Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Singapore Management University (5276)
- Selected Works (3125)
- TÜBİTAK (2804)
- Wright State University (2400)
- Purdue University (2019)
-
- Edith Cowan University (1068)
- Dartmouth College (924)
- Tsinghua University Press (891)
- University of Texas at El Paso (862)
- San Jose State University (846)
- University of Pennsylvania (842)
- Missouri University of Science and Technology (823)
- University of Nebraska - Lincoln (822)
- Embry-Riddle Aeronautical University (811)
- Washington University in St. Louis (757)
- Old Dominion University (721)
- City University of New York (CUNY) (692)
- University of Massachusetts Amherst (687)
- Technological University Dublin (671)
- Brigham Young University (668)
- California Polytechnic State University, San Luis Obispo (658)
- University for Business and Technology in Kosovo (606)
- Air Force Institute of Technology (598)
- SelectedWorks (512)
- Nova Southeastern University (507)
- Syracuse University (480)
- Portland State University (438)
- Kennesaw State University (435)
- University of Nebraska at Omaha (428)
- New Jersey Institute of Technology (426)
- Keyword
-
- Machine learning (860)
- Security (525)
- Deep learning (456)
- Machine Learning (416)
- Computer Science (382)
-
- Computer science (376)
- Privacy (343)
- Computer Science and Engineering (319)
- Artificial intelligence (310)
- Data mining (302)
- Classification (300)
- Cybersecurity (276)
- Algorithms (272)
- Optimization (255)
- College for Professional Studies (253)
- School of Computer & Information Science (236)
- Cloud computing (229)
- Clustering (226)
- Simulation (213)
- Education (213)
- Neural networks (203)
- Department of Computer Science and Engineering (198)
- Deep Learning (191)
- Social media (186)
- Computer vision (184)
- Software engineering (177)
- Applied sciences (175)
- Technology (174)
- Visualization (170)
- Technical Reports (166)
- Publication Year
- Publication
-
- Research Collection School Of Computing and Information Systems (5035)
- Turkish Journal of Electrical Engineering and Computer Sciences (2804)
- Department of Computer Science Technical Reports (1721)
- Theses and Dissertations (1714)
- Computer Science & Engineering Syllabi (1312)
-
- Master's Projects (728)
- Departmental Technical Reports (CS) (689)
- All Computer Science and Engineering Research (683)
- Computer Science Technical Reports (672)
- Computer Science Faculty Publications (582)
- Tsinghua Science and Technology (571)
- Electronic Theses and Dissertations (560)
- Kno.e.sis Publications (543)
- Journal of Digital Forensics, Security and Law (531)
- Faculty Publications (518)
- CCE Theses and Dissertations (462)
- Dissertations (427)
- Doctoral Dissertations (419)
- Departmental Papers (CIS) (387)
- Computer Science Faculty Publications and Presentations (382)
- Walden Dissertations and Doctoral Studies (381)
- Graduate Theses and Dissertations (377)
- Masters Theses (365)
- Amit P. Sheth (348)
- Computer Science and Software Engineering (327)
- Mathematics, Statistics and Computer Science Faculty Research and Publications (304)
- Conference papers (273)
- CSE Conference and Workshop Papers (268)
- Browse all Theses and Dissertations (266)
- All Works (260)
- Publication Type
Articles 1 - 30 of 46175
Full-Text Articles in Physical Sciences and Mathematics
Opportunities And Challenges In Code Search Tools, Chao Liu, Xin Xia, David Lo, Cuiying Gao, Xiaohu Yang, John Grundy
Opportunities And Challenges In Code Search Tools, Chao Liu, Xin Xia, David Lo, Cuiying Gao, Xiaohu Yang, John Grundy
Research Collection School Of Computing and Information Systems
Code search is a core software engineering task. Effective code search tools can help developers substantially improve their software development efficiency and effectiveness. In recent years, many code search studies have leveraged different techniques, such as deep learning and information retrieval approaches, to retrieve expected code from a large-scale codebase. However, there is a lack of a comprehensive comparative summary of existing code search approaches. To understand the research trends in existing code search studies, we systematically reviewed 81 relevant studies. We investigated the publication trends of code search studies, analyzed key components, such as codebase, query, and modeling technique ...
