Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

Series

2014

Institution
Keyword
Publication

Articles 1 - 30 of 150

Full-Text Articles in Engineering

Online Learning On Incremental Distance Metric For Person Re-Identification, Yuke Sun, Hong Liu, Qianru Sun Dec 2014

Online Learning On Incremental Distance Metric For Person Re-Identification, Yuke Sun, Hong Liu, Qianru Sun

Research Collection School Of Computing and Information Systems

Person re-identification is to match persons appearing across non-overlapping cameras. The matching is challenging due to visual ambiguities and disparities of human bodies. Most previous distance metrics are learned by off-line and supervised approaches. However, they are not practical in real-world applications in which online data comes in without any label. In this paper, a novel online learning approach on incremental distance metric, OL-IDM, is proposed. The approach firstly modifies Self-Organizing Incremental Neural Network (SOINN) using Mahalanobis distance metric to cluster incoming data into neural nodes. Such metric maximizes the likelihood of a true image pair matches with a smaller …


Human Action Classification Based On Sequential Bag-Of-Words Model, Hong Liu, Qiaoduo Zhang, Qianru Sun Dec 2014

Human Action Classification Based On Sequential Bag-Of-Words Model, Hong Liu, Qiaoduo Zhang, Qianru Sun

Research Collection School Of Computing and Information Systems

Recently, approaches utilizing spatial-temporal features have achieved great success in human action classification. However, they typically rely on bag-of-words (BoWs) model, and ignore the spatial and temporal structure information of visual words, bringing ambiguities among similar actions. In this paper, we present a novel approach called sequential BoWs for efficient human action classification. It captures temporal sequential structure by segmenting the entire action into sub-actions. Each sub-action has a tiny movement within a narrow range of action. Then the sequential BoWs are created, in which each sub-action is assigned with a certain weight and salience to highlight the distinguishing sections. …


College Of Engineering Senior Design Competition Fall 2014, University Of Nevada, Las Vegas Dec 2014

College Of Engineering Senior Design Competition Fall 2014, University Of Nevada, Las Vegas

Fred and Harriet Cox Senior Design Competition Projects

Part of every UNLV engineering student’s academic experience, the senior design project stimulates engineering innovation and entrepreneurship. Each student in their senior year chooses, plans, designs, and prototypes a product in this required element of the curriculum. A capstone to the student’s educational career, the senior design project encourages the student to use everything learned in the engineering program to create a practical, real world solution to an engineering challenge. The senior design competition helps focus the senior students in increasing the quality and potential for commercial application for their design projects. Judges from local industry evaluate the projects on …


Vehicle Base Station, Emad William Saad, John L. Vian, Matthew A. Vavrina, Jared A. Nisbett, Donald C. Wunsch Dec 2014

Vehicle Base Station, Emad William Saad, John L. Vian, Matthew A. Vavrina, Jared A. Nisbett, Donald C. Wunsch

Electrical and Computer Engineering Faculty Research & Creative Works

A system to load and unload material from a vehicle comprises a vehicle base station and an assembly to autonomously load and unload material from the vehicle.


Security Issues In Data Warehouse, Saiqa Aleem, Luiz Fernando Capretz, Faheem Ahmed Dr. Dec 2014

Security Issues In Data Warehouse, Saiqa Aleem, Luiz Fernando Capretz, Faheem Ahmed Dr.

Electrical and Computer Engineering Publications

Data Warehouse (DWH) provides storage for huge amounts of historical data from heterogeneous operational sources in the form of multidimensional views, thus supplying sensitive and useful information which help decision-makers to improve the organization’s business processes. A data warehouse environment must ensure that data collected and stored in one big repository are not vulnerable. A review of security approaches specifically for data warehouse environment and issues concerning each type of security approach have been provided in this paper.


