the well G-622. In this oilfield had been drilled more than 170 production wells. Through all this years of its exploitation, mainly because of the outdated technology, the environmental pollution reached really dramatic values. The pollution extends on the Visoka village, affecting so the life for the entire community. The oil spills, the gas emissions and the formation water affected and polluted and ―k illed‖ the Gjanica River, its delta and the Adriatic coast in the Semani beach. Due to the technology and the completely wrong policies, used in the past, the wells …


Research Of Agronomic And Quality Traits Of Winter Barley Varieties (Hordeum Vulgare L.) Under Growing Conditions In The Republic Of Kosovo, Nexhdet Shala, Bakir Kelmendi Nov 2012

Research Of Agronomic And Quality Traits Of Winter Barley Varieties (Hordeum Vulgare L.) Under Growing Conditions In The Republic Of Kosovo, Nexhdet Shala, Bakir Kelmendi

UBT International Conference

The object of this paper is the research of agronomic and quality trains of winter varieties (hordeum vulgare L.) their adaptability and specific reactions towards growing conditions in the Republic of Kosovo. During three year trails on localities in Dukagjini area and area of Kosovo we researched 5 winter barley varieties. Environment has been explored together with estimation of significant parameters of grain yield, hectoliter weight, protein and starch content. Impact of year, location and variety on grain yield, hectoliter grain weight, protein and starch content has been estimated by analysis of variance. Environmental effects of planting barley cultivars in …


Towards Logical Linked Data Compression, Amit Krishna, Pascal Hitzler, Guozhu Dong Nov 2012

Towards Logical Linked Data Compression, Amit Krishna, Pascal Hitzler, Guozhu Dong

Computer Science and Engineering Faculty Publications

Linked data has experienced accelerated growth in recent years. With the continuing proliferation of structured data, demand for RDF compression is becoming increasingly important. In this study, we introduce a novel lossless compression technique for RDF datasets, called Rule Based compression (RB compression) that compresses datasets by generating a set of new logical rules from the dataset and removing triples that can be inferred from these rules. We employ existing frequent pattern mining algorithms for generating new logical rules. Unlike other compression techniques, our approach not only takes advantage of syntactic verbosity and data redundancy but also utilizes intra- and …


Temporal Data Mining Of Uncertain Water Reservoir Data, Abhinaya Mohan, Peter Revesz Nov 2012

Temporal Data Mining Of Uncertain Water Reservoir Data, Abhinaya Mohan, Peter Revesz

CSE Conference and Workshop Papers

This paper describes the challenges of data mining uncertain water reservoir data based on past human operations in order to learn from them reservoir policies that can be automated for the future operation of the water reservoirs. Records of human operations of water reservoirs often contain uncertain data. For example, the recorded amounts of water released and retained in the water reservoirs are typically uncertain, i.e., they are bounded by some minimum and maximum values. Moreover, the time of release is also uncertain, i.e., typically only monthly or weekly amounts are recorded. To increase the effectiveness of data mining of …


Cognitive Architectures And Autonomy: Commentary And Response, Włodzisław Duch, Ah-Hwee Tan, Stan Franklin Nov 2012

Cognitive Architectures And Autonomy: Commentary And Response, Włodzisław Duch, Ah-Hwee Tan, Stan Franklin

Research Collection School Of Computing and Information Systems

This paper provides a very useful and promising analysis and comparison of current architectures of autonomous intelligent systems acting in real time and specific contexts, with all their constraints. The chosen issue of Cognitive Architectures and Autonomy is really a challenge for AI current projects and future research. I appreciate and endorse not only that challenge but many specific choices and claims; in particular: (i) that “autonomy” is a key concept for general intelligent systems; (ii) that “a core issue in cognitive architecture is the integration of cognitive processes ....”; (iii) the analysis of features and capabilities missing in current …


Fashionask: Pushing Community Answers To Your Fingertips, Wei Zhang, Lei Pang, Chong-Wah Ngo Nov 2012

Fashionask: Pushing Community Answers To Your Fingertips, Wei Zhang, Lei Pang, Chong-Wah Ngo

Research Collection School Of Computing and Information Systems

We demonstrate a multimedia-based question-answering system, named FashionAsk, by allowing users to ask questions referring to pictures snapped by mobile devices. Specifically, instead of asking verbose questions to depict visual instances, direct pictures are provided as part of questions. To answer these multi-modal questions, FashionAsk performs a large-scale instance search to infer the names of instances, and then matches with similar questions from communitycontributed QA websites as answers. The demonstration is conducted on a million-scale dataset of Web images and QA pairs in the domain of fashion products. Asking a multimedia question through FashionAsk can take as short as five …