Quantum Key-Length Extension, Joseph Jaeger, Fang Song, Stefano Tessaro
Quantum Key-Length Extension, Joseph Jaeger, Fang Song, Stefano Tessaro
Computer Science Faculty Publications and Presentations
Should quantum computers become available, they will reduce the effective key length of basic secret-key primitives, such as blockciphers. To address this we will either need to use blockciphers with inherently longer keys or develop key-length extension techniques to amplify the security of a blockcipher to use longer keys.
We consider the latter approach and revisit the FX and double encryption constructions. Classically, FX was proven to be a secure key-length extension technique, while double encryption fails to be more secure than single encryption due to a meet-in-the-middle attack. In this work we provide positive results, with concrete and tight ...
Which Neural Network Makes More Explainable Decisions? An Approach Towards Measuring Explainability, Mengdi Zhang, Jun Sun, Jingyi Wang
Which Neural Network Makes More Explainable Decisions? An Approach Towards Measuring Explainability, Mengdi Zhang, Jun Sun, Jingyi Wang
Research Collection School Of Computing and Information Systems
Neural networks are getting increasingly popular thanks to their exceptional performance in solving many real-world problems. At the same time, they are shown to be vulnerable to attacks, difficult to debug and subject to fairness issues. To improve people’s trust in the technology, it is often necessary to provide some human-understandable explanation of neural networks’ decisions, e.g., why is that my loan application is rejected whereas hers is approved? That is, the stakeholder would be interested to minimize the chances of not being able to explain the decision consistently and would like to know how often and how ...
Negational Symmetry Of Quantum Neural Networks For Binary Pattern Classification, Nanqing Dong, Michael Kampffmeyer, Irina Voiculescu, Eric P. Xing
Negational Symmetry Of Quantum Neural Networks For Binary Pattern Classification, Nanqing Dong, Michael Kampffmeyer, Irina Voiculescu, Eric P. Xing
Machine Learning Faculty Publications
Although quantum neural networks (QNNs) have shown promising results in solving simple machine learning tasks recently, the behavior of QNNs in binary pattern classification is still underexplored. In this work, we find that QNNs have an Achilles’ heel in binary pattern classification. To illustrate this point, we provide a theoretical insight into the properties of QNNs by presenting and analyzing a new form of symmetry embedded in a family of QNNs with full entanglement, which we term negational symmetry. Due to negational symmetry, QNNs can not differentiate between a quantum binary signal and its negational counterpart. We empirically evaluate the ...
Addressing Ethical Issues In The Design Of Smart Home Technology For Older Adults And People With Disabilities., Jonathan Turner, Dympna O'Sullivan, Damian Gordon, Yannis Stavrakakis, Brian Keegan, Emma Murphy
Addressing Ethical Issues In The Design Of Smart Home Technology For Older Adults And People With Disabilities., Jonathan Turner, Dympna O'Sullivan, Damian Gordon, Yannis Stavrakakis, Brian Keegan, Emma Murphy
Articles
Unique ethical, privacy and safety implications arise for people who are reliant on home-based smart technology due to health conditions or disabilities. In this paper we highlight a need for a reflective, inclusive ethical framework that encompasses the life cycle of smart home technology. We present key ethical considerations for smart home technology for older adults and people with disabilities and argue for ethical frameworks which combine these key considerations with existing models of design and development.
Co-Design To Support Engagement In Activities Of Daily Living And Meaningful Activities For People Living With Dementia, Michael Wilson, Julie Doyle, Ann Marron, Jonathan Turner, Ciaran Nugent, Dympna O'Sullivan
Co-Design To Support Engagement In Activities Of Daily Living And Meaningful Activities For People Living With Dementia, Michael Wilson, Julie Doyle, Ann Marron, Jonathan Turner, Ciaran Nugent, Dympna O'Sullivan
Articles
Dementia is a chronic and progressive neurodegenerative illness, which can lead to significant difficulties in a person’s capacity to perform activities of daily living and engage in meaningful activities. The Smart Dementia Care project aims to establish an understanding of how best to design digital tools that persons with dementia and their carers will find useful and usable for care planning and goal setting. This paper discusses the first phase of this project and describes how co-design is being used to support engagement in activities of daily living and meaningful activities for people living with the early stages of ...
