Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 42

Full-Text Articles in Physical Sciences and Mathematics

A Predictive Analytics Approach To Building A Decision Support System For Improving Graduation Rates At A Four-Year College, Xuan Wang, Helmut Schneider, Kenneth R. Walsh Dec 2020

A Predictive Analytics Approach To Building A Decision Support System For Improving Graduation Rates At A Four-Year College, Xuan Wang, Helmut Schneider, Kenneth R. Walsh

Information Systems Faculty Publications and Presentations

Although graduation rates have interested stakeholders, educational researchers, and policymakers for some time, little progress has been made on the overall graduation rate at four-year state colleges. Even though selective admission based on academic indicators such as high school GPA and ACT/ SAT have widely been used in the USA for years, and recent statistics show that less than 40% of students graduate from four-year state colleges in four years in the US. The authors propose using an ensemble of analytic models that considers cost as a better form of analysis that can be used as input to decision support …


Neural Network Development In An Artificial Intelligence Gomoku Program, David Garcia Dec 2020

Neural Network Development In An Artificial Intelligence Gomoku Program, David Garcia

Theses and Dissertations

The game of Gomoku, also called Five in a Row, is an abstract strategy board game. The Gomoku program is constructed upon an algebraic monomial theory to aid values for each possible move and estimate chances for the artificial intelligence program to accomplish a winning path for each move and rounds. With the utilization of the monomial theory, winning configurations are successfully converted into monomials of variables which are represented on board positions. In the artificial intelligence program, an arduous task is how to perform the present configuration of the Gomoku game along with the past moves of the two …


Artificial Intelligence In A Main Warehouse In Panasonic: Los Indios, Texas, Edison Antonio Trejo Hernandez Dec 2020

Artificial Intelligence In A Main Warehouse In Panasonic: Los Indios, Texas, Edison Antonio Trejo Hernandez

Theses and Dissertations

The Panasonic Company warehouse is located in Los Indios Texas. The warehouse presents the limitation of the great distances between its headquarters and the Main Warehouse for supplying the branches and main customers, which requires a considerable amount of time to maintain effective communication in the inventory area. In addition, during an online review, it can be confirmed that the website is disabled, contradicting its corporate policy.

The structure of the thesis proposal is arranged in four chapters from the Introduction, Statement of the Problem and Purposes; Previous Studies and Definition of the literature; the Research Methodology and the resources …


A Targeted Adversarial Attack On Support Vector Machine Using The Boundary Line, Yessenia Rodriguez Dec 2020

A Targeted Adversarial Attack On Support Vector Machine Using The Boundary Line, Yessenia Rodriguez

Theses and Dissertations

In this thesis, a targeted adversarial attack is explored on a Support Vector Machine (SVM). SVM is defined by creating a separating boundary between two classes. Using a target class, any input can be modified to cross the “boundary line,” making the model predict the target class. To limit the modification, a percentage of an image of the target class is used to get several random sections. Using these sections, the input will be moved in small steps closer to the boundary point. The section that took the least number of steps to cause the model to predict the target …


Reinforcement Learning Environment For Orbital Station-Keeping, Armando Herrera Iii Dec 2020

Reinforcement Learning Environment For Orbital Station-Keeping, Armando Herrera Iii

Theses and Dissertations

In this thesis, a Reinforcement Learning Environment for orbital station-keeping is created and tested against one of the most used Reinforcement Learning algorithm called Proximal Policy Optimization (PPO). This thesis also explores the foundations of Reinforcement Learning, from the taxonomy to a description of PPO, and shows a thorough explanation of the physics required to make the RL environment. Optuna optimizes PPO's hyper-parameters for the created environment via distributed computing. This thesis then shows and analysis the results from training a PPO agent six times.


