Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

PDF

Institution
Keyword
Publication Year
Publication
Publication Type

Articles 6301 - 6330 of 55171

Full-Text Articles in Physical Sciences and Mathematics

A Natural Causality-Motivated Description Of Learning, Olga Kosheleva, Vladik Kreinovich Feb 2022

A Natural Causality-Motivated Description Of Learning, Olga Kosheleva, Vladik Kreinovich

Departmental Technical Reports (CS)

Teaching is not easy. One of the main reasons why it is not easy is that the existing descriptions of the teaching process are not very precise -- and thus, we cannot use the usual optimization techniques, techniques which require a precise model of the corresponding phenomenon. It is therefore desirable to come up with a precise description of the learning process. To come up with such a description, we notice that on the set of all possible states of learning, there is a natural order s ≤ s' meaning that we can bring the student from the state s …


Data Processing Under Fuzzy Uncertainty: Towards More Efficient Algorithm, Hung T. Nguyen, Olga Kosheleva, Vladik Kreinovich Feb 2022

Data Processing Under Fuzzy Uncertainty: Towards More Efficient Algorithm, Hung T. Nguyen, Olga Kosheleva, Vladik Kreinovich

Departmental Technical Reports (CS)

In many practical situations, we need to process data under fuzzy uncertainty: we have fuzzy information about the algorithm's input, and we want to find the resulting information about the algorithm's output. It is known that this problem can be reduced to computing the range of the algorithm over alpha-cuts of the input. Since the fuzzy degrees are usually known with accuracy at best 0.1, it is sufficient to repeat this range-computing procedure for 11 values alpha = 0, 0.1, ..., 1.0. However, a straightforward application of this idea requires 11 times longer computation time than each range estimation -- …


Why Pre-Teaching: A Geometric Explanation, Olga Kosheleva, Vladik Kreinovich, Christian Servin Feb 2022

Why Pre-Teaching: A Geometric Explanation, Olga Kosheleva, Vladik Kreinovich, Christian Servin

Departmental Technical Reports (CS)

Traditionally, subjects are taught in sequential order: e.g., first, students study algebra, then they use the knowledge of algebra to study the basis ideas of calculus. In this traditional scheme, teachers usually do not explain any calculus ideas before students are ready – since they believe that this would only confuse students. However, lately, empirical evidence has shows that, contrary to this common belief, pre-teaching – when students get a brief introduction to the forthcoming new topic before this topic starts – helps students learn. In this paper, we provide a geometric explanation for this unexpected empirical phenomenon.


Why Gaussian Copulas Are Ubiquitous In Economics: Fuzzy-Related Explanation, Chon Van Le, Olga Kosheleva, Vladik Kreinovich Feb 2022

Why Gaussian Copulas Are Ubiquitous In Economics: Fuzzy-Related Explanation, Chon Van Le, Olga Kosheleva, Vladik Kreinovich

Departmental Technical Reports (CS)

In many real-life situations, deviations are caused by a large number of independent factors. It is known that in such situations, the distribution of the resulting deviations is close to Gaussian, and thus, that the copulas -- that describe the multi-D distributions as a function of 1-D (marginal) ones -- are also Gaussian. In the past, these conclusions were also applied to economic phenomena, until the 2008 crisis showed that in economics, Gaussian models can lead to disastrous consequences. At present, all economists agree that the economic distributions are not Gaussian -- however, surprisingly, Gaussian copulas still often provide an …


How To Describe Relative Approximation Error? A New Justification For Gustafson's Logarithmic Expression, Martine Ceberio, Olga Kosheleva, Vladik Kreinovich Feb 2022

How To Describe Relative Approximation Error? A New Justification For Gustafson's Logarithmic Expression, Martine Ceberio, Olga Kosheleva, Vladik Kreinovich

Departmental Technical Reports (CS)

How can we describe relative approximation error? When the value b approximate a value a, the usual description of this error is the ratio |b − a|/|a|. The problem with this approach is that, contrary to our intuition, we get different numbers gauging how well a approximates b and how well b approximates a. To avoid this problem, John Gustafson proposed to use the logarithmic measure |ln(b/a)|. In this paper, we show that this is, in effect, the only regular scale-invariant way to describe the relative approximation error.


