Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Singapore Management University (21)
- Technological University Dublin (11)
- TÜBİTAK (11)
- New Jersey Institute of Technology (8)
- Air Force Institute of Technology (7)
-
- Old Dominion University (5)
- San Jose State University (5)
- The University of Maine (5)
- Chapman University (4)
- University of Denver (4)
- University of Massachusetts Amherst (4)
- China Simulation Federation (3)
- City University of New York (CUNY) (3)
- Edith Cowan University (3)
- James Madison University (3)
- Nova Southeastern University (3)
- Portland State University (3)
- University of Kentucky (3)
- University of Wisconsin Milwaukee (3)
- Utah State University (3)
- Zayed University (3)
- Bard College (2)
- Boise State University (2)
- Brigham Young University (2)
- California Polytechnic State University, San Luis Obispo (2)
- Kennesaw State University (2)
- Missouri State University (2)
- Oberlin (2)
- Purdue University (2)
- University of Arkansas, Fayetteville (2)
- Publication
-
- Research Collection School Of Computing and Information Systems (17)
- Turkish Journal of Electrical Engineering and Computer Sciences (11)
- Theses and Dissertations (10)
- Dissertations (9)
- Conference papers (6)
-
- Articles (5)
- Doctoral Dissertations (5)
- Electronic Theses and Dissertations (5)
- General University of Maine Publications (5)
- Faculty Publications (4)
- Master's Projects (4)
- All Graduate Theses and Dissertations, Spring 1920 to Summer 2023 (3)
- All Works (3)
- CCE Theses and Dissertations (3)
- Engineering Faculty Articles and Research (3)
- Journal of System Simulation (3)
- Research outputs 2014 to 2021 (3)
- Boise State University Theses and Dissertations (2)
- Browse all Theses and Dissertations (2)
- Computer Science Faculty Publications (2)
- Computer Science and Computer Engineering Undergraduate Honors Theses (2)
- Dissertations and Theses (2)
- Honors Papers (2)
- Honors Theses (2)
- MSU Graduate Theses (2)
- Master's Theses (2)
- Publications and Research (2)
- Research Collection Lee Kong Chian School Of Business (2)
- Senior Honors Projects, 2020-current (2)
- Theses (2)
- Publication Type
Articles 1 - 30 of 185
Full-Text Articles in Physical Sciences and Mathematics
Countering Internet Packet Classifiers To Improve User Online Privacy, Sina Fathi-Kazerooni
Countering Internet Packet Classifiers To Improve User Online Privacy, Sina Fathi-Kazerooni
Dissertations
Internet traffic classification or packet classification is the act of classifying packets using the extracted statistical data from the transmitted packets on a computer network. Internet traffic classification is an essential tool for Internet service providers to manage network traffic, provide users with the intended quality of service (QoS), and perform surveillance. QoS measures prioritize a network's traffic type over other traffic based on preset criteria; for instance, it gives higher priority or bandwidth to video traffic over website browsing traffic. Internet packet classification methods are also used for automated intrusion detection. They analyze incoming traffic patterns and identify malicious …
Sensitivity Analysis Of An Agent-Based Simulation Model Using Reconstructability Analysis, Andey M. Nunes, Martin Zwick, Wayne Wakeland
Sensitivity Analysis Of An Agent-Based Simulation Model Using Reconstructability Analysis, Andey M. Nunes, Martin Zwick, Wayne Wakeland
Systems Science Faculty Publications and Presentations
Reconstructability analysis, a methodology based on information theory and graph theory, was used to perform a sensitivity analysis of an agent-based model. The NetLogo BehaviorSpace tool was employed to do a full 2k factorial parameter sweep on Uri Wilensky’s Wealth Distribution NetLogo model, to which a Gini-coefficient convergence condition was added. The analysis identified the most influential predictors (parameters and their interactions) of the Gini coefficient wealth inequality outcome. Implications of this type of analysis for building and testing agent-based simulation models are discussed.
