Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

2019

Series

Computer Engineering

Institution
Keyword
Publication
File Type

Articles 361 - 390 of 397

Full-Text Articles in Engineering

Emerging Roles Of Virtual Patients In The Age Of Ai, C. Donald Combs, P. Ford Combs Jan 2019

Emerging Roles Of Virtual Patients In The Age Of Ai, C. Donald Combs, P. Ford Combs

Computational Modeling & Simulation Engineering Faculty Publications

Today's web-enabled and virtual approach to medical education is different from the 20th century's Flexner-dominated approach. Now, lectures get less emphasis and more emphasis is placed on learning via early clinical exposure, standardized patients, and other simulations. This article reviews literature on virtual patients (VPs) and their underlying virtual reality technology, examines VPs' potential through the example of psychiatric intake teaching, and identifies promises and perils posed by VP use in medical education.


Sec-Lib: Protecting Scholarly Digital Libraries From Infected Papers Using Active Machine Learning Framework, Nir Nissim, Aviad Cohen, Jian Wu, Andrea Lanzi, Lior Rokach, Yuval Elovici, Lee Giles Jan 2019

Sec-Lib: Protecting Scholarly Digital Libraries From Infected Papers Using Active Machine Learning Framework, Nir Nissim, Aviad Cohen, Jian Wu, Andrea Lanzi, Lior Rokach, Yuval Elovici, Lee Giles

Computer Science Faculty Publications

Researchers from academia and the corporate-sector rely on scholarly digital libraries to access articles. Attackers take advantage of innocent users who consider the articles' files safe and thus open PDF-files with little concern. In addition, researchers consider scholarly libraries a reliable, trusted, and untainted corpus of papers. For these reasons, scholarly digital libraries are an attractive-target and inadvertently support the proliferation of cyber-attacks launched via malicious PDF-files. In this study, we present related vulnerabilities and malware distribution approaches that exploit the vulnerabilities of scholarly digital libraries. We evaluated over two-million scholarly papers in the CiteSeerX library and found the library …


Investigation Into The Perceptually Informed Data For Environmental Sound Recognition, Chenglin Kang Jan 2019

Investigation Into The Perceptually Informed Data For Environmental Sound Recognition, Chenglin Kang

Dissertations

Environmental sound is rich source of information that can be used to infer contexts. With the rise in ubiquitous computing, the desire of environmental sound recognition is rapidly growing. Primarily, the research aims to recognize the environmental sound using the perceptually informed data. The initial study is concentrated on understanding the current state-of-the-art techniques in environmental sound recognition. Then those researches are evaluated by a critical review of the literature. This study extracts three sets of features: Mel Frequency Cepstral Coefficients, Mel-spectrogram and sound texture statistics. Two kinds machine learning algorithms are cooperated with appropriate sound features. The models are …


Comparing Defeasible Argumentation And Non-Monotonic Fuzzy Reasoning Methods For A Computational Trust Problem With Wikipedia, Ryan Kirwan Jan 2019

Comparing Defeasible Argumentation And Non-Monotonic Fuzzy Reasoning Methods For A Computational Trust Problem With Wikipedia, Ryan Kirwan

Dissertations

Computational trust is an ever-more present issue with the surge in autonomous agent development. Represented as a defeasible phenomenon, problems associated with computational trust may be solved by the appropriate reasoning methods. This paper compares two types of such methods, Defeasible Argumentation and Non-Monotonic Fuzzy Logic to assess which is more effective at solving a computational trust problem centred around Wikipedia editors. Through the application of these methods with real-data and a set of knowledge-bases, it was found that the Fuzzy Logic approach was statistically significantly better than the Argumentation approach in its inferential capacity.