Second Order-Response Surface Model For The Automated Parameter Tuning Problem, Aldy Gunawan, Hoong Chuin Lau Dec 2014

Second Order-Response Surface Model For The Automated Parameter Tuning Problem, Aldy Gunawan, Hoong Chuin Lau

Research Collection School Of Computing and Information Systems

Several automated parameter tuning procedures/configurators have been proposed in order to find the best parameter setting for a target algorithm. These configurators can generally be classified into model-free and model-based approaches. We introduce a recent approach which is based on the hybridization of both approaches. It combines the Design of Experiments (DOE) and Response Surface Methodology (RSM) with prevailing model-free techniques. DOE is mainly used for determining the importance of parameters. A First Order-RSM is initially employed to define the promising region for the important parameters. A Second Order-RSM is then built to approximate the center point as well as …


Data Transport System, Rahav Dor Dec 2014

Data Transport System, Rahav Dor

All Computer Science and Engineering Research

To facilitate the WU Smart Home research [21] we built a system that collects data from sensors and uploads the data to the cloud. The system supports data collection from multiple locations (typically apartments) that are independent from each other, endowing the system with two benefit: distributed data collection and alleviating privacy concerns. Each location is managed by a local micro-server (μServer) that is responsible for receiving data packets from sensors and managing their transient storage. Periodically the μServer triggers a data transport process that moves the data to a cloud server where it is stored in a centralized database. …


Is The Smartphone Smart In Kathmandu?, Seth Bird Dec 2014

Is The Smartphone Smart In Kathmandu?, Seth Bird

Independent Study Project (ISP) Collection

This is the extensive study of the smartphone in the developing country of Nepal, specifically the Kathmandu valley. Throughout my research I conducted various interviews with businesses, Tibetan refugees, and Nepali millennials (18yrs-33yrs) with the goal of identifying how the smartphone is used and understood. I chose the Kathmandu valley as my main area of research because the usage of smartphones in rural Nepal is extremely limited, and the valley represents the economic hub where progressive thinking flourishes. As a main objective I sought to understand how, if at all, the smartphone is used differently between Nepal and America. All …


The Cadet Training Program Versus The Student Certification Program: A Study Of It- Support Training Programs At Western Kentucky University, Michael Courtney Moore Dec 2014

The Cadet Training Program Versus The Student Certification Program: A Study Of It- Support Training Programs At Western Kentucky University, Michael Courtney Moore

Masters Theses & Specialist Projects

Technology is a critical component of modern-day success. Advancements in technology have improved communication between individuals and companies. Technological advancements have allowed students to earn college degrees online. People who habitually use technology expect a high level of performance and support. As new technologies are implemented, such as complex web services or new operating systems, the dependence for information technology (IT) support grows in demand. Even learning curves can be cumbersome without proper assistance from IT professionals. Companies and institutions must accommodate user needs by implementing fast, efficient, and friendly support. In order to offer optimal customer support, representatives must …


Exploring User-Provided Connectivity, Mohammad H. Afrasiabi, Roch Guerin Nov 2014

Exploring User-Provided Connectivity, Mohammad H. Afrasiabi, Roch Guerin

All Computer Science and Engineering Research

Network services often exhibit positive and negative externalities that affect users' adoption decisions. One such service is "user-provided connectivity" or UPC. The service offers an alternative to traditional infrastructure-based communication services by allowing users to share their "home base" connectivity with other users, thereby increasing their access to connectivity. More users mean more connectivity alternatives, i.e., a positive externality, but also greater odds of having to share one's own connectivity, i.e., a negative externality. The tug of war between positive and negative externalities together with the fact that they often depend not just on how many but also which users …


Techniques For Efficient Execution Of Large-Scale Scientific Workflows In Distributed Environments, Selim Kalayci Nov 2014

Techniques For Efficient Execution Of Large-Scale Scientific Workflows In Distributed Environments, Selim Kalayci

FIU Electronic Theses and Dissertations

Scientific exploration demands heavy usage of computational resources for large-scale and deep analysis in many different fields. The complexity or the sheer scale of the computational studies can sometimes be encapsulated in the form of a workflow that is made up of numerous dependent components. Due to its decomposable and parallelizable nature, different components of a scientific workflow may be mapped over a distributed resource infrastructure to reduce time to results. However, the resource infrastructure may be heterogeneous, dynamic, and under diverse administrative control. Workflow management tools are utilized to help manage and deal with various aspects in the lifecycle …