Improving A Wireless Localization System Via Machine Learning Techniques And Security Protocols, Zachary Yorio
Improving A Wireless Localization System Via Machine Learning Techniques And Security Protocols, Zachary Yorio
Masters Theses, 2020-current
The recent advancements made in Internet of Things (IoT) devices have brought forth new opportunities for technologies and systems to be integrated into our everyday life. In this work, we investigate how edge nodes can effectively utilize 802.11 wireless beacon frames being broadcast from pre-existing access points in a building to achieve room-level localization. We explain the needed hardware and software for this system and demonstrate a proof of concept with experimental data analysis. Improvements to localization accuracy are shown via machine learning by implementing the random forest algorithm. Using this algorithm, historical data can train the model and make …
Reasoning About User Feedback Under Identity Uncertainty In Knowledge Base Construction, Ariel Kobren
Reasoning About User Feedback Under Identity Uncertainty In Knowledge Base Construction, Ariel Kobren
Doctoral Dissertations
Intelligent, automated systems that are intertwined with everyday life---such as Google Search and virtual assistants like Amazon’s Alexa or Apple’s Siri---are often powered in part by knowledge bases (KBs), i.e., structured data repositories of entities, their attributes, and the relationships among them. Despite a wealth of research focused on automated KB construction methods, KBs are inevitably imperfect, with errors stemming from various points in the construction pipeline. Making matters more challenging, new data is created daily and must be integrated with existing KBs so that they remain up-to-date. As the primary consumers of KBs, human users have tremendous potential to …
Walls Have Ears: Eavesdropping User Behaviors Via Graphics-Interrupt-Based Side Channel, Haoyu Ma, Jianwen Tian, Debin Gao, Jia Chunfu
Walls Have Ears: Eavesdropping User Behaviors Via Graphics-Interrupt-Based Side Channel, Haoyu Ma, Jianwen Tian, Debin Gao, Jia Chunfu
Research Collection School Of Computing and Information Systems
Graphics Processing Units (GPUs) are now playing a vital role in many devices and systems including computing devices, data centers, and clouds, making them the next target of side-channel attacks. Unlike those targeting CPUs, existing side-channel attacks on GPUs exploited vulnerabilities exposed by application interfaces like OpenGL and CUDA, which can be easily mitigated with software patches. In this paper, we investigate the lower-level and native interface between GPUs and CPUs, i.e., the graphics interrupts, and evaluate the side channel they expose. Being an intrinsic profile in the communication between a GPU and a CPU, the pattern of graphics interrupts …
Acquisition, Processing, And Analysis Of Video, Audio And Meteorological Data In Multi-Sensor Electronic Beehive Monitoring, Sarbajit Mukherjee
Acquisition, Processing, And Analysis Of Video, Audio And Meteorological Data In Multi-Sensor Electronic Beehive Monitoring, Sarbajit Mukherjee
All Graduate Theses and Dissertations, Spring 1920 to Summer 2023
In recent years, a widespread decline has been seen in honey bee population and this is widely attributed to colony collapse disorder. Hence, it is of utmost importance that a system is designed to gather relevant information. This will allow for a deeper understanding of the possible reasons behind the above phenomenon to aid in the design of suitable countermeasures.
Electronic Beehive Monitoring is one such way of gathering critical information regarding a colony’s health and behavior without invasive beehive inspections. In this dissertation, we have presented an electronic beehive monitoring system called BeePi that can be placed on top …
Deep Q Learning Applied To Stock Trading, Agnibh Dasgupta
Deep Q Learning Applied To Stock Trading, Agnibh Dasgupta
All Graduate Theses and Dissertations, Spring 1920 to Summer 2023
Developing a strategy for stock trading is a vital task for investors. However, it is challenging to obtain an optimal strategy, given the complex and dynamic nature of the stock market. This thesis aims to explore the applications of Reinforcement Learning with the goal of maximizing returns from market investment, keeping in mind the human aspect of trading by utilizing stock prices represented as candlestick graphs. Furthermore, the algorithm studies public interest patterns in form of graphs extracted from Google Trends to make predictions. Deep Q learning has been used to train an agent based on fused images of stock …
Unsupervised Structural Graph Node Representation Learning, Mikel Joaristi
Unsupervised Structural Graph Node Representation Learning, Mikel Joaristi
Boise State University Theses and Dissertations
Unsupervised Graph Representation Learning methods learn a numerical representation of the nodes in a graph. The generated representations encode meaningful information about the nodes' properties, making them a powerful tool for tasks in many areas of study, such as social sciences, biology or communication networks. These methods are particularly interesting because they facilitate the direct use of standard Machine Learning models on graphs. Graph representation learning methods can be divided into two main categories depending on the information they encode, methods preserving the nodes connectivity information, and methods preserving nodes' structural information. Connectivity-based methods focus on encoding relationships between nodes, …