Irrelevant Pixels Are Everywhere: Find And Exclude Them For More Efficient Computer Vision, Caleb Tung, Abhinav Goel, Xiao Hu, Nick Eliopoulos, Emmanuel Amobi, George K. Thiruvathukal, Vipin Chaudhary, Yung-Hisang Lu
Irrelevant Pixels Are Everywhere: Find And Exclude Them For More Efficient Computer Vision, Caleb Tung, Abhinav Goel, Xiao Hu, Nick Eliopoulos, Emmanuel Amobi, George K. Thiruvathukal, Vipin Chaudhary, Yung-Hisang Lu
Computer Science: Faculty Publications and Other Works
Computer vision is often performed using Convolutional Neural Networks (CNNs). CNNs are compute-intensive and challenging to deploy on power-constrained systems such as mobile and Internet-of-Things (IoT) devices. CNNs are compute-intensive because they indiscriminately compute many features on all pixels of the input image. We observe that, given a computer vision task, images often contain pixels that are irrelevant to the task. For example, if the task is looking for cars, pixels in the sky are not very useful. Therefore, we propose that a CNN be modified to only operate on relevant pixels to save computation and energy. We propose a ...
A Mean-Field Markov Decision Process Model For Spatial Temporal Subsidies In Ride-Sourcing Markets, Zheng Zhu, Jintao Ke, Hai Wang
A Mean-Field Markov Decision Process Model For Spatial Temporal Subsidies In Ride-Sourcing Markets, Zheng Zhu, Jintao Ke, Hai Wang
Research Collection School Of Computing and Information Systems
Ride-sourcing services are increasingly popular because of their ability to accommodate on-demand travel needs. A critical issue faced by ride-sourcing platforms is the supply-demand imbalance, as a result of which drivers may spend substantial time on idle cruising and picking up remote passengers. Some platforms attempt to mitigate the imbalance by providing relocation guidance for idle drivers who may have their own self-relocation strategies and decline to follow the suggestions. Platforms then seek to induce drivers to system-desirable locations by offering them subsidies. This paper proposes a mean-field Markov decision process (MF-MDP) model to depict the dynamics in ride-sourcing markets ...
Time Dependent Orienteering Problem With Time Windows And Service Time Dependent Profits, M. Khodadadian, A. Divsalar, C. Verbeeck, Aldy Gunawan, P. Vansteenwegen
Time Dependent Orienteering Problem With Time Windows And Service Time Dependent Profits, M. Khodadadian, A. Divsalar, C. Verbeeck, Aldy Gunawan, P. Vansteenwegen
Research Collection School Of Computing and Information Systems
This paper addresses the time dependent orienteering problem with time windows and service time dependent profits (TDOPTW-STP). In the TDOPTW-STP, each vertex is assigned a minimum and a maximum service time and the profit collected at each vertex increases linearly with the service time. The goal is to maximize the total collected profit by determining a subset of vertices to be visited and assigning appropriate service time to each vertex, considering a given time budget and time windows. Moreover, travel times are dependent of the departure times. To solve this problem, a mixed integer linear model is formulated and a ...