Video Or Text? Bullets Or No Bullets? Why Not Both?, Olga Kosheleva, Vladik Kreinovich, Christian Servin Feb 2022

Video Or Text? Bullets Or No Bullets? Why Not Both?, Olga Kosheleva, Vladik Kreinovich, Christian Servin

Departmental Technical Reports (CS)

Some students – which are, in terms of pop-psychology – more left-brain – prefer linear exposition, others – more right-brain ones – prefer 2-D images and texts with visual emphasis (e.g., with bullets). At present, instructors try to find a middle grounds between these two audiences, but why not prepare each material in two ways, aimed at both audiences?


Computing The Range Of A Function-Of-Few-Linear-Combinations Under Linear Constraints: A Feasible Algorithm, Salvador Robles, Martine Ceberio, Vladik Kreinovich Feb 2022

Computing The Range Of A Function-Of-Few-Linear-Combinations Under Linear Constraints: A Feasible Algorithm, Salvador Robles, Martine Ceberio, Vladik Kreinovich

Departmental Technical Reports (CS)

In many practical situations, we need to find the range of a given function under interval uncertainty. For nonlinear functions -- even for quadratic ones -- this problem is, in general, NP-hard; however, feasible algorithms exist for many specific cases. In particular, recently a feasible algorithm was developed for computing the range of the absolute value of a Fourier coefficient under uncertainty. In this paper, we generalize this algorithm to the case when we have a function of a few linear combinations of inputs. The resulting algorithm also handles the case when, in addition to intervals containing each input, we …


Commonsense-Continuous Dynamical Systems -- Stationary States, Prediction, And Reconstruction Of The Past: Fuzzy-Based Analysis, Olga Kosheleva, Vladik Kreinovich Feb 2022

Commonsense-Continuous Dynamical Systems -- Stationary States, Prediction, And Reconstruction Of The Past: Fuzzy-Based Analysis, Olga Kosheleva, Vladik Kreinovich

Departmental Technical Reports (CS)

Traditional analysis of dynamical systems usually assumes that the mapping is continuous -- in precise mathematical sense. However, as many formal definitions, the mathematical definition of continuity does not always adequately capture the commonsense notion of continuity: that small changes in the input should lead to small changes in the output. In this paper, we provide a natural fuzzy-based formalization of this intuitive notion, and analyze how the requirement of commonsense continuity affects the properties of dynamical systems. Specifically, we show that for such systems, the set of fixed points is closed and convex, and that the only such systems …


Diagnosis Of Polypoidal Choroidal Vasculopathy From Fluorescein Angiography Using Deep Learning, Yu-Yeh Tsai, Wei-Yang Lin, Shih-Jen Chen, Paisan Ruamviboonsuk, Cheng-Ho King, Chia-Ling Tsai Feb 2022

Diagnosis Of Polypoidal Choroidal Vasculopathy From Fluorescein Angiography Using Deep Learning, Yu-Yeh Tsai, Wei-Yang Lin, Shih-Jen Chen, Paisan Ruamviboonsuk, Cheng-Ho King, Chia-Ling Tsai

Publications and Research

Purpose: To differentiate polypoidal choroidal vasculopathy (PCV) from choroidal neovascularization (CNV) and to determine the extent of PCV from fluorescein angiography (FA) using attention-based deep learning networks.