Different Approximation Algorithms For Channel Scheduling In Wireless Networks, Qiufen Ni, Chuanhe Huang, Panos M. Pardalos, Jia Ye, Bin Fu Nov 2020

Different Approximation Algorithms For Channel Scheduling In Wireless Networks, Qiufen Ni, Chuanhe Huang, Panos M. Pardalos, Jia Ye, Bin Fu

Computer Science Faculty Publications and Presentations

We introduce a new two-side approximation method for the channel scheduling problem, which controls the accuracy of approximation in two sides by a pair of parameters . We present a series of simple and practical-for-implementation greedy algorithms which give constant factor approximation in both sides. First, we propose four approximation algorithms for the weighted channel allocation problem: 1. a greedy algorithm for the multichannel with fixed interference radius scheduling problem is proposed and an one side -IS-approximation is obtained; 2. a greedy -approximation algorithm for single channel with fixed interference radius scheduling problem is presented; 3. we improve the existing …


Relocating Units In Robot Swarms With Uniform Control Signals Is Pspace-Complete, David Caballero, Angel A. Cantu, Timothy Gomez, Austin Luchsinger, Robert Schweller, Tim Wylie Oct 2020

Relocating Units In Robot Swarms With Uniform Control Signals Is Pspace-Complete, David Caballero, Angel A. Cantu, Timothy Gomez, Austin Luchsinger, Robert Schweller, Tim Wylie

Computer Science Faculty Publications and Presentations

This paper investigates a restricted version of robot motion planning, in which particles on a board uniformly respond to global signals that cause them to move one unit distance in a particular direction on a 2D grid board with geometric obstacles. We show that the problem of deciding if a particular particle can be relocated to a specified location on the board is PSPACE-complete when only allowing 1x1 particles. This shows a separation between this problem, called the relocation problem, and the occupancy problem in which we ask whether a particular location can be occupied by any particle on the …


Testing Mediation Via Indirect Effects In Pls-Sem: A Social Networking Site Illustration, Murad Moqbel, Rakesh Guduru, Ahasan Harun Oct 2020

Testing Mediation Via Indirect Effects In Pls-Sem: A Social Networking Site Illustration, Murad Moqbel, Rakesh Guduru, Ahasan Harun

Information Systems Faculty Publications and Presentations

Mediation analysis, in the context of structural equation modeling via partial least squares (PLSSEM), affords a better understanding of the relationships among independent and dependent variables, when the variables seem to not have a definite connection. In this paper, we demonstrate such an analysis in the context of social networking sites, using WarpPLS, a leading PLS-SEM software tool.


The Majority Rule: A General Protection On Recommender System, Lei Xu, Lin Chen, Martin Flores, Hansheng Lei, Liyu Zhang, Mahmoud K. Quweider, Fitratullah Khan, Weidong Shi Oct 2020

The Majority Rule: A General Protection On Recommender System, Lei Xu, Lin Chen, Martin Flores, Hansheng Lei, Liyu Zhang, Mahmoud K. Quweider, Fitratullah Khan, Weidong Shi

Computer Science Faculty Publications and Presentations

Recommender systems are widely used in a variety of scenarios, including online shopping, social network, and contents distribution. As users rely more on recommender systems for information retrieval, they also become attractive targets for cyber-attacks. The high-level idea of attacking a recommender system is straightforward. An adversary selects a strategy to inject manipulated data into the database of the recommender system to influence the recommendation results, which is also known as a profile injection attack. Most existing works treat attacking and protection in a static manner, i.e., they only consider the adversary’s behavior when analyzing the influence without considering normal …


Real-Time Road Hazard Information System, Carlos Pena-Caballero, Dong-Chul Kim, Adolfo Gonzalez, Osvaldo Castellanos, Angel A. Cantu, Jungseok Ho Sep 2020

Real-Time Road Hazard Information System, Carlos Pena-Caballero, Dong-Chul Kim, Adolfo Gonzalez, Osvaldo Castellanos, Angel A. Cantu, Jungseok Ho

Computer Science Faculty Publications and Presentations

Infrastructure is a significant factor in economic growth for systems of government. In order to increase economic productivity, maintaining infrastructure quality is essential. One of the elements of infrastructure is roads. Roads are means which help local and national economies be more productive. Furthermore, road damage such as potholes, debris, or cracks is the cause of many on-road accidents that have cost the lives of many drivers. In this paper, we propose a system that uses Convolutional Neural Networks to detect road degradations without data pre-processing. We utilize the state-of-the-art object detection algorithm, YOLO detector for the system. First, we …


Analyzing Sensor-Based Individual And Population Behavior Patterns Via Inverse Reinforcement Learning, Beiyu Lin, Diane J. Cook Sep 2020

Analyzing Sensor-Based Individual And Population Behavior Patterns Via Inverse Reinforcement Learning, Beiyu Lin, Diane J. Cook