Digbug—Pre/Post-Processing Operator Selection For Accurate Bug Localization, Kisub Kim, Sankalp Ghatpande, Kui Liu, Anil Koyuncu, Dongsun Kim, Tegawendé F. Bissyande, Jacques Klein, Yves Le Traon
Digbug—Pre/Post-Processing Operator Selection For Accurate Bug Localization, Kisub Kim, Sankalp Ghatpande, Kui Liu, Anil Koyuncu, Dongsun Kim, Tegawendé F. Bissyande, Jacques Klein, Yves Le Traon
Research Collection School Of Computing and Information Systems
Bug localization is a recurrent maintenance task in software development. It aims at identifying relevant code locations (e.g., code files) that must be inspected to fix bugs. When such bugs are reported by users, the localization process become often overwhelming as it is mostly a manual task due to incomplete and informal information (written in natural languages) available in bug reports. The research community has then invested in automated approaches, notably using Information Retrieval techniques. Unfortunately, reported performance in the literature is still limited for practical usage. Our key observation, after empirically investigating a large dataset of bug reports ...
Are You Really Muted?: A Privacy Analysis Of Mute Buttons In Video Conferencing Apps, Yucheng Yang, Jack West, George K. Thiruvathukal, Neil Klingensmith, Kassem Fawaz
Are You Really Muted?: A Privacy Analysis Of Mute Buttons In Video Conferencing Apps, Yucheng Yang, Jack West, George K. Thiruvathukal, Neil Klingensmith, Kassem Fawaz
Computer Science: Faculty Publications and Other Works
In the post-pandemic era, video conferencing apps (VCAs) have converted previously private spaces — bedrooms, living rooms, and kitchens — into semi-public extensions of the office. And for the most part, users have accepted these apps in their personal space, without much thought about the permission models that govern the use of their personal data during meetings. While access to a device’s video camera is carefully controlled, little has been done to ensure the same level of privacy for accessing the microphone. In this work, we ask the question: what happens to the microphone data when a user clicks the mute ...
Single-Pass Inline Pipeline 3d Reconstruction Using Depth Camera Array, Zhexiong Shang, Zhigang Shen
Single-Pass Inline Pipeline 3d Reconstruction Using Depth Camera Array, Zhexiong Shang, Zhigang Shen
Faculty Publications in Construction Engineering & Management
A novel inline inspection (ILI) approach using depth cameras array (DCA) is introduced to create high-fidelity, dense 3D pipeline models. A new camera calibration method is introduced to register the color and the depth information of the cameras into a unified pipe model. By incorporating the calibration outcomes into a robust camera motion estimation approach, dense and complete 3D pipe surface reconstruction is achieved by using only the inline image data collected by a self-powered ILI rover in a single pass through a straight pipeline. The outcomes of the laboratory experiments demonstrate one-millimeter geometrical accuracy and 0.1-pixel photometric accuracy ...
Decomposing Generation Networks With Structure Prediction For Recipe Generation, Hao Wang, Guosheng Lin, Steven C. H. Hoi, Chunyan Miao
Decomposing Generation Networks With Structure Prediction For Recipe Generation, Hao Wang, Guosheng Lin, Steven C. H. Hoi, Chunyan Miao
Research Collection School Of Computing and Information Systems
Recipe generation from food images and ingredients is a challenging task, which requires the interpretation of the information from another modality. Different from the image captioning task, where the captions usually have one sentence, cooking instructions contain multiple sentences and have obvious structures. To help the model capture the recipe structure and avoid missing some cooking details, we propose a novel framework: Decomposing Generation Networks (DGN) with structure prediction, to get more structured and complete recipe generation outputs. Specifically, we split each cooking instruction into several phases, and assign different sub-generators to each phase. Our approach includes two novel ideas ...
Coded Distributed Function Computation, Pedro J. Soto
Coded Distributed Function Computation, Pedro J. Soto
Dissertations, Theses, and Capstone Projects
A ubiquitous problem in computer science research is the optimization of computation on large data sets. Such computations are usually too large to be performed on one machine and therefore the task needs to be distributed amongst a network of machines. However, a common problem within distributed computing is the mitigation of delays caused by faulty machines. This can be performed by the use of coding theory to optimize the amount of redundancy needed to handle such faults. This problem differs from classical coding theory since it is concerned with the dynamic coded computation on data rather than just statically ...