Multi-Sensory Deep Learning Architectures For Slam Dunk Scene Classification, Paul Minogue Jan 2019

Multi-Sensory Deep Learning Architectures For Slam Dunk Scene Classification, Paul Minogue

Dissertations

Basketball teams at all levels of the game invest a considerable amount of time and effort into collecting, segmenting, and analysing footage from their upcoming opponents previous games. This analysis helps teams identify and exploit the potential weaknesses of their opponents and is commonly cited as one of the key elements required to achieve success in the modern game. The growing importance of this type of analysis has prompted research into the application of computer vision and audio classification techniques to help teams classify scoring sequences and key events using game footage. However, this research tends to focus on classifying …


Transparency And Algorithmic Governance, Cary Coglianese, David Lehr Jan 2019

Transparency And Algorithmic Governance, Cary Coglianese, David Lehr

All Faculty Scholarship

Machine-learning algorithms are improving and automating important functions in medicine, transportation, and business. Government officials have also started to take notice of the accuracy and speed that such algorithms provide, increasingly relying on them to aid with consequential public-sector functions, including tax administration, regulatory oversight, and benefits administration. Despite machine-learning algorithms’ superior predictive power over conventional analytic tools, algorithmic forecasts are difficult to understand and explain. Machine learning’s “black-box” nature has thus raised concern: Can algorithmic governance be squared with legal principles of governmental transparency? We analyze this question and conclude that machine-learning algorithms’ relative inscrutability does not pose a …


Emergence Of Addictive Behaviors In Reinforcement Learning Agents, Vahid Behzadan, Roman Yampolskiy, Arslan Munir Jan 2019

Emergence Of Addictive Behaviors In Reinforcement Learning Agents, Vahid Behzadan, Roman Yampolskiy, Arslan Munir

Faculty Scholarship

This paper presents a novel approach to the technical analysis of wireheading in intelligent agents. Inspired by the natural analogues of wireheading and their prevalent manifestations, we propose the modeling of such phenomenon in Reinforcement Learning (RL) agents as psychological disorders. In a preliminary step towards evaluating this proposal, we study the feasibility and dynamics of emergent addictive policies in Q-learning agents in the tractable environment of the game of Snake. We consider a slightly modified version of this game, in which the environment provides a “drug” seed alongside the original “healthy” seed for the consumption of the snake. We …


Effective Plant Discrimination Based On The Combination Of Local Binary Pattern Operators And Multiclass Support Vector Machine Methods, Vi N T Le, Beniamin Apopei, Kamal Alameh Jan 2019

Effective Plant Discrimination Based On The Combination Of Local Binary Pattern Operators And Multiclass Support Vector Machine Methods, Vi N T Le, Beniamin Apopei, Kamal Alameh

Research outputs 2014 to 2021

Accurate crop and weed discrimination plays a critical role in addressing the challenges of weed management in agriculture. The use of herbicides is currently the most common approach to weed control. However, herbicide resistant plants have long been recognised as a major concern due to the excessive use of herbicides. Effective weed detection techniques can reduce the cost of weed management and improve crop quality and yield. A computationally efficient and robust plant classification algorithm is developed and applied to the classification of three crops: Brassica napus (canola), Zea mays (maize/corn), and radish. The developed algorithm is based on the …


The "Invisible Hand" Of Peer Review: The Implications Of Author-Referee Networks On Peer Review In A Scholarly Journal, Pierpaolo Dondio, Niccolo Casnici, Nigel Gilbert, Francisco Grimaldo, Flaminio Squazzoni Jan 2019

The "Invisible Hand" Of Peer Review: The Implications Of Author-Referee Networks On Peer Review In A Scholarly Journal, Pierpaolo Dondio, Niccolo Casnici, Nigel Gilbert, Francisco Grimaldo, Flaminio Squazzoni

Articles

Peer review is not only a quality screening mechanism for scholarly journals. It also connects authors and referees either directly or indirectly. This means that their positions in the network structure of the community could influence the process, while peer review could in turn influence subsequent networking and collaboration. This paper aims to map these complex network implications by looking at 2232 author/referee couples in an interdisciplinary journal that uses double blind peer review. By reconstructing temporal co-authorship networks, we found that referees tended to recommend more positively submissions by authors who were within three steps in their collaboration network. …


Persistence Pays Off: Paying Attention To What The Lstm Gating Mechanism Persists, John D. Kelleher, Giancarlo Salton Jan 2019