Computer Science Faculty Publications and Presentations

Digital markers of behavior can be continuously created, in everyday settings, using time series data collected by ambient sensors. The goal of this work was to perform individual- and population-level behavior analysis from such time series sensor data. In this paper, we introduce a novel algorithm-Resident Relative Entropy-Inverse Reinforcement Learning (RRE-IRL)-to perform an analysis of a single smart home resident or a group of residents, using inverse reinforcement learning. By employing this method, we learnt an individual's behavioral routine preferences. We then analyzed daily routines for an individual and for eight smart home residents grouped by health diagnoses. We observed …


New Bounds On Augmenting Steps Of Block-Structured Integer Programs, Lin Chen, Martin Koutecký, Lei Xu, Weidong Shi Aug 2020

New Bounds On Augmenting Steps Of Block-Structured Integer Programs, Lin Chen, Martin Koutecký, Lei Xu, Weidong Shi

Computer Science Faculty Publications and Presentations

Iterative augmentation has recently emerged as an overarching method for solving Integer Programs (IP) in variable dimension, in stark contrast with the volume and flatness techniques of IP in fixed dimension. Here we consider 4-block n-fold integer programs, which are the most general class considered so far. A 4-block n-fold IP has a constraint matrix which consists of n copies of small matrices A, B, and D, and one copy of C, in a specific block structure. Iterative augmentation methods rely on the so-called Graver basis of the constraint matrix, which constitutes a set of fundamental augmenting steps. All existing …


Polyhedra Circuits And Their Applications, Bin Fu, Pengfei Gu, Yuming Zhao Aug 2020

Polyhedra Circuits And Their Applications, Bin Fu, Pengfei Gu, Yuming Zhao

Computer Science Faculty Publications and Presentations

To better compute the volume and count the lattice points in geometric objects, we propose polyhedral circuits. Each polyhedral circuit characterizes a geometric region in Rd . They can be applied to represent a rich class of geometric objects, which include all polyhedra and the union of a finite number of polyhedron. They can be also used to approximate a large class of d-dimensional manifolds in Rd . Barvinok [3] developed polynomial time algorithms to compute the volume of a rational polyhedron, and to count the number of lattice points in a rational polyhedron in Rd with a fixed dimensional …


Computational Complexity Characterization Of Protecting Elections From Bribery, Lin Chen, Ahmed Sunny, Lei Xu, Shouhuai Xu, Zhimin Gao, Yang Lu, Weidong Shi, Nolan Shah Aug 2020

Computational Complexity Characterization Of Protecting Elections From Bribery, Lin Chen, Ahmed Sunny, Lei Xu, Shouhuai Xu, Zhimin Gao, Yang Lu, Weidong Shi, Nolan Shah

Computer Science Faculty Publications and Presentations

The bribery problem in election has received considerable attention in the literature, upon which various algorithmic and complexity results have been obtained. It is thus natural to ask whether we can protect an election from potential bribery. We assume that the protector can protect a voter with some cost (e.g., by isolating the voter from potential bribers). A protected voter cannot be bribed. Under this setting, we consider the following bi-level decision problem: Is it possible for the protector to protect a proper subset of voters such that no briber with a fixed budget on bribery can alter the election …


Hardness Of Sparse Sets And Minimal Circuit Size Problem, Bin Fu Aug 2020

Hardness Of Sparse Sets And Minimal Circuit Size Problem, Bin Fu

Computer Science Faculty Publications and Presentations

We study the magnification of hardness of sparse sets in nondeterministic time complexity classes on a randomized streaming model. One of our results shows that if there exists a 2no(1) -sparse set in NDTIME(2no(1)) that does not have any randomized streaming algorithm with no(1) updating time, and no(1) space, then NEXP≠BPP , where a f(n)-sparse set is a language that has at most f(n) strings of length n. We also show that if MCSP is ZPP -hard under polynomial time truth-table reductions, then EXP≠ZPP .