Meaningful Activity Replacement Recommendations In Dementia, Jonathan Turner, Michael Wilson, Ciaran Nugent, Damon Berry, Julie Doyle, Dympna O'Sullivan
Meaningful Activity Replacement Recommendations In Dementia, Jonathan Turner, Michael Wilson, Ciaran Nugent, Damon Berry, Julie Doyle, Dympna O'Sullivan
Articles
Exercise of meaningful activities is important for people living with dementia, both for quality of life and to maintain the necessary basic activities of daily living. A method is proposed for recommendation of replacements for lost meaningful activities that accounts for the need to maintain activities of daily living.
Challenges In Migrating Imperative Deep Learning Programs To Graph Execution: An Empirical Study, Tatiana Castro Vélez, Raffi T. Khatchadourian, Mehdi Bagherzadeh, Anita Raja
Challenges In Migrating Imperative Deep Learning Programs To Graph Execution: An Empirical Study, Tatiana Castro Vélez, Raffi T. Khatchadourian, Mehdi Bagherzadeh, Anita Raja
Publications and Research
Efficiency is essential to support responsiveness w.r.t. ever-growing datasets, especially for Deep Learning (DL) systems. DL frameworks have traditionally embraced deferred execution-style DL code that supports symbolic, graph-based Deep Neural Network (DNN) computation. While scalable, such development tends to produce DL code that is error-prone, non-intuitive, and difficult to debug. Consequently, more natural, less error-prone imperative DL frameworks encouraging eager execution have emerged at the expense of run-time performance. While hybrid approaches aim for the "best of both worlds," the challenges in applying them in the real world are largely unknown. We conduct a data-driven analysis of challenges ...
A Tool For Rejuvenating Feature Logging Levels Via Git Histories And Degree Of Interest, Yiming Tang, Allan Spektor, Raffi T. Khatchadourian, Mehdi Bagherzadeh
A Tool For Rejuvenating Feature Logging Levels Via Git Histories And Degree Of Interest, Yiming Tang, Allan Spektor, Raffi T. Khatchadourian, Mehdi Bagherzadeh
Publications and Research
Logging is a significant programming practice. Due to the highly transactional nature of modern software applications, a massive amount of logs are generated every day, which may overwhelm developers. Logging information overload can be dangerous to software applications. Using log levels, developers can print the useful information while hiding the verbose logs during software runtime. As software evolves, the log levels of logging statements associated with the surrounding software feature implementation may also need to be altered. Maintaining log levels necessitates a significant amount of manual effort. In this paper, we demonstrate an automated approach that can rejuvenate feature log ...
Analysis Of Principles Of Development Of Key Technologies, Yungang Bao
Analysis Of Principles Of Development Of Key Technologies, Yungang Bao
Bulletin of Chinese Academy of Sciences (Chinese Version)
How to development key technologies requires understanding the principles of technology evolution. This study proposes that the development process of key technologies follows the Metcalf's Law. Furthermore, this paper presents two principles of the development of key technologies from different angles. Finally, several suggestions are raised.
Promoting Infrastructure Construction In Advance To Support Sci-Tech Self-Reliance And Self-Strengthening At Higher Level, Yang Wang, Yuanchun Zhou, Yanguang Wang, Jianhui Li, Fazhi Qi, Honglin He, Fangyu Liao
Promoting Infrastructure Construction In Advance To Support Sci-Tech Self-Reliance And Self-Strengthening At Higher Level, Yang Wang, Yuanchun Zhou, Yanguang Wang, Jianhui Li, Fazhi Qi, Honglin He, Fangyu Liao
Bulletin of Chinese Academy of Sciences (Chinese Version)
The research infrastructure is the basic and strategic platform of scientific and technological innovation. In the last decade, China's research infrastructure has achieved leapfrog development in the level of observation, manufacturing, management, data acquisition, data sharing and utilization, which supports China's scientific and technological innovation activities at a higher level. Looking into the future, the scientific research paradigm is transforming. The network, data, and computing platform will not only support the development of major science and technology infrastructure and field stations in larger, more accurate, and more advanced approach, but also contribute to the transformation of scientific research ...