Persistence Pays Off: Paying Attention To What The Lstm Gating Mechanism Persists, John D. Kelleher, Giancarlo Salton

Articles

Language Models (LMs) are important components in several Natural Language Processing systems. Recurrent Neural Network LMs composed of LSTM units, especially those augmented with an external memory, have achieved state-of-the-art results. However, these models still struggle to process long sequences which are more likely to contain long-distance dependencies because of information fading and a bias towards more recent information. In this paper we demonstrate an effective mechanism for retrieving information in a memory augmented LSTM LM based on attending to information in memory in proportion to the number of timesteps the LSTM gating mechanism persisted the information.


An Evaluation Of The Information Security Awareness Of University Students, Alan Pike Jan 2019

An Evaluation Of The Information Security Awareness Of University Students, Alan Pike

Dissertations

Between January 2017 and March 2018, it is estimated that more than 1.9 billion personal and sensitive data records were compromised online. The average cost of a data breach in 2018 was reported to be in the region of US$3.62 million. These figures alone highlight the need for computer users to have a high level of information security awareness (ISA). This research was conducted to establish the ISA of students in a university. There were three aspects to this piece of research. The first was to review and analyse the security habits of students in terms of their own personal …


Noise Reduction In Eeg Signals Using Convolutional Autoencoding Techniques, Conor Hanrahan Jan 2019

Noise Reduction In Eeg Signals Using Convolutional Autoencoding Techniques, Conor Hanrahan

Dissertations

The presence of noise in electroencephalography (EEG) signals can significantly reduce the accuracy of the analysis of the signal. This study assesses to what extent stacked autoencoders designed using one-dimensional convolutional neural network layers can reduce noise in EEG signals. The EEG signals, obtained from 81 people, were processed by a two-layer one-dimensional convolutional autoencoder (CAE), whom performed 3 independent button pressing tasks. The signal-to-noise ratios (SNRs) of the signals before and after processing were calculated and the distributions of the SNRs were compared. The performance of the model was compared to noise reduction performance of Principal Component Analysis, with …


Predicting Violent Crime Reports From Geospatial And Temporal Attributes Of Us 911 Emergency Call Data, Vincent Corcoran Jan 2019

Predicting Violent Crime Reports From Geospatial And Temporal Attributes Of Us 911 Emergency Call Data, Vincent Corcoran

Dissertations

The aim of this study is to create a model to predict which 911 calls will result in crime reports of a violent nature. Such a prediction model could be used by the police to prioritise calls which are most likely to lead to violent crime reports. The model will use geospatial and temporal attributes of the call to predict whether a crime report will be generated. To create this model, a dataset of characteristics relating to the neighbourhood where the 911 call originated will be created and combined with characteristics related to the time of the 911 call. Geospatial …


Enhancing Partially Labelled Data: Self Learning And Word Vectors In Natural Language Processing, Eamon Mcentee Jan 2019

Enhancing Partially Labelled Data: Self Learning And Word Vectors In Natural Language Processing, Eamon Mcentee

Dissertations

There has been an explosion in unstructured text data in recent years with services like Twitter, Facebook and WhatsApp helping drive this growth. Many of these companies are facing pressure to monitor the content on their platforms and as such Natural Language Processing (NLP) techniques are more important than ever. There are many applications of NLP ranging from spam filtering, sentiment analysis of social media, automatic text summarisation and document classification.


Detection Of Offensive Youtube Comments, A Performance Comparison Of Deep Learning Approaches, Priyam Bansal Jan 2019

Detection Of Offensive Youtube Comments, A Performance Comparison Of Deep Learning Approaches, Priyam Bansal

Dissertations

Social media data is open, free and available in massive quantities. However, there is a significant limitation in making sense of this data because of its high volume, variety, uncertain veracity, velocity, value and variability. This work provides a comprehensive framework of text processing and analysis performed on YouTube comments having offensive and non-offensive contents.