A New Transfer Impedance Based System Equivalent Model For Voltage Stability Analysis, Yang Wang, Caisheng Wang, Feng Lin, Wenyuan Li, Le Yi Wang, Junhui Zhao Nov 2014

A New Transfer Impedance Based System Equivalent Model For Voltage Stability Analysis, Yang Wang, Caisheng Wang, Feng Lin, Wenyuan Li, Le Yi Wang, Junhui Zhao

Electrical & Computer Engineering and Computer Science Faculty Publications

This paper presents a new transfer impedance based system equivalent model (TISEM) for voltage stability analysis. The TISEM can be used not only to identify the weakest nodes (buses) and system voltage stability, but also to calculate the amount of real and reactive power transferred from the generator nodes to the vulnerable node causing voltage instability. As a result, a full-scale view of voltage stability of the whole system can be presented in front of system operators. This useful information can help operators take proper actions to avoid voltage collapse. The feasibility and effectiveness of the TISEM are further validated …


Designing A Bayer Filter With Smooth Hue Transition Interpolation Using The Xilinx System Generator, Zhiqiang Li, Peter Revesz Nov 2014

Designing A Bayer Filter With Smooth Hue Transition Interpolation Using The Xilinx System Generator, Zhiqiang Li, Peter Revesz

CSE Conference and Workshop Papers

This paper describes the design of a Bayer filter with smooth hue transition using the System Generator for DSP. We describe and compare experimentally two different designs, one based on a MATLAB implementation and the other based on a modification of the Bayer filter using bilinear interpolation.


A Game-Theoretic Analysis Of The Nuclear Non-Proliferation Treaty, Peter Revesz Nov 2014

A Game-Theoretic Analysis Of The Nuclear Non-Proliferation Treaty, Peter Revesz

CSE Conference and Workshop Papers

Although nuclear non-proliferation is an almost universal human desire, in practice, the negotiated treaties appear unable to prevent the steady growth of the number of states that have nuclear weapons. We propose a computational model for understanding the complex issues behind nuclear arms negotiations, the motivations of various states to enter a nuclear weapons program and the ways to diffuse crisis situations.


Estimating The Flight Path Of Moving Objects Based On Acceleration Data, Peter Revesz Nov 2014

Estimating The Flight Path Of Moving Objects Based On Acceleration Data, Peter Revesz

CSE Conference and Workshop Papers

Inertial navigation is the problem of estimating the flight path of a moving object based on only acceleration measurements. This paper describes and compares two approaches for inertial navigation. Both approaches estimate the flight path of the moving object using cubic spline interpolation, but they find the coefficients of the cubic spline pieces by different methods. The first approach uses a tridiagonal matrix, while the second approach uses recurrence equations. They also require different boundary conditions. While both approaches work in O(n) time where n is the number of given acceleration measurements, the recurrence equation-based method can be easier updated …


Cubic Spline Interpolation By Solving A Recurrence Equation Instead Of A Tridiagonal Matrix, Peter Revesz Nov 2014

Cubic Spline Interpolation By Solving A Recurrence Equation Instead Of A Tridiagonal Matrix, Peter Revesz

CSE Conference and Workshop Papers

The cubic spline interpolation method is proba- bly the most widely-used polynomial interpolation method for functions of one variable. However, the cubic spline method requires solving a tridiagonal matrix-vector equation with an O(n) computational time complexity where n is the number of data measurements. Even an O(n) time complexity may be too much in some time-ciritical applications, such as continuously estimating and updating the flight paths of moving objects. This paper shows that under certain boundary conditions the tridiagonal matrix solving step of the cubic spline method could be entirely eliminated and instead the coefficients of the unknown cubic polynomials …


Traccs: Trajectory-Aware Coordinated Urban Crowd-Sourcing, Cen Chen, Shih-Fen Cheng, Aldy Gunawan, Archan Misra, Koustuv Dasgupta, Deepthi Chander Nov 2014

Traccs: Trajectory-Aware Coordinated Urban Crowd-Sourcing, Cen Chen, Shih-Fen Cheng, Aldy Gunawan, Archan Misra, Koustuv Dasgupta, Deepthi Chander