Building Patterned Shapes In Robot Swarms With Uniform Control Signals, David Caballero, Angel A. Cantu, Timothy Gomez, Austin Luchsinger, Robert Schweller, Tim Wylie Aug 2020

Building Patterned Shapes In Robot Swarms With Uniform Control Signals, David Caballero, Angel A. Cantu, Timothy Gomez, Austin Luchsinger, Robert Schweller, Tim Wylie

Computer Science Faculty Publications and Presentations

This paper investigates a restricted version of robot motion planning, in which particles on a board uniformly respond to global signals that cause them to move one unit distance in a particular direction. We look at the problem of assembling patterns within this model. We first derive upper and lower bounds on the worst-case number of steps needed to reconfigure a general purpose board into a target pattern. We then show that the construction of k-colored patterns of size-n requires Ω(n log k) steps in general, and Ω(n log k + √ k) steps if the constructed shape must always …


Analysis Of The Functional Relationship Of Protein Kinase Families Using Phospho-Proteomics Data, David A. Parra Peña Aug 2020

Analysis Of The Functional Relationship Of Protein Kinase Families Using Phospho-Proteomics Data, David A. Parra Peña

Theses and Dissertations

As cancer research advances, Mass-spectrometry based proteomics is becoming a widely used technique for proteome characterization. Phosphoproteomics is a specific type of proteomics that characterizes proteins with the reversible post-translational modification of phosphorylation PTM), which has allowed the identifications of thousands of phosphorylation sites. These phosphorylation sites, also known as substrates, are known to interact with a protein type named kinases. Studies have shown that abnormal phosphorylation activity is related to cancer diseases. Moreover, these kinases are divided into families, based on the similarity of their catalytic domain, as this part of their amino acid sequence determines a large part …


Diffusion Of Falsehoods On Social Media, Kelvin Kizito King Aug 2020

Diffusion Of Falsehoods On Social Media, Kelvin Kizito King

Theses and Dissertations

Misinformation has captured the interest of academia in recent years with several studies looking at the topic broadly. However, these studies mostly focused on rumors which are social in nature and can be either classified as false or real. In this research, we attempt to bridge the gap in the literature by examining the impacts of user characteristics and feature contents on the diffusion of (mis)information using verified true and false information. We apply a topic allocation model augmented by both supervised and unsupervised machine learning algorithms to identify tweets on novel topics. We find that retweet count is higher …


Creativity And Engagement In Ideas Crowdsourcing: A Situation Awareness Perspective, James Gitau Wairimu Aug 2020

Creativity And Engagement In Ideas Crowdsourcing: A Situation Awareness Perspective, James Gitau Wairimu

Theses and Dissertations

This dissertation investigates the influence of performance feedback in user motivation and creativity development in idea crowdsourcing engagement. Creativity occurs when users of idea crowdsourcing communities engage in direct and indirect interactions that expose them to a pool of knowledge that enhances their cognitive development leading to the contribution of novel ideas for innovation in organizations. Additionally, participant motivation to engage in ideas crowdsourcing is increased through rewards and conditions that make the ideation process more inclusive and enjoyable. An idea network design is developed by applying social network analysis principles. The idea network design consists of mechanisms for motivating …


Weak Mitoticity Of Bounded Disjunctive And Conjunctive Truth-Table Autoreducible Sets, Liyu Zhang, Mahmoud K. Quweider, Hangsheng Lei, Fitratullah Khan Jun 2020

Weak Mitoticity Of Bounded Disjunctive And Conjunctive Truth-Table Autoreducible Sets, Liyu Zhang, Mahmoud K. Quweider, Hangsheng Lei, Fitratullah Khan

Computer Science Faculty Publications and Presentations

Glaßer et al. (SIAMJCOMP 2008 and TCS 2009)2 proved existence of two sparse sets A and B in EXP, where A is 3-tt (truth-table) polynomial-time autoreducible but not weakly polynomial-time Turing mitotic and B is polynomial-time 2-tt autoreducible but not weakly polynomial-time 2-tt mitotic. We unify and strengthen both of those results by showing that there is a sparse set in EXP that is polynomial-time 2-tt autoreducible but not even weakly polynomial-time Turing mitotic. All these results indicate that polynomial-time autoreducibilities in general do not imply polynomial-time mitoticity at all with the only exceptions of the many-one and 1-tt reductions. …


Infusing Raspberry Pi In The Computer Science Curriculum For Enhanced Learning, Fitratullah Khan, Mahmoud K. Quweider, Ala Qubbaj, Emmett Tomai, Lei Xu, Liyu Zhang, Hansheng Lei Jun 2020