Predicting Domain Adaptivity: Redo Or Recycle?, Ting Yao, Chong-Wah Ngo, Shiai Zhu Nov 2012

Predicting Domain Adaptivity: Redo Or Recycle?, Ting Yao, Chong-Wah Ngo, Shiai Zhu

Research Collection School Of Computing and Information Systems

Over the years, the academic researchers have contributed various visual concept classifiers. Nevertheless, given a new dataset, most researchers still prefer to develop large number of classifiers from scratch despite expensive labeling efforts and limited computing resources. A valid question is why not multimedia community “embrace the green” and recycle off-the-shelf classifiers for new dataset. The difficulty originates from the domain gap that there are many different factors that govern the development of a classifier and eventually drive its performance to emphasize certain aspects of dataset. Reapplying a classifier to an unseen dataset may end up GIGO (garbage in, garbage …


Community As A Connector: Associating Faces With Celebrity Names In Web Videos, Zhineng Chen, Chong-Wah Ngo, Juan Cao, Wei Zhang Nov 2012

Community As A Connector: Associating Faces With Celebrity Names In Web Videos, Zhineng Chen, Chong-Wah Ngo, Juan Cao, Wei Zhang

Research Collection School Of Computing and Information Systems

Associating celebrity faces appearing in videos with their names is of increasingly importance with the popularity of both celebrity videos and related queries. However, the problem is not yet seriously studied in Web video domain. This paper proposes a Community connected Celebrity Name-Face Association approach (CCNFA), where the community is regarded as an intermediate connector to facilitate the association. Specifically, with the names and faces extracted from Web videos, C-CNFA decomposes the association task into a three-step framework: community discovering, community matching and celebrity face tagging. To achieve the goal of efficient name-face association under this umbrella, algorithms such as …


Indian Millennials: Are Microchip Implants A More Secure Technology For Identification And Access Control?, Christine Perakslis, Katina Michael Oct 2012

Indian Millennials: Are Microchip Implants A More Secure Technology For Identification And Access Control?, Christine Perakslis, Katina Michael

Associate Professor Katina Michael

This mixed methods study with a sequential explanatory strategy explored qualitatively the statistically significant quantitative findings relative to Indian respondents’ perceptions about RFID (radio frequency identification) transponders implanted into the human body. In the first analysis phase of the study, there was a significant chi-square analysis reported (χ2 = 56.64, df = 3, p = .000) relative to the perception of small business owners (N = 453) that implanted chips are a more secure form of identification and/or access control in organizations and the respondents’ country of residence. Countries under study included Australia, India, the UK and US. The country …


Analysis - Toward A New American Military., Adam Lowther, Jan Kallberg Oct 2012

Analysis - Toward A New American Military., Adam Lowther, Jan Kallberg

Jan Kallberg

In releasing the United States Department of Defense’s (DoD) Sustaining U.S. Global Leadership: Priorities for 21st Century Defense and Defense Budget Priorities and Choices in January 2012, President Barack Obama and Secretary of Defense Leon Panetta offered a rationale for the administration’s reductions in defense spending. By stating that the shift in strategic direction is an effort to “put our fiscal house in order” and a response to the 2011 Budget Control Act, which requires DoD to reduce spending by $487 billion between fiscal years 2012 and 2021, the United States’ NATO partners in Europe were given considerable reason for …


How Can Pacific Island Economies Benefits From The Advent Of Ict’S – Review Of Best Practices In Education, Deogratias Harorimana Sr Oct 2012

How Can Pacific Island Economies Benefits From The Advent Of Ict’S – Review Of Best Practices In Education, Deogratias Harorimana Sr

Dr Deogratias Harorimana

This paper explored implementation and use of information and communication technologies in Fiji, in order to gain insight into recent government initiatives to introduce computers and other ICTs for the community of Fiji. The focus of this paper in that it provided the framework for an in-depth exploration of e-learning centers around the country and the benefits from the advent of ICT’s in e-learning community centers in Fiji. Areas concentrated on are outcome of ICT’s in formal education to students and community as a whole in areas of agriculture, health, environment and infrastructure etc. The research sought understanding from the …


Wispernet: Anti-Jamming For Wireless Sensor Networks, Miroslav Pajic, Rahul Mangharam Oct 2012

Wispernet: Anti-Jamming For Wireless Sensor Networks, Miroslav Pajic, Rahul Mangharam