Research Collection School Of Computing and Information Systems

We investigate the problem of large-scale mobile crowd-tasking, where a large pool of citizen crowd-workers are used to perform a variety of location-specific urban logistics tasks. Current approaches to such mobile crowd-tasking are very decentralized: a crowd-tasking platform usually provides each worker a set of available tasks close to the worker's current location; each worker then independently chooses which tasks she wants to accept and perform. In contrast, we propose TRACCS, a more coordinated task assignment approach, where the crowd-tasking platform assigns a sequence of tasks to each worker, taking into account their expected location trajectory over a wider time …


Click-Through-Based Subspace Learning For Image Search, Yingwei Pan, Ting Yao, Xinmei Tian, Houqiang Li, Chong-Wah Ngo Nov 2014

Click-Through-Based Subspace Learning For Image Search, Yingwei Pan, Ting Yao, Xinmei Tian, Houqiang Li, Chong-Wah Ngo

Research Collection School Of Computing and Information Systems

One of the fundamental problems in image search is to rank image documents according to a given textual query. We address two limitations of the existing image search engines in this paper. First, there is no straightforward way of comparing textual keywords with visual image content. Image search engines therefore highly depend on the surrounding texts, which are often noisy or too few to accurately describe the image content. Second, ranking functions are trained on query-image pairs labeled by human labelers, making the annotation intellectually expensive and thus cannot be scaled up. We demonstrate that the above two fundamental challenges …


Vireo @ Trecvid 2014: Instance Search And Semantic Indexing, Wei Zhang, Hao Zhang, Ting Yao, Yijie Lu, Jingjing Chen, Chong-Wah Ngo Nov 2014

Vireo @ Trecvid 2014: Instance Search And Semantic Indexing, Wei Zhang, Hao Zhang, Ting Yao, Yijie Lu, Jingjing Chen, Chong-Wah Ngo

Research Collection School Of Computing and Information Systems

This paper summarizes the following two tasks participated by VIREO group: instance search and semantic indexing. We will present our approaches and analyze the results obtained in TRECVID 2014 benchmark evaluation


Organizing Video Search Results To Adapted Semantic Hierarchies For Topic-Based Browsing, Jiajun Wang, Yu-Gang Jiang, Qiang Wang, Kuiyuan Yang, Chong-Wah Ngo Nov 2014

Organizing Video Search Results To Adapted Semantic Hierarchies For Topic-Based Browsing, Jiajun Wang, Yu-Gang Jiang, Qiang Wang, Kuiyuan Yang, Chong-Wah Ngo

Research Collection School Of Computing and Information Systems

Organizing video search results into semantically structured hierarchies can greatly improve the efficiency of browsing complex query topics. Traditional hierarchical clustering techniques are inadequate since they lack the ability to generate semantically interpretable structures. In this paper, we introduce an approach to organize video search results to an adapted semantic hierarchy. As many hot search topics such as celebrities and famous cities have Wikipedia pages where hierarchical topic structures are available, we start from the Wikipedia hierarchies and adjust the structures according to the characteristics of the returned videos from a search engine. Ordinary clustering based on textual information of …


Cama: Efficient Modeling Of The Capture Effect For Low Power Wireless Networks, Behnam Dezfouli, Marjan Radi, Kamin Whitehouse, Shukor Abd Razak, Hwee-Pink Tan Nov 2014

Cama: Efficient Modeling Of The Capture Effect For Low Power Wireless Networks, Behnam Dezfouli, Marjan Radi, Kamin Whitehouse, Shukor Abd Razak, Hwee-Pink Tan

Research Collection School Of Computing and Information Systems

Network simulation is an essential tool for the design and evaluation of wireless network protocols, and realistic channel modeling is essential for meaningful analysis. Recently, several network protocols have demonstrated substantial network performance improvements by exploiting the capture effect, but existing models of the capture effect are still not adequate for protocol simulation and analysis. Physical-level models that calculate the signal-to-interference-plus-noise ratio (SINR) for every incoming bit are too slow to be used for large-scale or long-term networking experiments, and link-level models such as those currently used by the NS2 simulator do not accurately predict protocol performance. In this article, …