YouTube is a platform where every age group of people logs in and finds the type of content that most appeals to them. Apart from this, a massive increase in the use of offensive language has been apparent. As there are massive volume of new …


Performance Comparison Of Hybrid Cnn-Svm And Cnn-Xgboost Models In Concrete Crack Detection, Sahana Thiyagarajan Jan 2019

Performance Comparison Of Hybrid Cnn-Svm And Cnn-Xgboost Models In Concrete Crack Detection, Sahana Thiyagarajan

Dissertations

Detection of cracks mainly has been a sort of essential step in visual inspection involved in construction engineering as it is the commonly used building material and cracks in them is an early sign of de-basement. It is hard to find cracks by a visual check for the massive structures. So, the development of crack detecting systems generally has been a critical issue. The utilization of contextual image processing in crack detection is constrained, as image data usually taken under real-world situations vary widely and also includes the complex modelling of cracks and the extraction of handcrafted features. Therefore the …


An Automated Negotiation System For Ecommerce Store Owners To Enable Flexible Product Pricing, Jake O'Halloran Jan 2019

An Automated Negotiation System For Ecommerce Store Owners To Enable Flexible Product Pricing, Jake O'Halloran

Dissertations

If a store owner wishes to sell a product online, they traditionally have two options for deciding on a price. They can sell the product at a fixesd price like the products sold on sites like Amazon, or they can put the product in an auction and let demand from customers drive the final sales price like the products sold on sites like eBay. Both options have their pros and cons. An alternative option for deciding on a final sales price for the product is to enable negotiation on the product. With this, there is a dynamic nature to the …


Analyzing Twitter Feeds To Facilitate Crises Informatics And Disaster Response During Mass Emergencies, Arshdeep Kaur Jan 2019

Analyzing Twitter Feeds To Facilitate Crises Informatics And Disaster Response During Mass Emergencies, Arshdeep Kaur

Dissertations

It is a common practice these days for general public to use various micro-blogging platforms, predominantly Twitter, to share ideas, opinions and information about things and life. Twitter is also being increasingly used as a popular source of information sharing during natural disasters and mass emergencies to update and communicate the extent of the geographic phenomena, report the affected population and casualties, request or provide volunteering services and to share the status of disaster recovery process initiated by humanitarian-aid and disaster-management organizations. Recent research in this area has affirmed the potential use of such social media data for various disaster …


Augmenting American Fuzzy Lop To Increase The Speed Of Bug Detection, Raviraj Mahajan Jan 2019

Augmenting American Fuzzy Lop To Increase The Speed Of Bug Detection, Raviraj Mahajan

Dissertations

Whitebox fuzz testing is a vital part of the software testing process in the software development life cycle (SDLC). It is used for bug detection and security vulnerability checking as well. But current tools lack the ability to detect all the bugs and cover the entire code under test in a reasonable time. This study will explore some of the various whitebox fuzzing techniques and tools (AFL, SAGE, Driller, etc.) currently in use followed by a discussion of their strategies and the challenges facing them. One of the most popular state-of-the-art fuzzers, American Fuzzy Lop (AFL) will be discussed in …


An Evaluation Of Learning Employing Natural Language Processing And Cognitive Load Assessment, Mrunal Tipari Jan 2019

An Evaluation Of Learning Employing Natural Language Processing And Cognitive Load Assessment, Mrunal Tipari

Dissertations

One of the key goals of Pedagogy is to assess learning. Various paradigms exist and one of this is Cognitivism. It essentially sees a human learner as an information processor and the mind as a black box with limited capacity that should be understood and studied. With respect to this, an approach is to employ the construct of cognitive load to assess a learner's experience and in turn design instructions better aligned to the human mind. However, cognitive load assessment is not an easy activity, especially in a traditional classroom setting. This research proposes a novel method for evaluating learning …


Is There A Correlation Between Wikidata Revisions And Trending Hashtags On Twitter?, Paula Dooley [Thesis] Jan 2019

Is There A Correlation Between Wikidata Revisions And Trending Hashtags On Twitter?, Paula Dooley [Thesis]

Dissertations

Twitter is a microblogging application used by its members to interact and stay socially connected by sharing instant messages called tweets that are up to 280 characters long. Within these tweets, users can add hashtags to relate the message to a topic that is shared among users. Wikidata is a central knowledge base of information relying on its members and machines bots to keeping its content up to date. The data is stored in a highly structured format with the added SPARQL protocol and RDF Query Language (SPARQL) endpoint to allow users to query its knowledge base.