Nearest Centroid: A Bridge Between Statistics And Machine Learning, Manoj Thulasidas
Nearest Centroid: A Bridge Between Statistics And Machine Learning, Manoj Thulasidas
Research Collection School Of Computing and Information Systems
In order to guide our students of machine learning in their statistical thinking, we need conceptually simple and mathematically defensible algorithms. In this paper, we present the Nearest Centroid algorithm (NC) algorithm as a pedagogical tool, combining the key concepts behind two foundational algorithms: K-Means clustering and K Nearest Neighbors (k- NN). In NC, we use the centroid (as defined in the K-Means algorithm) of the observations belonging to each class in our training data set and its distance from a new observation (similar to k-NN) for class prediction. Using this obvious extension, we will illustrate how the concepts of …
A Targeted Adversarial Attack On Support Vector Machine Using The Boundary Line, Yessenia Rodriguez
A Targeted Adversarial Attack On Support Vector Machine Using The Boundary Line, Yessenia Rodriguez
Theses and Dissertations
In this thesis, a targeted adversarial attack is explored on a Support Vector Machine (SVM). SVM is defined by creating a separating boundary between two classes. Using a target class, any input can be modified to cross the “boundary line,” making the model predict the target class. To limit the modification, a percentage of an image of the target class is used to get several random sections. Using these sections, the input will be moved in small steps closer to the boundary point. The section that took the least number of steps to cause the model to predict the target …
Language-Driven Region Pointer Advancement For Controllable Image Captioning, Annika Lindh, Robert J. Ross, John D. Kelleher
Language-Driven Region Pointer Advancement For Controllable Image Captioning, Annika Lindh, Robert J. Ross, John D. Kelleher
Conference papers
Controllable Image Captioning is a recent sub-field in the multi-modal task of Image Captioning wherein constraints are placed on which regions in an image should be described in the generated natural language caption. This puts a stronger focus on producing more detailed descriptions, and opens the door for more end-user control over results. A vital component of the Controllable Image Captioning architecture is the mechanism that decides the timing of attending to each region through the advancement of a region pointer. In this paper, we propose a novel method for predicting the timing of region pointer advancement by treating the …
Enhanced Traffic Incident Analysis With Advanced Machine Learning Algorithms, Zhenyu Wang
Enhanced Traffic Incident Analysis With Advanced Machine Learning Algorithms, Zhenyu Wang
Computational Modeling & Simulation Engineering Theses & Dissertations
Traffic incident analysis is a crucial task in traffic management centers (TMCs) that typically manage many highways with limited staff and resources. An effective automatic incident analysis approach that can report abnormal events timely and accurately will benefit TMCs in optimizing the use of limited incident response and management resources. During the past decades, significant efforts have been made by researchers towards the development of data-driven approaches for incident analysis. Nevertheless, many developed approaches have shown limited success in the field. This is largely attributed to the long detection time (i.e., waiting for overwhelmed upstream detection stations; meanwhile, downstream stations …
Hierarchical Aggregation Of Multidimensional Data For Efficient Data Mining, Safaa Khalil Alwajidi
Hierarchical Aggregation Of Multidimensional Data For Efficient Data Mining, Safaa Khalil Alwajidi
Dissertations
Big data analysis is essential for many smart applications in areas such as connected healthcare, intelligent transportation, human activity recognition, environment, and climate change monitoring. Traditional data mining algorithms do not scale well to big data due to the enormous number of data points and the velocity of their generation. Mining and learning from big data need time and memory efficiency techniques, albeit the cost of possible loss in accuracy. This research focuses on the mining of big data using aggregated data as input. We developed a data structure that is to be used to aggregate data at multiple resolutions. …
New Methods For Deep Learning Based Real-Valued Inter-Residue Distance Prediction, Jacob Barger
New Methods For Deep Learning Based Real-Valued Inter-Residue Distance Prediction, Jacob Barger
Theses
Background: Much of the recent success in protein structure prediction has been a result of accurate protein contact prediction--a binary classification problem. Dozens of methods, built from various types of machine learning and deep learning algorithms, have been published over the last two decades for predicting contacts. Recently, many groups, including Google DeepMind, have demonstrated that reformulating the problem as a multi-class classification problem is a more promising direction to pursue. As an alternative approach, we recently proposed real-valued distance predictions, formulating the problem as a regression problem. The nuances of protein 3D structures make this formulation appropriate, allowing predictions …
Multimodal Data Fusion And Attack Detection In Recommender Systems, Mehmet Aktukmak
