Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Science Faculty Publications

Series

Discipline
Institution
Keyword
Publication Year

Articles 1 - 30 of 120

Full-Text Articles in Engineering

Triphlapan: Predicting Hla Molecules Binding Peptides Based On Triple Coding Matrix And Transfer Learning, Meng Wang, Chuqi Lei, Jianxin Wang, Yaohang Li, Min Li Jan 2024

Triphlapan: Predicting Hla Molecules Binding Peptides Based On Triple Coding Matrix And Transfer Learning, Meng Wang, Chuqi Lei, Jianxin Wang, Yaohang Li, Min Li

Computer Science Faculty Publications

Human leukocyte antigen (HLA) recognizes foreign threats and triggers immune responses by presenting peptides to T cells. Computationally modeling the binding patterns between peptide and HLA is very important for the development of tumor vaccines. However, it is still a big challenge to accurately predict HLA molecules binding peptides. In this paper, we develop a new model TripHLApan for predicting HLA molecules binding peptides by integrating triple coding matrix, BiGRU + Attention models, and transfer learning strategy. We have found the main interaction site regions between HLA molecules and peptides, as well as the correlation between HLA encoding and binding …


A Survey On Few-Shot Class-Incremental Learning, Songsong Tian, Lusi Li, Weijun Li, Hang Ran, Xin Ning, Prayag Tiwari Jan 2024

A Survey On Few-Shot Class-Incremental Learning, Songsong Tian, Lusi Li, Weijun Li, Hang Ran, Xin Ning, Prayag Tiwari

Computer Science Faculty Publications

Large deep learning models are impressive, but they struggle when real-time data is not available. Few-shot class-incremental learning (FSCIL) poses a significant challenge for deep neural networks to learn new tasks from just a few labeled samples without forgetting the previously learned ones. This setup can easily leads to catastrophic forgetting and overfitting problems, severely affecting model performance. Studying FSCIL helps overcome deep learning model limitations on data volume and acquisition time, while improving practicality and adaptability of machine learning models. This paper provides a comprehensive survey on FSCIL. Unlike previous surveys, we aim to synthesize few-shot learning and incremental …


A Chinese Power Text Classification Algorithm Based On Deep Active Learning, Song Deng, Qianliang Li, Renjie Dai, Siming Wei, Di Wu, Yi He, Xindong Wu Jan 2024

A Chinese Power Text Classification Algorithm Based On Deep Active Learning, Song Deng, Qianliang Li, Renjie Dai, Siming Wei, Di Wu, Yi He, Xindong Wu

Computer Science Faculty Publications

The construction of knowledge graph is beneficial for grid production, electrical safety protection, fault diagnosis and traceability in an observable and controllable way. Highly-precision text classification algorithm is crucial to build a professional knowledge graph in power system. Unfortunately, there are a large number of poorly described and specialized texts in the power business system, and the amount of data containing valid labels in these texts is low. This will bring great challenges to improve the precision of text classification models. To offset the gap, we propose a classification algorithm for Chinese text in the power system based on deep …


Autonomous Strike Uavs For Counterterrorism Missions: Challenges And Preliminary Solutions, Meshari Aljohani, Ravi Mukkamala, Stephan Olariu Jan 2024

Autonomous Strike Uavs For Counterterrorism Missions: Challenges And Preliminary Solutions, Meshari Aljohani, Ravi Mukkamala, Stephan Olariu

Computer Science Faculty Publications

UAVs are becoming a crucial tool in modern warfare, primarily due to their cost-effectiveness, risk reduction, and ability to perform a wider range of activities. The use of autonomous UAVs to conduct strike missions against highly valuable targets is the focus of this research. Due to developments in ledger technology, smart contracts, and machine learning, such activities formerly carried out by professionals or remotely flown UAVs are now feasible. Our study provides the first in-depth analysis of challenges and potential solutions for successful implementation of an autonomous UAV mission.