Accessibility And Decay Of Web Citations In Computer Science Journals, Mohsen Jalali Jan 2019

Accessibility And Decay Of Web Citations In Computer Science Journals, Mohsen Jalali

Library Philosophy and Practice (e-journal)

The aim of this research is to scrutiny the accessibility and decay of web citations (URLs) used in refereed articles published by 27 Computer Science open access journals as indexed by Scopus. To do this, at first, we downloaded 1000 articles of Computer Science open access journals from 2009 to 2018. After acquiring articles, their web citations are extracted and analyzed from the accessibility and decay point of view. Moreover, for initially missed web citations complementary pathways such as using Google search engine are employed. Then, data collected are analyzed using descriptive statistical methods. Research findings indicated that 80.7% of …


Personal Universes: A Solution To The Multi-Agent Value Alignment Problem, Roman V. Yampolskiy Jan 2019

Personal Universes: A Solution To The Multi-Agent Value Alignment Problem, Roman V. Yampolskiy

Faculty Scholarship

AI Safety researchers attempting to align values of highly capable intelligent systems with those of humanity face a number of challenges including personal value extraction, multi-agent value merger and finally in-silico encoding. State-of-the-art research in value alignment shows difficulties in every stage in this process, but merger of incompatible preferences is a particularly difficult challenge to overcome. In this paper we assume that the value extraction problem will be solved and propose a possible way to implement an AI solution which optimally aligns with individual preferences of each user. We conclude by analyzing benefits and limitations of the proposed approach.


Expressing Trust With Temporal Frequency Of User Interaction In Online Communities, Ekaterina Yashkina, Arseny Pinigin, Jooyoung Lee, Manuel Mazzara, Akinlolu Solomon Adekotujo, Adam Zubair, Luca Longo Jan 2019

Expressing Trust With Temporal Frequency Of User Interaction In Online Communities, Ekaterina Yashkina, Arseny Pinigin, Jooyoung Lee, Manuel Mazzara, Akinlolu Solomon Adekotujo, Adam Zubair, Luca Longo

Conference papers

Reputation systems concern soft security dynamics in diverse areas. Trust dynamics in a reputation system should be stable and adaptable at the same time to serve the purpose. Many reputation mechanisms have been proposed and tested over time. However, the main drawback of reputation management is that users need to share private information to gain trust in a system such as phone numbers, reviews, and ratings. Recently, a novel model that tries to overcome this issue was presented: the Dynamic Interaction-based Reputation Model (DIBRM). This approach to trust considers only implicit information automatically deduced from the interactions of users within …


Mediaeval2019: Flood Detection In Time Sequence Satellite Images, Palavi Jain, Bianca Schoen-Phelan, Robert J. Ross Jan 2019

Mediaeval2019: Flood Detection In Time Sequence Satellite Images, Palavi Jain, Bianca Schoen-Phelan, Robert J. Ross

Conference papers

In this work, we present a flood detection technique from time series satellite images for the City-centered satellite sequences (CCSS) task in the MediaEval 2019 competition [1]. This work utilises a three channel feature indexing technique [13] along with a VGG16 pretrained model for automatic detection of floods. We also compared our result with RGB images and a modified NDWI technique by Mishra et al, 2015 [15]. The result shows that the three channel feature indexing technique performed the best with VGG16 and is a promising approach to detect floods from time series satellite images.