Methods: We build two deep learning networks for diagnosis of PCV using FA, one for detection and one for segmentation. Attention-gated convolutional neural network (AG-CNN) differentiates PCV from other types of wet age-related macular degeneration. Gradient-weighted class activation map (Grad-CAM) is generated to highlight important regions in the image for making the prediction, which offers explainability of the network. Attention-gated recurrent neural network (AG-PCVNet) for spatiotemporal prediction is applied for segmentation of PCV. …


Automated Reverse Engineering Of Role-Based Access Control Policies Of Web Applications, Ha Thanh Le, Lwin Khin Shar, Domenico Bianculli, Lionel C. Briand, Cu Duy Nguyen Feb 2022

Automated Reverse Engineering Of Role-Based Access Control Policies Of Web Applications, Ha Thanh Le, Lwin Khin Shar, Domenico Bianculli, Lionel C. Briand, Cu Duy Nguyen

Research Collection School Of Computing and Information Systems

Access control (AC) is an important security mechanism used in software systems to restrict access to sensitive resources. Therefore, it is essential to validate the correctness of AC implementations with respect to policy specifications or intended access rights. However, in practice, AC policy specifications are often missing or poorly documented; in some cases, AC policies are hard-coded in business logic implementations. This leads to difficulties in validating the correctness of policy implementations and detecting AC defects.In this paper, we present a semi-automated framework for reverse-engineering of AC policies from Web applications. Our goal is to learn and recover role-based access …


Understanding In-App Advertising Issues Based On Large Scale App Review Analysis, Cuiyun Gao, Jichuan Zeng, David Lo, Xin Xia, Irwin King, Michael R. Lyu Feb 2022

Understanding In-App Advertising Issues Based On Large Scale App Review Analysis, Cuiyun Gao, Jichuan Zeng, David Lo, Xin Xia, Irwin King, Michael R. Lyu

Research Collection School Of Computing and Information Systems

Context: In-app advertising closely relates to app revenue. Reckless ad integration could adversely impact app quality and user experience, leading to loss of income. It is very challenging to balance the ad revenue and user experience for app developers. Objective: Towards tackling the challenge, we conduct a study on analyzing user concerns about in-app advertisement. Method: Specifically, we present a large-scale analysis on ad-related user feedback. The large user feedback data from App Store and Google Play allow us to summarize ad-related app issues comprehensively and thus provide practical ad integration strategies for developers. We first define common ad issues …


Deep Learning For Hate Speech Detection: A Comparative Study, Jitendra Singh Malik, Guansong Pang, Anton Van Den Hengel Feb 2022

Deep Learning For Hate Speech Detection: A Comparative Study, Jitendra Singh Malik, Guansong Pang, Anton Van Den Hengel

Research Collection School Of Computing and Information Systems

Automated hate speech detection is an important tool in combating the spread of hate speech, particularly in social media. Numerous methods have been developed for the task, including a recent proliferation of deep-learning based approaches. A variety of datasets have also been developed, exemplifying various manifestations of the hate-speech detection problem. We present here a largescale empirical comparison of deep and shallow hate-speech detection methods, mediated through the three most commonly used datasets. Our goal is to illuminate progress in the area, and identify strengths and weaknesses in the current state-of-the-art. We particularly focus our analysis on measures of practical …


Deep Graph-Level Anomaly Detection By Glocal Knowledge Distillation, Rongrong Ma, Guansong Pang, Ling Chen, Anton Van Den Hengel Feb 2022

Deep Graph-Level Anomaly Detection By Glocal Knowledge Distillation, Rongrong Ma, Guansong Pang, Ling Chen, Anton Van Den Hengel

Research Collection School Of Computing and Information Systems

Graph-level anomaly detection (GAD) describes the problem of detecting graphs that are abnormal in their structure and/or the features of their nodes, as compared to other graphs. One of the challenges in GAD is to devise graph representations that enable the detection of both locally- and globally-anomalous graphs, i.e., graphs that are abnormal in their fine-grained (node-level) or holistic (graph-level) properties, respectively. To tackle this challenge we introduce a novel deep anomaly detection approach for GAD that learns rich global and local normal pattern information by joint random distillation of graph and node representations. The random distillation is achieved by …


Collaborative Curating For Discovery And Expansion Of Visual Clusters, Duy Dung Le, Hady W. Lauw Feb 2022

Collaborative Curating For Discovery And Expansion Of Visual Clusters, Duy Dung Le, Hady W. Lauw