Enhancing Neural Text Detector Robustness With Μattacking And Rr-Training, Gongbo Liang, Jesus Guerrero, Fengbo Zheng, Izzat Alsmadi Apr 2023

Enhancing Neural Text Detector Robustness With Μattacking And Rr-Training, Gongbo Liang, Jesus Guerrero, Fengbo Zheng, Izzat Alsmadi

Computer Science Faculty Publications

With advanced neural network techniques, language models can generate content that looks genuinely created by humans. Such advanced progress benefits society in numerous ways. However, it may also bring us threats that we have not seen before. A neural text detector is a classification model that separates machine-generated text from human-written ones. Unfortunately, a pretrained neural text detector may be vulnerable to adversarial attack, aiming to fool the detector into making wrong classification decisions. Through this work, we propose µAttacking, a mutation-based general framework that can be used to evaluate the robustness of neural text detectors systematically. Our experiments demonstrate …


Efficient Training On Alzheimer’S Disease Diagnosis With Learnable Weighted Pooling For 3d Pet Brain Image Classification, Xin Xing, Muhammad Usman Rafique, Gongbo Liang, Hunter Blanton, Zu Zhang, Chris Wang, Nathan Jacobs, Ai-Ling Lin Jan 2023

Efficient Training On Alzheimer’S Disease Diagnosis With Learnable Weighted Pooling For 3d Pet Brain Image Classification, Xin Xing, Muhammad Usman Rafique, Gongbo Liang, Hunter Blanton, Zu Zhang, Chris Wang, Nathan Jacobs, Ai-Ling Lin

Computer Science Faculty Publications

Three-dimensional convolutional neural networks (3D CNNs) have been widely applied to analyze Alzheimer’s disease (AD) brain images for a better understanding of the disease progress or predicting the conversion from cognitively impaired (CU) or mild cognitive impairment status. It is well-known that training 3D-CNN is computationally expensive and with the potential of overfitting due to the small sample size available in the medical imaging field. Here we proposed a novel 3D-2D approach by converting a 3D brain image to a 2D fused image using a Learnable Weighted Pooling (LWP) method to improve efficient training and maintain comparable model performance. By …


Hashes Are Not Suitable To Verify Fixity Of The Public Archived Web, Mohamed Aturban, Martin Klein, Herbert Van De Sompel, Sawood Alam, Michael L. Nelson, Michele C. Weigle Jan 2023

Hashes Are Not Suitable To Verify Fixity Of The Public Archived Web, Mohamed Aturban, Martin Klein, Herbert Van De Sompel, Sawood Alam, Michael L. Nelson, Michele C. Weigle

Computer Science Faculty Publications

Web archives, such as the Internet Archive, preserve the web and allow access to prior states of web pages. We implicitly trust their versions of archived pages, but as their role moves from preserving curios of the past to facilitating present day adjudication, we are concerned with verifying the fixity of archived web pages, or mementos, to ensure they have always remained unaltered. A widely used technique in digital preservation to verify the fixity of an archived resource is to periodically compute a cryptographic hash value on a resource and then compare it with a previous hash value. If the …


Mitigating Anomalous Electricity Consumption In Smart Cities Using An Ai-Based Stacked-Generalization Technique, Arshid Ali, Laiq Khan, Nadeem Javaid, Safdar Hussain Bouk, Abdulaziz Aldegheishem, Nabil Alrahjeh Jan 2023

Mitigating Anomalous Electricity Consumption In Smart Cities Using An Ai-Based Stacked-Generalization Technique, Arshid Ali, Laiq Khan, Nadeem Javaid, Safdar Hussain Bouk, Abdulaziz Aldegheishem, Nabil Alrahjeh

Computer Science Faculty Publications

Energy management and efficient asset utilization play an important role in the economic development of a country. The electricity produced at the power station faces two types of losses from the generation point to the end user. These losses are technical losses (TL) and non-technical losses (NTL). TLs occurs due to the use of inefficient equipment. While NTLs occur due to the anomalous consumption of electricity by the customers, which happens in many ways; energy theft being one of them. Energy theft majorly happens to cut down on the electricity bills. These losses in the smart grid (SG) are the …


Optimization Of Ported Cfd Kernels On Intel Data Center Gpu Max 1550 Using Oneapi Esimd, Mohammad Zubair, Aaron Walden, Gabriel Nastac, Eric Nielsen, Christoph Bauinger, Xiao Zhu Jan 2023