Multimodal Data Fusion And Attack Detection In Recommender Systems, Mehmet Aktukmak
USF Tampa Graduate Theses and Dissertations
The commercial platforms that use recommender systems can collect relevant information to produce useful recommendations to the platform users. However, these sources usually contain missing values, imbalanced and heterogeneous data, and noisy observations. Such characteristics render the process of exploiting the information nontrivial, as one should carefully address them during the data fusion process. In addition to the degenerative characteristics, some entries can be fake, i.e., they can be the outcomes of malicious intents to manipulate the system. These entries should be eliminated before incorporation to any recommendation task. Detecting such malicious attacks quickly and accurately and then mitigating them …
Machine Learning Integrated Design For Additive Manufacturing, Jingchao Jiang, Yi Xiong, Zhiyuan Zhang, David W. Rosen
Machine Learning Integrated Design For Additive Manufacturing, Jingchao Jiang, Yi Xiong, Zhiyuan Zhang, David W. Rosen
Research Collection School Of Computing and Information Systems
For improving manufacturing efficiency and minimizing costs, design for additive manufacturing (AM) has been accordingly proposed. The existing design for AM methods are mainly surrogate model based. Due to the increasingly available data nowadays, machine learning (ML) has been applied to medical diagnosis, image processing, prediction, classification, learning association, etc. A variety of studies have also been carried out to use machine learning for optimizing the process parameters of AM with corresponding objectives. In this paper, a ML integrated design for AM framework is proposed, which takes advantage of ML that can learn the complex relationships between the design and …
Base-Package Recommendation Framework Based On Consumer Behaviours In Iptv Platform, Kuruparan Shanmugalingam, Ruwinda Ranganayanke, Chanka Gunawardhaha, Rajitha Navarathna
Base-Package Recommendation Framework Based On Consumer Behaviours In Iptv Platform, Kuruparan Shanmugalingam, Ruwinda Ranganayanke, Chanka Gunawardhaha, Rajitha Navarathna
Research Collection School Of Computing and Information Systems
Internet Protocol TeleVision (IPTV) provides many services such as live television streaming, time-shifted media, and Video On Demand (VOD). However, many customers do not engage properly with their subscribed packages due to a lack of knowledge and poor guidance. Many customers fail to identify the proper IPTV service package based on their needs and to utilise their current package to the maximum. In this paper, we propose a base-package recommendation model with a novel customer scoring-meter based on customers behaviour. Initially, our paper describes an algorithm to measure customers engagement score, which illustrates a novel approach to track customer engagement …
Using Data Analytics To Predict Students Score, Nang Laik Ma, Gim Hong Chua
Using Data Analytics To Predict Students Score, Nang Laik Ma, Gim Hong Chua
Research Collection School Of Computing and Information Systems
Education is very important to Singapore, and the government has continued to invest heavily in our education system to become one of the world-class systems today. A strong foundation of Science, Technology, Engineering, and Mathematics (STEM) was what underpinned Singapore's development over the past 50 years. PISA is a triennial international survey that evaluates education systems worldwide by testing the skills and knowledge of 15-year-old students who are nearing the end of compulsory education. In this paper, the authors used the PISA data from 2012 and 2015 and developed machine learning techniques to predictive the students' scores and understand the …
Exploring The Potential Of Sparse Coding For Machine Learning, Sheng Yang Lundquist
Exploring The Potential Of Sparse Coding For Machine Learning, Sheng Yang Lundquist
Dissertations and Theses
While deep learning has proven to be successful for various tasks in the field of computer vision, there are several limitations of deep-learning models when compared to human performance. Specifically, human vision is largely robust to noise and distortions, whereas deep learning performance tends to be brittle to modifications of test images, including being susceptible to adversarial examples. Additionally, deep-learning methods typically require very large collections of training examples for good performance on a task, whereas humans can learn to perform the same task with a much smaller number of training examples.
In this dissertation, I investigate whether the use …
Applications Of Ai In Business, Industry, Government, Healthcare, And Environment, University Of Maine Artificial Intelligence Initiative
Applications Of Ai In Business, Industry, Government, Healthcare, And Environment, University Of Maine Artificial Intelligence Initiative
General University of Maine Publications
UMaine AI draws top talent and leverages a distinctive set of capabilities from the University of Maine and other collaborating institutions from across Maine and beyond, while it also recruits world-class talent from across the nation and the world. It is centered at the University of Maine, leveraging the university’s strengths across disciplines, including computing and information sciences, engineering, health and life sciences, business, education, social sciences, and more.