Implementation Of A Least Squares Method To A Navier-Stokes Solver, Jada P. Lytch, Taylor Boatwright, Ja'nya Breeden
Implementation Of A Least Squares Method To A Navier-Stokes Solver, Jada P. Lytch, Taylor Boatwright, Ja'nya Breeden
Rose-Hulman Undergraduate Mathematics Journal
The Navier-Stokes equations are used to model fluid flow. Examples include fluid structure interactions in the heart, climate and weather modeling, and flow simulations in computer gaming and entertainment. The equations date back to the 1800s, but research and development of numerical approximation algorithms continues to be an active area. To numerically solve the Navier-Stokes equations we implement a least squares finite element algorithm based on work by Roland Glowinski and colleagues. We use the deal.II academic library , the C++ language, and the Linux operating system to implement the solver. We investigate convergence rates and apply the least squares ...
A Study On Privacy Of Iot Devices Among A Sample Of Indians In The U.S- 2021, Sahana Prasad Dr, Sharanya Prasad Ms, Vijith Raghavendra, Srishma Sunku
A Study On Privacy Of Iot Devices Among A Sample Of Indians In The U.S- 2021, Sahana Prasad Dr, Sharanya Prasad Ms, Vijith Raghavendra, Srishma Sunku
International Journal of Computer Science and Informatics
The Internet of Things (IoT) has gained immense popularity over the last decade with wide-ranging applications in domains of medicine, science, military as well as domestic use. Despite its tremendous growth, privacy concerns plague IoT applications and have the potential to hamper the benefits derived from its usage. This paper carries out a statistical analysis of empirical data collected from users of IoT to assess the level of awareness among users of IoT. The mode of study was through a questionnaire sent through Google forms to a selection of Indians living across the U.S. The place was chosen as ...
On The Richardson-Lucy Algorithm With A Varying Point Spread Function Along The Iterations, Erica S. Souza, Maria Ines Silvani, Gevaldo L. Almeida, Ricardo T. Lopes
On The Richardson-Lucy Algorithm With A Varying Point Spread Function Along The Iterations, Erica S. Souza, Maria Ines Silvani, Gevaldo L. Almeida, Ricardo T. Lopes
International Journal of Image Processing and Vision Science
Abstract: This work analyses the soundness of two algorithms, Fishsint and Almexp to improve images using the Richardson-Lucy (RL) algorithm under a varying Point Spread Function (PSF) along the iterations. A plethora of methods based on Richardson-Lucy has been published, but no further proposal involving such an alternative has been published. Whereas the unnamed predecessor of Fishsint addressed only small size synthetic images under a blind fashion procedure, Fishsint and Almexp employs an algorithm Wdet to determine the initial PSF and all subsequent values after each iteration, respectively. Fishsint performs a loop, where the last determined PSF improves the previously ...
A Systematic Review On Machine Learning Models For Online Learning And Examination Systems, Sanaa Kaddoura, Daniela Elena Popescu, Jude D. Hemanth
A Systematic Review On Machine Learning Models For Online Learning And Examination Systems, Sanaa Kaddoura, Daniela Elena Popescu, Jude D. Hemanth
All Works
Examinations or assessments play a vital role in every student’s life; they determine their future and career paths. The COVID pandemic has left adverse impacts in all areas, including the academic field. The regularized classroom learning and face-to-face real-time examinations were not feasible to avoid widespread infection and ensure safety. During these desperate times, technological advancements stepped in to aid students in continuing their education without any academic breaks. Machine learning is a key to this digital transformation of schools or colleges from real-time to online mode. Online learning and examination during lockdown were made possible by Machine learning ...