Optimization Of Ported Cfd Kernels On Intel Data Center Gpu Max 1550 Using Oneapi Esimd, Mohammad Zubair, Aaron Walden, Gabriel Nastac, Eric Nielsen, Christoph Bauinger, Xiao Zhu

Computer Science Faculty Publications

We describe our experience porting FUN3D’s CUDA-optimized kernels to Intel oneAPI SYCL.We faced several challenges, including foremost the suboptimal performance of the oneAPI code on Intel’s new data center GPU. Suboptimal performance of the oneAPI code was due primarily to high register spills, memory latency, and poor vectorization. We addressed these issues by implementing the kernels using Intel oneAPI’s Explicit SIMD SYCL extension (ESIMD) API. The ESIMD API enables the writing of explicitly vectorized kernel code, gives more precise control over register usage and prefetching, and better handles thread divergence compared to SYCL. The ESIMD code outperforms the optimized SYCL …


A Structure-Aware Generative Adversarial Network For Bilingual Lexicon Induction, Bocheng Han, Qian Tao, Lusi Li, Zhihao Xiong Jan 2023

A Structure-Aware Generative Adversarial Network For Bilingual Lexicon Induction, Bocheng Han, Qian Tao, Lusi Li, Zhihao Xiong

Computer Science Faculty Publications

Bilingual lexicon induction (BLI) is the task of inducing word translations with a learned mapping function that aligns monolingual word embedding spaces in two different languages. However, most previous methods treat word embeddings as isolated entities and fail to jointly consider both the intra-space and inter-space topological relations between words. This limitation makes it challenging to align words from embedding spaces with distinct topological structures, especially when the assumption of isomorphism may not hold. To this end, we propose a novel approach called the Structure-Aware Generative Adversarial Network (SA-GAN) model to explicitly capture multiple topological structure information to achieve accurate …


Efficient Gpu Implementation Of Automatic Differentiation For Computational Fluid Dynamics, Mohammad Zubair, Desh Ranjan, Aaron Walden, Gabriel Nastac, Eric Nielsen, Boris Diskin, Marc Paterno, Samuel Jung, Joshua Hoke Davis Jan 2023

Efficient Gpu Implementation Of Automatic Differentiation For Computational Fluid Dynamics, Mohammad Zubair, Desh Ranjan, Aaron Walden, Gabriel Nastac, Eric Nielsen, Boris Diskin, Marc Paterno, Samuel Jung, Joshua Hoke Davis

Computer Science Faculty Publications

Many scientific and engineering applications require repeated calculations of derivatives of output functions with respect to input parameters. Automatic Differentiation (AD) is a method that automates derivative calculations and can significantly speed up code development. In Computational Fluid Dynamics (CFD), derivatives of flux functions with respect to state variables (Jacobian) are needed for efficient solutions of the nonlinear governing equations. AD of flux functions on graphics processing units (GPUs) is challenging as flux computations involve many intermediate variables that create high register pressure and require significant memory traffic because of the need to store the derivatives. This paper presents a …


A Single-Cell Atlas Of Bovine Skeletal Muscle Reveals Mechanisms Regulating Intramuscular Adipogenesis And Fibrogenesis, Leshan Wang, Peidong Gao, Chaoyang Li, Qianglin Liu, Zeyang Yao, Yuxia Li, Xujia Zhang, Jiangwen Sun, Constantine Simintiras, Matthew Welborn, Kenneth Mcmillin, Stephanie Oprescu, Shihuan Kuang, Xing Fu Jan 2023

A Single-Cell Atlas Of Bovine Skeletal Muscle Reveals Mechanisms Regulating Intramuscular Adipogenesis And Fibrogenesis, Leshan Wang, Peidong Gao, Chaoyang Li, Qianglin Liu, Zeyang Yao, Yuxia Li, Xujia Zhang, Jiangwen Sun, Constantine Simintiras, Matthew Welborn, Kenneth Mcmillin, Stephanie Oprescu, Shihuan Kuang, Xing Fu

Computer Science Faculty Publications

Background

Intramuscular fat (IMF) and intramuscular connective tissue (IMC) are often seen in human myopathies and are central to beef quality. The mechanisms regulating their accumulation remain poorly understood. Here, we explored the possibility of using beef cattle as a novel model for mechanistic studies of intramuscular adipogenesis and fibrogenesis.