Ieee Access Special Section Editorial: Wirelessly Powered Networks, And Technologies, Theofanis P. Raptis, Nuno B. Carvalho, Diego Masotti, Lei Shu, Cong Wang, Yuanyuan Yang Jan 2019

Ieee Access Special Section Editorial: Wirelessly Powered Networks, And Technologies, Theofanis P. Raptis, Nuno B. Carvalho, Diego Masotti, Lei Shu, Cong Wang, Yuanyuan Yang

Computer Science Faculty Publications

Wireless Power Transfer (WPT) is, by definition, a process that occurs in any system where electrical energy is transmitted from a power source to a load without the connection of electrical conductors. WPT is the driving technology that will enable the next stage in the current consumer electronics revolution, including battery-less sensors, passive RF identification (RFID), passive wireless sensors, the Internet of Things and 5G, and machine-to-machine solutions. WPT-enabled devices can be powered by harvesting energy from the surroundings, including electromagnetic (EM) energy, leading to a new communication networks paradigm, the Wirelessly Powered Networks.


Multi-Element Long Distance Dependencies: Using Spk Languages To Explore The Characteristics Of Long-Distance Dependencies, Abhijit Mahalunkar, John Kelleher Jan 2019

Multi-Element Long Distance Dependencies: Using Spk Languages To Explore The Characteristics Of Long-Distance Dependencies, Abhijit Mahalunkar, John Kelleher

Conference papers

In order to successfully model Long Distance Dependencies (LDDs) it is necessary to under-stand the full-range of the characteristics of the LDDs exhibited in a target dataset. In this paper, we use Strictly k-Piecewise languages to generate datasets with various properties. We then compute the characteristics of the LDDs in these datasets using mutual information and analyze the impact of factors such as (i) k, (ii) length of LDDs, (iii) vocabulary size, (iv) forbidden strings, and (v) dataset size. This analysis reveal that the number of interacting elements in a dependency is an important characteristic of LDDs. This leads us …


Software Defined Networks Based Smart Grid Communication: A Comprehensive Survey, Mubashir Husain Rehmani, Alan Davy, Brendan Jennings, Chadi Assi Jan 2019

Software Defined Networks Based Smart Grid Communication: A Comprehensive Survey, Mubashir Husain Rehmani, Alan Davy, Brendan Jennings, Chadi Assi

Publications

The current power grid is no longer a feasible solution due to ever-increasing user demand of electricity, old infrastructure, and reliability issues and thus require transformation to a better grid a.k.a., smart grid (SG). The key features that distinguish SG from the conventional electrical power grid are its capability to perform two-way communication, demand side management, and real time pricing. Despite all these advantages that SG will bring, there are certain issues which are specific to SG communication system. For instance, network management of current SG systems is complex, time consuming, and done manually. Moreover, SG communication (SGC) system is …


Quantum Metalanguage And The New Cognitive Synthesis, Alexey V. Melkikh, Andrei Khrennikov, Roman V. Yampolskiy Jan 2019

Quantum Metalanguage And The New Cognitive Synthesis, Alexey V. Melkikh, Andrei Khrennikov, Roman V. Yampolskiy

Faculty Scholarship

Problems with mechanisms of thinking and cognition in many ways remain unresolved. Why are a priori inferences possible? Why can a human understand but a computer cannot? It has been shown that when creating new concepts, generalization is contradictory in the sense that to be created concepts must exist a priori, and therefore, they are not new. The process of knowledge acquisition is also contradictory, as it inevitably involves recognition, which can be realized only when there is an a priori standard. Known approaches of the framework of artificial intelligence (in particular, Bayesian) do not determine the origins of knowledge, …


Large-Scale Green Supplier Selection Approach Under A Q-Rung Interval-Valued Orthopair Fuzzy Environment, Limei Liu, Wenzhi Cao, Biao Shi, Ming Tang Jan 2019

Large-Scale Green Supplier Selection Approach Under A Q-Rung Interval-Valued Orthopair Fuzzy Environment, Limei Liu, Wenzhi Cao, Biao Shi, Ming Tang

Articles

As enterprises pay more and more attention to environmental issues, the green supply chain management (GSCM) mode has been extensively utilized to guarantee profit and sustainable development. Greensupplierselection(GSS),whichisakeysegmentofGSCM,hasbeeninvestigated to put forward plenty of GSS approaches.