Simulating Photo-Disintegration Of 137cs Radioactive Waste Using Various Energies Of Gamma Photons, Hassanain H. Alkazzaz, Asia H. Al-Mashhadani, Kamal H. Lateef
Simulating Photo-Disintegration Of 137cs Radioactive Waste Using Various Energies Of Gamma Photons, Hassanain H. Alkazzaz, Asia H. Al-Mashhadani, Kamal H. Lateef
Karbala International Journal of Modern Science
In this study, the possibility of using gamma-ray in photo-disintegration method was examined so that it can be used in the remediation of 137Cs radionuclides waste materials by nuclear transmutation to convert long-lived nuclides to other isotopes nuclides, which are shorter half-life (or stable), by different photo-nuclear reaction channels (γ,n), (γ,2n), (γ,p), (γ, a), (γ,d). A simulation code has been written using MATLAB for conducting calculations of reduction and residual. The results showed that gamma-ray fluxes below 1017 [cm-2 s-1] are not adequate to perform effective incinera-tion of 137Cs, and as for gamma flux of 1018 ...
Engineering Of A Multi-Epitope Subunit Vaccine Against Sasrs-Cov-2 Through The Viroinformatic Approach, Aamir Shehzada, Christijogo Sumartono, Jusak Nugraha, Helen Susilowatid, Andi Yasmin Wijayab, Hafiz Ishfaq Ahmad, Wiwiek Tyasningsih, Fedik Abdul Rantam
Engineering Of A Multi-Epitope Subunit Vaccine Against Sasrs-Cov-2 Through The Viroinformatic Approach, Aamir Shehzada, Christijogo Sumartono, Jusak Nugraha, Helen Susilowatid, Andi Yasmin Wijayab, Hafiz Ishfaq Ahmad, Wiwiek Tyasningsih, Fedik Abdul Rantam
Karbala International Journal of Modern Science
The COVID-19 outbreak has infected millions of people worldwide, but no vaccine has been discovered to combat it efficiently. This research aims to design a multi-epitope vaccine using highly efficient B- and T-cell epitopes from the SARS-CoV-2 Surabaya isolate through a viroinformatic approach. First, the putative epitopes were linked together to develop tertiary structures and then docked with toll-like receptor 4 (TLR-4) that demonstrated a robust interaction with a low eigenvalue of 4.816138 e-06. Furthermore, the structure's high immunogenic response was observed and successfully cloned into the expression vector pET28a (+). This implies that the designed vaccine can prove ...
Information Provenance For Mobile Health Data, Taylor A. Hardin
Information Provenance For Mobile Health Data, Taylor A. Hardin
Dartmouth College Ph.D Dissertations
Mobile health (mHealth) apps and devices are increasingly popular for health research, clinical treatment and personal wellness, as they offer the ability to continuously monitor aspects of individuals' health as they go about their everyday activities. Many believe that combining the data produced by these mHealth apps and devices may give healthcare-related service providers and researchers a more holistic view of an individual's health, increase the quality of service, and reduce operating costs. For such mHealth data to be considered useful though, data consumers need to be assured that the authenticity and the integrity of the data has remained ...
Understanding The Influence Of Perceptual Noise On Visual Flanker Effects Through Bayesian Model Fitting, Jordan Deakin, Dietmar Heinke
Understanding The Influence Of Perceptual Noise On Visual Flanker Effects Through Bayesian Model Fitting, Jordan Deakin, Dietmar Heinke
MODVIS Workshop
No abstract provided.
Small Business Cybersecurity: A Loophole To Consumer Data, Matthew R. Espinosa
Small Business Cybersecurity: A Loophole To Consumer Data, Matthew R. Espinosa
The Scholar: St. Mary's Law Review on Race and Social Justice
Small businesses and small minority owned businesses are vital to our nation’s economy; therefore legislation, regulation, and policy has been created in order to assist them in overcoming their economic stability issues and ensure they continue to serve the communities that rely on them. However, there is not a focus on regulating nor assisting small businesses to ensure their cybersecurity standards are up to par despite them increasingly becoming a victim of cyberattacks that yield high consequences. The external oversight and assistance is necessary for small businesses due to their lack of knowledge in implementing effective cybersecurity policies, the ...
Prospects For Legal Analytics: Some Approaches To Extracting More Meaning From Legal Texts, Kevin D. Ashley
Prospects For Legal Analytics: Some Approaches To Extracting More Meaning From Legal Texts, Kevin D. Ashley
University of Cincinnati Law Review
No abstract provided.