Rahul Mangharam

Resilience to electromagnetic jamming and its avoidance are difficult problems. It is often both hard to distinguish malicious jamming from congestion in the broadcast regime and a challenge to conceal the activity patterns of the legitimate communication protocol from the jammer. In the context of energy-constrained wireless sensor networks, nodes are scheduled to maximize the common sleep duration and coordinate communication to extend their battery life. This results in well-defined communication patterns with possibly predictable intervals of activity that are easily detected and jammed by a statistical jammer. We present an anti-jamming protocol for sensor networks which eliminates spatio-temporal patterns …


Anti-Jamming For Embedded Wireless Networks, Miroslav Pajic, Rahul Mangharam Oct 2012

Anti-Jamming For Embedded Wireless Networks, Miroslav Pajic, Rahul Mangharam

Rahul Mangharam

Resilience to electromagnetic jamming and its avoidance are difficult problems. It is often both hard to distinguish malicious jamming from congestion in the broadcast regime and a challenge to conceal the activity patterns of the legitimate communication protocol from the jammer. In the context of energy-constrained wireless sensor networks, nodes are scheduled to maximize the common sleep duration and coordinate communication to extend their battery life. This results in well-defined communication patterns with possibly predictable intervals of activity that are easily detected and jammed by a statistical jammer. We present an anti-jamming protocol for sensor networks which eliminates spatio-temporal patterns …


Embedded Virtual Machines For Robust Wireless Control Systems, Rahul Mangharam, Miroslav Pajic Oct 2012

Embedded Virtual Machines For Robust Wireless Control Systems, Rahul Mangharam, Miroslav Pajic

Rahul Mangharam

Embedded wireless networks have largely focused on open loop sensing and monitoring. To address actuation in closed loop wireless control systems there is a strong need to re-think the communication architectures and protocols for reliability, coordination and control. As the links, nodes and topology of wireless systems are inherently unreliable, such time-critical and safety-critical applications require programming abstractions where the tasks are assigned to the sensors, actuators and controllers as a single component rather than statically mapping a set of tasks to a specific physical node at design time. To this end, we introduce the Embedded Virtual Machine (EVM), a …


Embedded Virtual Machines For Robust Wireless Control And Actuation, Miroslav Pajic, Rahul Mangharam Oct 2012

Embedded Virtual Machines For Robust Wireless Control And Actuation, Miroslav Pajic, Rahul Mangharam

Rahul Mangharam

Embedded wireless networks have largely focused on open-loop sensing and monitoring. To address actuation in closed-loop wireless control systems there is a strong need to re-think the communication architectures and protocols for reliability, coordination and control. As the links, nodes and topology of wireless systems are inherently unreliable, such time-critical and safety-critical applications require programming abstractions and runtime systems where the tasks are assigned to the sensors, actuators and controllers as a single component rather than statically mapping a set of tasks to a specific physical node at design time. To this end, we introduce the Embedded Virtual Machine (EVM), …


Cs 1010: Introduction To Computers And Office Productivity Software, Terri Bauer Oct 2012

Cs 1010: Introduction To Computers And Office Productivity Software, Terri Bauer

Computer Science & Engineering Syllabi

Focus on learning MS Office software applications including intermediate word processing, spreadsheets, database and presentation graphics using a case study approach where critical thinking and problem solving skills are required. Computer concepts are integrated throughout the course to provide an understanding of the basics of computing, the latest technological advances and how they are used in industry. Ethics and issues encountered in business are discussed to challenge students on societal impact of technology.


Cs 1150-01: Introduction To Computer Science, Karen Meyer Oct 2012

Cs 1150-01: Introduction To Computer Science, Karen Meyer

Computer Science & Engineering Syllabi

The Introduction to Computer Science course will expose students to the scientific method as implemented in computer science. The course will show students how the scientific method as implemented in computer science can be used as a problem-solving tool. The course requires students to apply and extend the concepts in a laboratory setting. The concepts will include the study of and methodology of algorithm discovery, design, application, and fundamentals of networks. Lecture and Lab


Cs 1160: Introduction To Computer Programming I, Vanessa Starkey Oct 2012

Cs 1160: Introduction To Computer Programming I, Vanessa Starkey

Computer Science & Engineering Syllabi

Basic concepts of computer programming with an emphasis on structured programming techniques. Includes an introduction to object-oriented programing. Integrated lecture/lab.


Cs 1160: Introduction To Computer Programming I, David M. Hutchison Oct 2012

Cs 1160: Introduction To Computer Programming I, David M. Hutchison

Computer Science & Engineering Syllabi

CS 1160 is the first in a sequence of two programming classes. This course will introduce students to the basic concepts of programming. Examples are from business applications with an emphasis on problem solving with the computer as a tool.