Methods

Skeletal muscle single-cell RNAseq was performed on three cattle breeds, including Wagyu (high IMF), Brahman (abundant IMC but scarce IMF), and Wagyu/Brahman cross. Sophisticated bioinformatics analyses, including clustering analysis, gene set enrichment analyses, gene regulatory network construction, RNA velocity, pseudotime analysis, and cell-cell communication analysis, were performed to elucidate …


Evaluating Human Eye Features For Objective Measure Of Working Memory Capacity, Yasasi Abeysinghe, Enkelejda Kasneci (Ed.), Frederick Shic (Ed.), Mohamed Khamis (Ed.) Jan 2023

Evaluating Human Eye Features For Objective Measure Of Working Memory Capacity, Yasasi Abeysinghe, Enkelejda Kasneci (Ed.), Frederick Shic (Ed.), Mohamed Khamis (Ed.)

Computer Science Faculty Publications

Eye tracking measures can provide means to understand the underlying development of human working memory. In this study, we propose to develop machine learning algorithms to find an objective relationship between human eye movements via oculomotor plant and their working memory capacity, which determines subjective cognitive load. Here we evaluate oculomotor plant features extracted from saccadic eye movements, traditional positional gaze metrics, and advanced eye metrics such as ambient/focal coefficient , gaze transition entropy, low/high index of pupillary activity (LHIPA), and real-time index of pupillary activity (RIPA). This paper outlines the proposed approach of evaluating eye movements for obtaining an …


Dfhic: A Dilated Full Convolution Model To Enhance The Resolution Of Hi-C Data, Bin Wang, Kun Liu, Yaohang Li, Jianxin Wang Jan 2023

Dfhic: A Dilated Full Convolution Model To Enhance The Resolution Of Hi-C Data, Bin Wang, Kun Liu, Yaohang Li, Jianxin Wang

Computer Science Faculty Publications

Motivation: Hi-C technology has been the most widely used chromosome conformation capture(3C) experiment that measures the frequency of all paired interactions in the entire genome, which is a powerful tool for studying the 3D structure of the genome. The fineness of the constructed genome structure depends on the resolution of Hi-C data. However, due to the fact that high-resolution Hi-C data require deep sequencing and thus high experimental cost, most available Hi-C data are in low-resolution. Hence, it is essential to enhance the quality of Hi-C data by developing the effective computational methods.

Results: In this work, we propose …


A Cascade Framework For Privacy-Preserving Point-Of-Interest Recommender System, Longyin Cui, Xiwei Wang Apr 2022

A Cascade Framework For Privacy-Preserving Point-Of-Interest Recommender System, Longyin Cui, Xiwei Wang

Computer Science Faculty Publications

Point-of-interest (POI) recommender systems (RSes) have gained significant popularity in recent years due to the prosperity of location-based social networks (LBSN). However, in the interest of personalization services, various sensitive contextual information is collected, causing potential privacy concerns. This paper proposes a cascaded privacy-preserving POI recommendation (CRS) framework that protects contextual information such as user comments and locations. We demonstrate a minimized trade-off between the privacy-preserving feature and prediction accuracy by applying a semi-decentralized model to real-world datasets.


Eye Movement And Pupil Measures: A Review, Bhanuka Mahanama, Yasith Jayawardana, Sundararaman Rengarajan, Gavindya Jayawardena, Leanne Chukoskie, Joseph Snider, Sampath Jayarathna Jan 2022

Eye Movement And Pupil Measures: A Review, Bhanuka Mahanama, Yasith Jayawardana, Sundararaman Rengarajan, Gavindya Jayawardena, Leanne Chukoskie, Joseph Snider, Sampath Jayarathna

Computer Science Faculty Publications

Our subjective visual experiences involve complex interaction between our eyes, our brain, and the surrounding world. It gives us the sense of sight, color, stereopsis, distance, pattern recognition, motor coordination, and more. The increasing ubiquity of gaze-aware technology brings with it the ability to track gaze and pupil measures with varying degrees of fidelity. With this in mind, a review that considers the various gaze measures becomes increasingly relevant, especially considering our ability to make sense of these signals given different spatio-temporal sampling capacities. In this paper, we selectively review prior work on eye movements and pupil measures. We first …