Distributed Owl El Reasoning: The Story So Far, Raghava Mutharaju, Pascal Hitzler, Prabhaker Mateti Oct 2014

Distributed Owl El Reasoning: The Story So Far, Raghava Mutharaju, Pascal Hitzler, Prabhaker Mateti

Computer Science and Engineering Faculty Publications

Automated generation of axioms from streaming data, such as traffic and text, can result in very large ontologies that single machine reasoners cannot handle. Reasoning with large ontologies requires distributed solutions. Scalable reasoning techniques for RDFS, OWL Horst and OWL 2 RL now exist. For OWL 2 EL, several distributed reasoning approaches have been tried, but are all perceived to be inefficient. We analyze this perception. We analyze completion rule based distributed approaches, using different characteristics, such as dependency among the rules, implementation optimizations, how axioms and rules are distributed. We also present a distributed queue approach for the classification …


Pushing The Boundaries Of Tractable Ontology Reasoning, David Carral, Cristina Feier, Bernardo Cuenca Grau, Pascal Hitzler, Ian Horrocks Oct 2014

Pushing The Boundaries Of Tractable Ontology Reasoning, David Carral, Cristina Feier, Bernardo Cuenca Grau, Pascal Hitzler, Ian Horrocks

Computer Science and Engineering Faculty Publications

We identify a class of Horn ontologies for which standard reasoning tasks such as instance checking and classification are tractable. The class is general enough to include the OWL 2 EL, QL, and RL profiles. Verifying whether a Horn ontology belongs to the class can be done in polynomial time. We show empirically that the class includes many real-world ontologies that are not included in any OWL 2 profile, and thus that polynomial time reasoning is possible for these ontologies.


Action Classification By Exploring Directional Co-Occurrence Of Weighted Stips, Mengyuan Liu, Hong Liu, Qianru Sun Oct 2014

Action Classification By Exploring Directional Co-Occurrence Of Weighted Stips, Mengyuan Liu, Hong Liu, Qianru Sun

Research Collection School Of Computing and Information Systems

Human action recognition is challenging mainly due to intro-variety, inter-ambiguity and clutter backgrounds in real videos. Bag-of-visual words model utilizes spatio-temporal interest points(STIPs), and represents action by the distribution of points which ignores visual context among points. To add more contextual information, we propose a method by encoding spatio-temporal distribution of weighted pairwise points. First, STIPs are extracted from an action sequence and clustered into visual words. Then, each word is weighted in both temporal and spatial domains to capture the relationships with other words. Finally, the directional relationships between co-occurrence pairwise words are used to encode visual contexts. We …


Hippi Care Hospital: Towards Proactive Business Processes In Emergency Room Services, Kar Way Tan, Venky Shankaraman Oct 2014

Hippi Care Hospital: Towards Proactive Business Processes In Emergency Room Services, Kar Way Tan, Venky Shankaraman

Research Collection School Of Computing and Information Systems

It was 2.35 am on a Saturday morning. Wiki Lim, process specialist from the Process Innovation Centre (PIC) of Hippi Care Hospital (HCH), desperately doodling on her notepad for ideas to improve service delivery at HCH’s Emergency Department (ED). HCH has committed to the public that its ED would meet the service quality criterion of serving 90% of A3 and A4 patients, non-emergency patients with moderate to mild symptoms, within 90 minutes of their arrival at the ED. The ED was not able to meet this performance goal and Dr. Edward Kim, the head of the ED at HCH, had …


Survey On Wakeup Scheduling For Environmentally-Powered Wireless Sensor Networks, Alvin Cerdena Valera, Wee-Seng Soh, Hwee-Pink Tan Oct 2014

Survey On Wakeup Scheduling For Environmentally-Powered Wireless Sensor Networks, Alvin Cerdena Valera, Wee-Seng Soh, Hwee-Pink Tan