Experimental Comparison Of Features And Classifiers For Android Malware Detection, Lwin Khin Shar, Biniam Fisseha Demissie, Mariano Ceccato, Wei Minn
Experimental Comparison Of Features And Classifiers For Android Malware Detection, Lwin Khin Shar, Biniam Fisseha Demissie, Mariano Ceccato, Wei Minn
Research Collection School Of Computing and Information Systems
Android platform has dominated the smart phone market for years now and, consequently, gained a lot of attention from attackers. Malicious apps (malware) pose a serious threat to the security and privacy of Android smart phone users. Available approaches to detect mobile malware based on machine learning rely on features extracted with static analysis or dynamic analysis techniques. Dif- ferent types of machine learning classi ers (such as support vector machine and random forest) deep learning classi ers (based on deep neural networks) are then trained on extracted features, to produce models that can be used to detect mobile malware. …
Co2vec: Embeddings Of Co-Ordered Networks Based On Mutual Reinforcement, Meng-Fen Chiang, Ee-Peng Lim, Wang-Chien Lee, Philips Kokoh Prasetyo
Co2vec: Embeddings Of Co-Ordered Networks Based On Mutual Reinforcement, Meng-Fen Chiang, Ee-Peng Lim, Wang-Chien Lee, Philips Kokoh Prasetyo
Research Collection School Of Computing and Information Systems
We study the problem of representation learning for multiple types of entities in a co-ordered network where order relations exist among entities of the same type, and association relations exist across entities of different types. The key challenge in learning co-ordered network embedding is to preserve order relations among entities of the same type while leveraging on the general consistency in order relations between different entity types. In this paper, we propose an embedding model, CO2Vec, that addresses this challenge using mutually reinforced order dependencies. Specifically, CO2Vec explores in-direct order dependencies as supplementary evidence to enhance order representation learning across …
European Floating Strike Lookback Options: Alpha Prediction And Generation Using Unsupervised Learning, Tristan Lim, Aldy Gunawan, Chin Sin Ong
European Floating Strike Lookback Options: Alpha Prediction And Generation Using Unsupervised Learning, Tristan Lim, Aldy Gunawan, Chin Sin Ong
Research Collection School Of Computing and Information Systems
This research utilized the intrinsic quality of European floating strike lookback call options, alongside selected return and volatility parameters, in a K-means clustering environment, to recommend an alpha generative trading strategy. The result is an elegant easy-to-use alpha strategy based on the option mechanisms which identifies investment assets with high degree of significance. In an upward trending market, the research had identified European floating strike lookback call option as an evaluative criterion and investable asset, which would both allow investors to predict and profit from alpha opportunities. The findings will be useful for (i) buy-side investors seeking alpha generation and/or …
The Future Of Work Now: Automl At 84.51°And Kroger, Thomas H. Davenport, Steven M. Miller
The Future Of Work Now: Automl At 84.51°And Kroger, Thomas H. Davenport, Steven M. Miller
Research Collection School Of Computing and Information Systems
One of the most frequently-used phrases at business events these days is “the future of work.” It’s increasingly clear that artificial intelligence and other new technologies will bring substantial changes in work tasks and business processes. But while these changes are predicted for the future, they’re already present in many organizations for many different jobs. The job and incumbents described below are an example of this phenomenon.
Asymptotically-Optimal Topological Nearest-Neighbor Filtering, Read Sandström, Jory Denny, Nancy M. Amato
Asymptotically-Optimal Topological Nearest-Neighbor Filtering, Read Sandström, Jory Denny, Nancy M. Amato
Department of Math & Statistics Faculty Publications
Nearest-neighbor finding is a major bottleneck for sampling-based motion planning algorithms. The cost of finding nearest neighbors grows with the size of the roadmap, leading to a significant computational bottleneck for problems which require many configurations to find a solution. In this work, we develop a method of mapping configurations of a jointed robot to neighborhoods in the workspace that supports fast search for configurations in nearby neighborhoods. This expedites nearest-neighbor search by locating a small set of the most likely candidates for connecting to the query with a local plan. We show that this filtering technique can preserve asymptotically-optimal …
Integrated Multiparametric Radiomics And Informatics System For Characterizing Breast Tumor Characteristics With The Oncotypedx Gene Assay, Michael A. Jacobs, Christopher B. Umbricht, Vishwa S. Parekh, Riham H. El Khouli, Leslie Cope, Katarzyna J. Macura, Susan Harvey, Antonio C. Wolff