Segmenting Technical Drawing Figures In Us Patents, Md Reshad Ul Hoque, Xin Wei, Muntabir Hasan Choudhury, Kehinde Ajayi, Martin Gryder, Jian Wu, Diane Oyen Jan 2022

Segmenting Technical Drawing Figures In Us Patents, Md Reshad Ul Hoque, Xin Wei, Muntabir Hasan Choudhury, Kehinde Ajayi, Martin Gryder, Jian Wu, Diane Oyen

Computer Science Faculty Publications

Image segmentation is the core computer vision problem for identifying objects within a scene. Segmentation is a challenging task because the prediction for each pixel label requires contextual information. Most recent research deals with the segmentation of natural images rather than drawings. However, there is very little research on sketched image segmentation. In this study, we introduce heuristic (point-shooting) and deep learning-based methods (U-Net, HR-Net, MedT, DETR) to segment technical drawings in US patent documents. Our proposed methods on the US Patent dataset achieved over 90% accuracy where transformer performs well with 97% segmentation accuracy, which is promising and computationally …


Customer Gaze Estimation In Retail Using Deep Learning, Shashimal Senarath, Primesh Pathirana, Dulani Meedeniya, Sampath Jayarathna Jan 2022

Customer Gaze Estimation In Retail Using Deep Learning, Shashimal Senarath, Primesh Pathirana, Dulani Meedeniya, Sampath Jayarathna

Computer Science Faculty Publications

At present, intelligent computing applications are widely used in different domains, including retail stores. The analysis of customer behaviour has become crucial for the benefit of both customers and retailers. In this regard, the concept of remote gaze estimation using deep learning has shown promising results in analyzing customer behaviour in retail due to its scalability, robustness, low cost, and uninterrupted nature. This study presents a three-stage, three-attention-based deep convolutional neural network for remote gaze estimation in retail using image data. In the first stage, we design a mechanism to estimate the 3D gaze of the subject using image data …


Parallel Anisotropic Unstructured Grid Adaptation, Christos Tsolakis, Nikos Chrisochoides, Michael A. Park, Adrien Loseille, Todd Michal Jan 2021

Parallel Anisotropic Unstructured Grid Adaptation, Christos Tsolakis, Nikos Chrisochoides, Michael A. Park, Adrien Loseille, Todd Michal

Computer Science Faculty Publications

Computational fluid dynamics (CFD) has become critical to the design and analysis of aerospace vehicles. Parallel grid adaptation that resolves multiple scales with anisotropy is identified as one of the challenges in the CFD Vision 2030 Study to increase the capacity and capability of CFD simulation. The study also cautions that computer architectures are undergoing a radical change, and dramatic increases in algorithm concurrency will be required to exploit full performance. This paper reviews four different methods to parallel anisotropic grid adaptation. They cover both ends of the spectrum: 1) using existing state-of-the-art software optimized for a single core and …


Fmri Feature Extraction Model For Adhd Classification Using Convolutional Neural Network, Senuri De Silva, Sanuwani Udara Dayarathna, Gangani Ariyarathne, Dulani Meedeniya, Sampath Jayarathna Jan 2021

Fmri Feature Extraction Model For Adhd Classification Using Convolutional Neural Network, Senuri De Silva, Sanuwani Udara Dayarathna, Gangani Ariyarathne, Dulani Meedeniya, Sampath Jayarathna

Computer Science Faculty Publications

Biomedical intelligence provides a predictive mechanism for the automatic diagnosis of diseases and disorders. With the advancements of computational biology, neuroimaging techniques have been used extensively in clinical data analysis. Attention deficit hyperactivity disorder (ADHD) is a psychiatric disorder, with the symptomology of inattention, impulsivity, and hyperactivity, in which early diagnosis is crucial to prevent unwelcome outcomes. This study addresses ADHD identification using functional magnetic resonance imaging (fMRI) data for the resting state brain by evaluating multiple feature extraction methods. The features of seed-based correlation (SBC), fractional amplitude of low-frequency fluctuation (fALFF), and regional homogeneity (ReHo) are comparatively applied to …