Infusing Raspberry Pi In The Computer Science Curriculum For Enhanced Learning, Fitratullah Khan, Mahmoud K. Quweider, Ala Qubbaj, Emmett Tomai, Lei Xu, Liyu Zhang, Hansheng Lei

Computer Science Faculty Publications and Presentations

With the advent of cloud computing, the Internet of Things (IoT), and mobile computing, CS faculty are continuously revamping the curriculum material to address such burgeoning set of technologies in practical and relatable ways. Raspberry Pi (RPi) devices represent an ideal hardware/software framework that embodies all these technologies through its simple architecture, small form factor (that minimizes the volume and footprint of a desktop computer), and ability to integrate various sensors that network together and connect to the Cloud. Therefore, one of the strategies of Computer Science Department, to enhance depth of learning concepts, has been to infuse Raspberry Pi …


Cybersecurity, Digital Forensics, And Mobile Computing: Building The Pipeline Of Next-Generation University Graduates Through Focused High School Summer Camps, Mahmoud K. Quweider, Fitratullah Khan, Liyu Zhang, Lei Xu, Yessica Rodriguez, Yessenia Rodriguez Jun 2020

Cybersecurity, Digital Forensics, And Mobile Computing: Building The Pipeline Of Next-Generation University Graduates Through Focused High School Summer Camps, Mahmoud K. Quweider, Fitratullah Khan, Liyu Zhang, Lei Xu, Yessica Rodriguez, Yessenia Rodriguez

Computer Science Faculty Publications and Presentations

To prepare the next generation of skilled university graduates that would help in filling the national need for cybersecurity, digital forensics, and mobile computing professionals, a team of minority/under-represented graduate students, the University Upward Bound Program (a federally funded program and part of the U.S. Department of Education; one of 967 programs nationwide) staff, and faculty from the Computer Science (CS) department got together and proposed a focused 10-week long funded summer camp for two local high schools with the following objectives:

1. Provide graduate students to instruct in the areas of` mobile application development, forensics and cyber Security.

2. …


Visual Attention Consistency Under Image Transforms For Multi-Label Image Classification, Hao Guo, Kang Zheng, Xiaochuan Fan, Hongkai Yu, Song Wang Jun 2020

Visual Attention Consistency Under Image Transforms For Multi-Label Image Classification, Hao Guo, Kang Zheng, Xiaochuan Fan, Hongkai Yu, Song Wang

Computer Science Faculty Publications and Presentations

Human visual perception shows good consistency for many multi-label image classification tasks under certain spatial transforms, such as scaling, rotation, flipping and translation. This has motivated the data augmentation strategy widely used in CNN classifier training -- transformed images are included for training by assuming the same class labels as their original images. In this paper, we further propose the assumption of perceptual consistency of visual attention regions for classification under such transforms, i.e., the attention region for a classification follows the same transform if the input image is spatially transformed. While the attention regions of CNN classifiers can be …


Using Continuous Sensor Data To Formalize A Model Of In-Home Activity Patterns, Beiyu Lin, Diane J. Cook, Maureen Schmitter-Edgecombe May 2020

Using Continuous Sensor Data To Formalize A Model Of In-Home Activity Patterns, Beiyu Lin, Diane J. Cook, Maureen Schmitter-Edgecombe

Computer Science Faculty Publications and Presentations

Formal modeling and analysis of human behavior can properly advance disciplines ranging from psychology to economics. The ability to perform such modeling has been limited by a lack of ecologically-valid data collected regarding human daily activity. We propose a formal model of indoor routine behavior based on data from automatically-sensed and recognized activities. A mechanistic description of behavior patterns for identical activity is offered to both investigate behavioral norms with 99 smart homes and compare these norms between subgroups. We identify and model the patterns of human behaviors based on inter-arrival times, the time interval between two successive activities, for …


Robotic Swarms: Assembly And Complexity, Angel Adrian Cantu Suarez May 2020

Robotic Swarms: Assembly And Complexity, Angel Adrian Cantu Suarez

Theses and Dissertations

This thesis focuses on the assembly of robotic swarms that move according to some global signal in a model called the “tilt” model. The model consists of a 2D board that contain open and blocked spaces, along with tiles or polyominoes that move toward a signaled cardinal direction. We look at two variations of this model called the single-step and full-tilt model, where the elements move single distances or maximally, respectively, when a signal is send. We show different methods of shape construction, defining board configurations that are universal for a set of shapes. Afterwards, we analyze different computational problems …