Cs 7840: Soft Computing, John C. Gallagher Oct 2012

Cs 7840: Soft Computing, John C. Gallagher

Computer Science & Engineering Syllabi

No abstract provided.


Cs 1180-06: Computer Programming - I, Jay Dejongh Oct 2012

Cs 1180-06: Computer Programming - I, Jay Dejongh

Computer Science & Engineering Syllabi

Basic concepts of programming and programming languages are introduced. Emphasis is on problem solving and object oriented programming. This course provides a general introduction to the fundamentals of computer science and programming. Examples from and applications to a broad range of problems are given. No prior knowledge of programming is assumed. The concepts covered will be applied to the Java programming language. Students must register for both lecture and one laboratory section. 4 credit hours.


Cs 1181: Computer Science Ii, Mateen M. Rizki Oct 2012

Cs 1181: Computer Science Ii, Mateen M. Rizki

Computer Science & Engineering Syllabi

This is the second course in a two-semester sequence introducing fundamental concepts and techniques for computer science and engineering. The course focuses on problem analysis, advanced programming concepts using JAVA and fundamental data structures. Students learn to analyze problems and evaluate potential solutions with respect to choice of data structures and computational efficiency. Student are exposed to the underlying implementation of basic data structures available in JAVA libraries and develop the skilled needs to extend existing data structures and design new data structures to solve increasingly complex problems.


Cs 1200: Introduction To Discrete Structures, Pascal Hitzler Oct 2012

Cs 1200: Introduction To Discrete Structures, Pascal Hitzler

Computer Science & Engineering Syllabi

No abstract provided.


Cs 2160: Visual Basic Programming, Eric Saunders Oct 2012

Cs 2160: Visual Basic Programming, Eric Saunders

Computer Science & Engineering Syllabi

This course will cover the fundamentals of object-oriented computer programming; with an emphasis on design, structure, debugging, and testing. Visual Basic 2010 will be used for developing programs.


Cs 3100/5100: Data Structures And Algorithms, Keke Chen Oct 2012

Cs 3100/5100: Data Structures And Algorithms, Keke Chen

Computer Science & Engineering Syllabi

This course will cover the fundamentals of algorithm design and analysis, the implementation of classical data structures and control structures, and the basic problem solving techniques.


Cs 2800: Web Design Fundamentals, Mohamed B. Ali Oct 2012

Cs 2800: Web Design Fundamentals, Mohamed B. Ali

Computer Science & Engineering Syllabi

Introduction to basic web design, development, and information management. Topics include design principles, page layout, hierarchal organization, content management, use of color and graphics, privacy policies, accessibility and site organization. HTML, and modern web programming tools are included in the course.


Cs 3180/5180: Comparative Languages, Krishnaprasad Thirunarayan Oct 2012

Cs 3180/5180: Comparative Languages, Krishnaprasad Thirunarayan

Computer Science & Engineering Syllabi

This course will introduce fundamental concepts and paradigms underlying the design of modern programming languages. For concreteness, we study the details of an object-oriented language (e.g. Java, C#, C++), a functional language (e.g., Scheme, and get introduced to multiparadigm languages (e.g., Python, Scala). The overall goal is to enable comparison and evaluation of existing languages. The programming assignments will largely be coded in Java and in Scheme, and optionally in Python or Scala.


Cs 3200/5200: Theoretical Foundations Of Computing, Guozhu Dong Oct 2012

Cs 3200/5200: Theoretical Foundations Of Computing, Guozhu Dong

Computer Science & Engineering Syllabi

CS 3200/5200 is an introduction to (a) formal language and automata theory and (b) computability. For (a), we will examine mechanisms for defining syntax of languages and devices for recognizing languages. Along with the fundamentals of these two topics, the course will investigate the relationships between language definition mechanisms and language recognition devices. For (b), we will study decision problems, the Church-Turing thesis, the undecidability of the Halting Problem, and problem reduction and undecidability. The text will be the third edition of Languages and Machines: An Introduction to the Theory of Computer Science, by Thomas Sudkamp.


Cs 4700/6700: Introduction To Database Management Systems, Soon M. Chung Oct 2012

Cs 4700/6700: Introduction To Database Management Systems, Soon M. Chung

Computer Science & Engineering Syllabi

Survey of logical and physical aspects of database management systems. Entity Relationship and relational models for databases are presented. Physical database design methods, formal DB design concepts, and operating principles of database systems are discussed.


Cs 4810: Algorithms For Bioinformatics, Michael L. Raymer Oct 2012

Cs 4810: Algorithms For Bioinformatics, Michael L. Raymer

Computer Science & Engineering Syllabi

No abstract provided.