Smart Parking Systems: Reviewing The Literature, Architecture And Ways Forward, Can Biyik, Zaheer Allam, Gabriele Pieri, Davide Moroni, Muftah O' Fraifer, Eoin O' Connell, Stephan Olariu, Muhammad Khalid Jan 2021

Smart Parking Systems: Reviewing The Literature, Architecture And Ways Forward, Can Biyik, Zaheer Allam, Gabriele Pieri, Davide Moroni, Muftah O' Fraifer, Eoin O' Connell, Stephan Olariu, Muhammad Khalid

Computer Science Faculty Publications

The Internet of Things (IoT) has come of age, and complex solutions can now be implemented seamlessly within urban governance and management frameworks and processes. For cities, growing rates of car ownership are rendering parking availability a challenge and lowering the quality of life through increased carbon emissions. The development of smart parking solutions is thus necessary to reduce the time spent looking for parking and to reduce greenhouse gas emissions. The principal role of this research paper is to analyze smart parking solutions from a technical perspective, underlining the systems and sensors that are available, as documented in the …


Combining Cryo-Em Density Map And Residue Contact For Protein Secondary Structure Topologies, Maytha Alshammari, Jing He Jan 2021

Combining Cryo-Em Density Map And Residue Contact For Protein Secondary Structure Topologies, Maytha Alshammari, Jing He

Computer Science Faculty Publications

Although atomic structures have been determined directly from cryo-EM density maps with high resolutions, current structure determination methods for medium resolution (5 to 10 Å) cryo-EM maps are limited by the availability of structure templates. Secondary structure traces are lines detected from a cryo-EM density map for α-helices and β-strands of a protein. A topology of secondary structures defines the mapping between a set of sequence segments and a set of traces of secondary structures in three-dimensional space. In order to enhance accuracy in ranking secondary structure topologies, we explored a method that combines three sources of information: a set …


See-Trend: Secure Traffic-Related Event Detection In Smart Communities, Stephan Olariu, Dimitrie C. Popescu Jan 2021

See-Trend: Secure Traffic-Related Event Detection In Smart Communities, Stephan Olariu, Dimitrie C. Popescu

Computer Science Faculty Publications

It has been widely recognized that one of the critical services provided by Smart Cities and Smart Communities is Smart Mobility. This paper lays the theoretical foundations of SEE-TREND, a system for Secure Early Traffic-Related EveNt Detection in Smart Cities and Smart Communities. SEE-TREND promotes Smart Mobility by implementing an anonymous, probabilistic collection of traffic-related data from passing vehicles. The collected data are then aggregated and used by its inference engine to build beliefs about the state of the traffic, to detect traffic trends, and to disseminate relevant traffic-related information along the roadway to help the driving public make informed …


A Saliency-Driven Video Magnifier For People With Low Vision, Ali Selman Aydin, Shirin Feiz, Iv Ramakrishnan, Vikas Ashok Jan 2020

A Saliency-Driven Video Magnifier For People With Low Vision, Ali Selman Aydin, Shirin Feiz, Iv Ramakrishnan, Vikas Ashok

Computer Science Faculty Publications

Consuming video content poses significant challenges for many screen magnifier users, which is the “go to” assistive technology for people with low vision. While screen magnifier software could be used to achieve a zoom factor that would make the content of the video visible to low-vision users, it is oftentimes a major challenge for these users to navigate through videos. Towards making videos more accessible for low-vision users, we have developed the SViM video magnifier system [6]. Specifically, SViM consists of three different magnifier interfaces with easy-to-use means of interactions. All three interfaces are driven by visual saliency as a …


Smart Communities: From Sensors To Internet Of Things And To A Marketplace Of Services, Stephan Olariu, Nirwan Ansari (Editor), Andreas Ahrens (Editor), Cesar Benavente-Preces (Editor) Jan 2020

Smart Communities: From Sensors To Internet Of Things And To A Marketplace Of Services, Stephan Olariu, Nirwan Ansari (Editor), Andreas Ahrens (Editor), Cesar Benavente-Preces (Editor)