Research Collection School Of Computing and Information Systems

Advances in energy harvesting technologies and ultra low-power computing and communication devices are enabling the realization of environmentally-powered wireless sensor networks (EPWSNs). Because of limited and dynamic energy supply, EPWSNs are duty-cycled to achieve energy-neutrality, a condition where the energy demand does not exceed the energy supply. Duty cycling entails nodes to sleep and wakeup according to a wakeup scheduling scheme. In this paper, we survey the various wakeup scheduling schemes, with focus on their suitability for EPWSNs. A classification scheme is proposed to characterize existing wakeup scheduling schemes, with three main categories, namely, asynchronous, synchronous, and …


Timing Mark Detection On Nuclear Detonation Video, Daniel T. Schmitt, Gilbert L. Peterson Oct 2014

Timing Mark Detection On Nuclear Detonation Video, Daniel T. Schmitt, Gilbert L. Peterson

Faculty Publications

During the 1950s and 1960s the United States conducted and filmed over 200 atmospheric nuclear tests establishing the foundations of atmospheric nuclear detonation behavior. Each explosion was documented with about 20 videos from three or four points of view. Synthesizing the videos into a 3D video will improve yield estimates and reduce error factors. The videos were captured at a nominal 2500 frames per second, but range from 2300-3100 frames per second during operation. In order to combine them into one 3D video, individual video frames need to be correlated in time with each other. When the videos were captured …


Machine Learning Nuclear Detonation Features, Daniel T. Schmitt, Gilbert L. Peterson Oct 2014

Machine Learning Nuclear Detonation Features, Daniel T. Schmitt, Gilbert L. Peterson

Faculty Publications

Nuclear explosion yield estimation equations based on a 3D model of the explosion volume will have a lower uncertainty than radius based estimation. To accurately collect data for a volume model of atmospheric explosions requires building a 3D representation from 2D images. The majority of 3D reconstruction algorithms use the SIFT (scale-invariant feature transform) feature detection algorithm which works best on feature-rich objects with continuous angular collections. These assumptions are different from the archive of nuclear explosions that have only 3 points of view. This paper reduces 300 dimensions derived from an image based on Fourier analysis and five edge …


Multi-Agent Orienteering Problem With Time-Dependent Capacity Constraints, Cen Chen, Shih-Fen Cheng, Hoong Chuin Lau Oct 2014

Multi-Agent Orienteering Problem With Time-Dependent Capacity Constraints, Cen Chen, Shih-Fen Cheng, Hoong Chuin Lau

Research Collection School Of Computing and Information Systems

In this paper, we formulate and study the Multi-agent Orienteering Problem with Time-dependent Capacity Constraints (MOPTCC). MOPTCC is similar to the classical orienteering problem at single-agent level: given a limited time budget, an agent travels around the network and collects rewards by visiting different nodes, with the objective of maximizing the sum of his collected rewards. The most important feature we introduce in MOPTCC is the inclusion of multiple competing agents. All agents in MOPTCC are assumed to be self-interested, and they interact with each other when arrive at certain nodes simultaneously. As all nodes are capacitated, if a particular …


Metabolomics Characterization Of U.S. And Japanese F-15 And C-130 Flight Line Crews Exposed To Jet Fuel Volatile Organic Compounds And Aerosols, Nicholas J. Delraso, David Mattie, Asao Kobayashi, Stephen W. Mitchell, Scott Dillard, Michael L. Raymer, Isaie Sibomana, Nicholas V. Reo Sep 2014

Metabolomics Characterization Of U.S. And Japanese F-15 And C-130 Flight Line Crews Exposed To Jet Fuel Volatile Organic Compounds And Aerosols, Nicholas J. Delraso, David Mattie, Asao Kobayashi, Stephen W. Mitchell, Scott Dillard, Michael L. Raymer, Isaie Sibomana, Nicholas V. Reo

Computer Science and Engineering Faculty Publications

Air and ground crews transfer a significant amount of jet fuel, and as a result of transfers, breathe its volatile emission from residues. Working on the flight line also exposes maintainers to exhaust from the jet fuel as engines are tested or run before and after flight. Since little is known concerning level of exposure and the corresponding biological response associated with human jet fuel exposure, nuclear magnetic resonance (NMR)-based metabolomics analysis of human urine was utilized for characterization of metabolite profiles of flight line personnel for potential biomarker discovery. This project was a collaborative research effort between the US …