A Mathematical Approach To Gomoku, Oscar Garcia May 2020

A Mathematical Approach To Gomoku, Oscar Garcia

Theses and Dissertations

This goal of this thesis is to design and implement a light weighted AI for playing Gomoku with high level intelligence. Our work is built upon an innovative algebraic monomial theory to help assess values for each possible move and estimate chances for the AI to win at each move. With the help of the monomial theory, we are able to convert winning configurations into monomials of variables that represent the underlying board positions. In the existing approaches to building an AI for playing Gomoku, one common challenge is about how to represent the present configuration of the game along …


Algorithmic Assembly Of Nanoscale Structures, Austin Luchsinger May 2020

Algorithmic Assembly Of Nanoscale Structures, Austin Luchsinger

Theses and Dissertations

The development of nanotechnology has become one of the most significant endeavors of our time. A natural objective of this field is discovering how to engineer nanoscale structures. Limitations of current top-down techniques inspire investigation into bottom-up approaches to reach this objective. A fundamental precondition for a bottom-up approach is the ability to control the behavior of nanoscale particles. Many abstract representations have been developed to model systems of particles and to research methods for controlling their behavior. This thesis develops theories on two such approaches for building complex structures: the self-assembly of simple particles, and the use of simple …


Verification And Computation In Restricted Tile Automata, David Caballero, Timothy Gomez, Robert Schweller, Tim Wylie Apr 2020

Verification And Computation In Restricted Tile Automata, David Caballero, Timothy Gomez, Robert Schweller, Tim Wylie

Computer Science Faculty Publications and Presentations

Many models of self-assembly have been shown to be capable of performing computation. Tile Automata was recently introduced combining features of both Celluar Automata and the 2-Handed Model of self-assembly both capable of universal computation. In this work we study the complexity of Tile Automata utilizing features inherited from the two models mentioned above. We first present a construction for simulating Turing Machines that performs both covert and fuel efficient computation. We then explore the capabilities of limited Tile Automata systems such as 1-Dimensional systems (all assemblies are of height 1) and freezing Systems (tiles may not repeat states). Using …


Privateex: Privacy Preserving Exchange Of Crypto-Assets On Blockchain, Lei Xu, Lin Chen, Zhimin Gao, Keshav Kasichainula, Miguel Fernandez, Bogdan Carbunar, Weidong Shi Mar 2020

Privateex: Privacy Preserving Exchange Of Crypto-Assets On Blockchain, Lei Xu, Lin Chen, Zhimin Gao, Keshav Kasichainula, Miguel Fernandez, Bogdan Carbunar, Weidong Shi

Computer Science Faculty Publications and Presentations

Bitcoin introduces a new type of cryptocurrency that does not rely on a central system to maintain transactions. Inspired by the success of Bitcoin, all types of alt cryptocurrencies were invented in recent years. Some of the new cryptocurrencies focus on privacy enhancement, where transaction information such as value and sender/receiver identity can be hidden, such as Zcash and Monero. However, there are few schemes to support multiple types of cryptocurrencies/assets and offer privacy enhancement at the same time. The major challenge for a multiple asset system is that it needs to support two-way assets exchange between participants besides one-way …


Domain Adaptation For Vehicle Detection In Traffic Surveillance Images From Daytime To Nighttime, Jinlong Ji, Zhigang Xu, Hongkai Yu, Lan Fu, Xuesong Zhou Mar 2020

Domain Adaptation For Vehicle Detection In Traffic Surveillance Images From Daytime To Nighttime, Jinlong Ji, Zhigang Xu, Hongkai Yu, Lan Fu, Xuesong Zhou

Computer Science Faculty Publications and Presentations

Vehicle detection in traffic surveillance images is an important approach to obtain vehicle data and rich traffic flow parameters. Recently, deep learning based methods have been widely used in vehicle detection with high accuracy and efficiency. However, deep learning based methods require a large number of manually labeled ground truths (bounding box of each vehicle in each image) to train the Convolutional Neural Networks (CNN). In the modern urban surveillance cameras, there are already many manually labeled ground truths in daytime images for training CNN, while there are little or much less manually labeled ground truths in nighttime images. In …