Computer Science Faculty Publications

Our paper was inspired by the recent Society 5.0 initiative of the Japanese Government that seeks to create a sustainable human-centric society by putting to work recent advances in technology: sensor networks, edge computing, IoT ecosystems, AI, Big Data, robotics, to name just a few. The main contribution of this work is a vision of how these technological advances can contribute, directly or indirectly, to making Society 5.0 reality. For this purpose we build on a recently-proposed concept of Marketplace of Services that, in our view, will turn out to be one of the cornerstones of Society 5.0. Instead of …


Influence Spread In Two-Layer Interdependent Networks: Designed Single-Layer Or Random Two-Layer Initial Spreaders?, Hana Khamfroush, Nathaniel Hudson, Samuel Iloo, Mahshid R. Naeini Jun 2019

Influence Spread In Two-Layer Interdependent Networks: Designed Single-Layer Or Random Two-Layer Initial Spreaders?, Hana Khamfroush, Nathaniel Hudson, Samuel Iloo, Mahshid R. Naeini

Computer Science Faculty Publications

Influence spread in multi-layer interdependent networks (M-IDN) has been studied in the last few years; however, prior works mostly focused on the spread that is initiated in a single layer of an M-IDN. In real world scenarios, influence spread can happen concurrently among many or all components making up the topology of an M-IDN. This paper investigates the effectiveness of different influence spread strategies in M-IDNs by providing a comprehensive analysis of the time evolution of influence propagation given different initial spreader strategies. For this study we consider a two-layer interdependent network and a general probabilistic threshold influence spread model …


A Survey On Software Cost Estimation Techniques, Sai Mohan Reddy Chirra, Hassan Reza Jun 2019

A Survey On Software Cost Estimation Techniques, Sai Mohan Reddy Chirra, Hassan Reza

Computer Science Faculty Publications

The ability to accurately estimate the cost needed to complete a specific project has been a challenge over the past decades. For a successful software project, accurate prediction of the cost, time and effort is a very much essential task. This paper presents a systematic review of different models used for software cost estimation which includes algorithmic methods, non-algorithmic methods and learning-oriented methods. The models considered in this review include both the traditional and the recent approaches for software cost estimation. The main objective of this paper is to provide an overview of software cost estimation models and summarize their …


Impact Of Http Cookie Violations In Web Archives, Sawood Alam, Michele C. Weigle, Michael L. Nelson Jun 2019

Impact Of Http Cookie Violations In Web Archives, Sawood Alam, Michele C. Weigle, Michael L. Nelson

Computer Science Faculty Publications

Certain HTTP Cookies on certain sites can be a source of content bias in archival crawls. Accommodating Cookies at crawl time, but not utilizing them at replay time may cause cookie violations, resulting in defaced composite mementos that never existed on the live web. To address these issues, we propose that crawlers store Cookies with short expiration time and archival replay systems account for values in the Vary header along with URIs.


A Generative Human-Robot Motion Retargeting Approach Using A Single Rgbd Sensor, Sen Wang, Xinxin Zuo, Runxiao Wang, Ruigang Yang Apr 2019

A Generative Human-Robot Motion Retargeting Approach Using A Single Rgbd Sensor, Sen Wang, Xinxin Zuo, Runxiao Wang, Ruigang Yang

Computer Science Faculty Publications

The goal of human-robot motion retargeting is to let a robot follow the movements performed by a human subject. Typically in previous approaches, the human poses are precomputed from a human pose tracking system, after which the explicit joint mapping strategies are specified to apply the estimated poses to a target robot. However, there is not any generic mapping strategy that we can use to map the human joint to robots with different kinds of configurations. In this paper, we present a novel motion retargeting approach that combines the human pose estimation and the motion retargeting procedure in a unified …


Toward The Design And Implementation Of Traceability Engineering Tool Support, Subik Pokharel, Hassan Reza Jan 2019

Toward The Design And Implementation Of Traceability Engineering Tool Support, Subik Pokharel, Hassan Reza

Computer Science Faculty Publications

Requirements of a system keep on changing based on the need of stakeholders or the system developers, making requirement engineering an important aspect in software development. This develops a need for appropriate requirement change management. The importance of requirements traceability is defining relationships between the requirements and artefacts extracted by the stakeholder during the software development life-cycle and gives vital information to encourage software understanding. In this paper, we have concentrated on developing a tool for requirement traceability that can be used to extend the requirement elicitation and identification of system-wide qualities using the notion of quality attribute scenarios to …