Integrated Multiparametric Radiomics And Informatics System For Characterizing Breast Tumor Characteristics With The Oncotypedx Gene Assay, Michael A. Jacobs, Christopher B. Umbricht, Vishwa S. Parekh, Riham H. El Khouli, Leslie Cope, Katarzyna J. Macura, Susan Harvey, Antonio C. Wolff
Radiology Faculty Publications
Optimal use of multiparametric magnetic resonance imaging (mpMRI) can identify key MRI parameters and provide unique tissue signatures defining phenotypes of breast cancer. We have developed and implemented a new machine-learning informatic system, termed Informatics Radiomics Integration System (IRIS) that integrates clinical variables, derived from imaging and electronic medical health records (EHR) with multiparametric radiomics (mpRad) for identifying potential risk of local or systemic recurrence in breast cancer patients. We tested the model in patients (n = 80) who had Estrogen Receptor positive disease and underwent OncotypeDX gene testing, radiomic analysis, and breast mpMRI. The IRIS method was trained …
Developing Employment Environments Where Individuals With Asd Thrive: Using Machine Learning To Explore Employer Policies And Practices, Amy Jane Griffiths, Amy E. Hurley Hanson, Cristina M. Giannantonio, Sneha Kohli Mathur, Kayleigh Hyde, Erik Linstead
Developing Employment Environments Where Individuals With Asd Thrive: Using Machine Learning To Explore Employer Policies And Practices, Amy Jane Griffiths, Amy E. Hurley Hanson, Cristina M. Giannantonio, Sneha Kohli Mathur, Kayleigh Hyde, Erik Linstead
Education Faculty Articles and Research
An online survey instrument was developed to assess employers’ perspectives on hiring job candidates with Autism Spectrum Disorder (ASD). The investigators used K-means clustering to categorize companies in clusters based on their hiring practices related to individuals with ASD. This methodology allowed the investigators to assess and compare the various factors of businesses that successfully hire employees with ASD versus those that do not. The cluster analysis indicated that company structures, policies and practices, and perceptions, as well as the needs of employers and employees, were important in determining who would successfully hire individuals with ASD. Key areas that require …
Embedded Power Optimization Method Based On User Behavior, Wang Hai, Gao Ling, Dongqi Chen, Ren Jie
Embedded Power Optimization Method Based On User Behavior, Wang Hai, Gao Ling, Dongqi Chen, Ren Jie
Journal of System Simulation
Abstract: In recent years, with the rapid development of embedded device represented by mobile phone and tablet computer, low power technology has been one of the hotspots in the embedded research field. Because the battery capacity of embedded device is limited due to its restricted volume and weight, there are often users suffering the problem that their phone battery being dead. There are many research directions in embedded low power field at present. The relationship between low power and user behavior recognition was aimed, which started with recognizing user behavior using machine learning and then obtains the user’s daily usage …
Exploring The Eating Disorder Examination Questionnaire, Clinical Impairment Assessment, And Autism Quotient To Identify Eating Disorder Vulnerability: A Cluster Analysis, Natalia Stewart Rosenfield, Erik Linstead
Exploring The Eating Disorder Examination Questionnaire, Clinical Impairment Assessment, And Autism Quotient To Identify Eating Disorder Vulnerability: A Cluster Analysis, Natalia Stewart Rosenfield, Erik Linstead
Engineering Faculty Articles and Research
Eating disorders are very complicated and many factors play a role in their manifestation. Furthermore, due to the variability in diagnosis and symptoms, treatment for an eating disorder is unique to the individual. As a result, there are numerous assessment tools available, which range from brief survey questionnaires to in-depth interviews conducted by a professional. One of the many benefits to using machine learning is that it offers new insight into datasets that researchers may not previously have, particularly when compared to traditional statistical methods. The aim of this paper was to employ k-means clustering to explore the Eating Disorder …
London Heathrow Airport Uses Real-Time Analytics For Improving Operations, Xiaojia Guo, Yael Grushka-Cockayne, Bert De Reyck
London Heathrow Airport Uses Real-Time Analytics For Improving Operations, Xiaojia Guo, Yael Grushka-Cockayne, Bert De Reyck
Research Collection Lee Kong Chian School Of Business
Improving airport collaborative decision making is at the heart of airport operations centers (APOCs) recently established in several major European airports. In this paper, we describe a project commissioned by Eurocontrol, the organization in charge of the safety and seamless flow of European air traffic. The project’s goal was to examine the opportunities offered by the colocation and real-time data sharing in the APOC at London’s Heathrow airport, arguably the most advanced of its type in Europe. We developed and implemented a pilot study of a real-time data-sharing and collaborative decision-making process, selected to improve the efficiency of Heathrow’s operations. …