Research Collection School Of Computing and Information Systems

In many visually-oriented applications, users can select and group images that they find interesting into coherent clusters. For instance, we encounter these in the form of hashtags on Instagram, galleries on Flickr, or boards on Pinterest. The selection and coherence of such user-curated visual clusters arise from a user’s preference for a certain type of content as well as her own perception of which images are similar and thus belong to a cluster. We seek to model such curation behaviors towards supporting users in their future activities such as expanding existing clusters or discovering new clusters altogether. This paper proposes …


Including Everyone, Everywhere: Understanding Opportunities And Challenges Of Geographic Gender-Inclusion In Oss, Gede Artha Azriadi Prana, Denae Ford, Ayushi Rastogi, David Lo, Rahul Purandare, Nachiappan Nagappan Feb 2022

Including Everyone, Everywhere: Understanding Opportunities And Challenges Of Geographic Gender-Inclusion In Oss, Gede Artha Azriadi Prana, Denae Ford, Ayushi Rastogi, David Lo, Rahul Purandare, Nachiappan Nagappan

Research Collection School Of Computing and Information Systems

The gender gap is a significant concern facing the software industry as the development becomes more geographically distributed. Widely shared reports indicate that gender differences may be specific to each region. However, how complete can these reports be with little to no research reflective of the Open Source Software (OSS) process and communities software is now commonly developed in? Our study presents a multi-region geographical analysis of gender inclusion on GitHub. This mixed-methods approach includes quantitatively investigating differences in gender inclusion in projects across geographic regions and investigate these trends over time using data from contributions to 21,456 project repositories. …


Active Learning Of Discriminative Subgraph Patterns For Api Misuse Detection, Hong Jin Kang, David Lo Feb 2022

Active Learning Of Discriminative Subgraph Patterns For Api Misuse Detection, Hong Jin Kang, David Lo

Research Collection School Of Computing and Information Systems

A common cause of bugs and vulnerabilities are the violations of usage constraints associated with Application Programming Interfaces (APIs). API misuses are common in software projects, and while there have been techniques proposed to detect such misuses, studies have shown that they fail to reliably detect misuses while reporting many false positives. One limitation of prior work is the inability to reliably identify correct patterns of usage. Many approaches confuse a usage pattern’s frequency for correctness. Due to the variety of alternative usage patterns that may be uncommon but correct, anomaly detection-based techniques have limited success in identifying misuses. We …


Post2vec: Learning Distributed Representations Of Stack Overflow Posts, Bowen Xu, Thong Hoang, Abhishek Sharma, Chengran Yang, Xin Xia, David Lo Feb 2022

Post2vec: Learning Distributed Representations Of Stack Overflow Posts, Bowen Xu, Thong Hoang, Abhishek Sharma, Chengran Yang, Xin Xia, David Lo

Research Collection School Of Computing and Information Systems

Past studies have proposed solutions that analyze Stack Overflow content to help users find desired information or aid various downstream software engineering tasks. A common step performed by those solutions is to extract suitable representations of posts; typically, in the form of meaningful vectors. These vectors are then used for different tasks, for example, tag recommendation, relatedness prediction, post classification, and API recommendation. Intuitively, the quality of the vector representations of posts determines the effectiveness of the solutions in performing the respective tasks. In this work, to aid existing studies that analyze Stack Overflow posts, we propose a specialized deep …


A Deep Dive Into The Impact Of Covid-19 On Software Development, Paulo Anselmo Da Mota Silveira Neto, Umme Ayda Mannan, Eduardo Santana De Almeida, Nachiappan Nagappan, David Lo, Pavneet Singh Kochhar, Cuiyun Gao, Iftekhar Ahmed Feb 2022

A Deep Dive Into The Impact Of Covid-19 On Software Development, Paulo Anselmo Da Mota Silveira Neto, Umme Ayda Mannan, Eduardo Santana De Almeida, Nachiappan Nagappan, David Lo, Pavneet Singh Kochhar, Cuiyun Gao, Iftekhar Ahmed

Research Collection School Of Computing and Information Systems

The COVID-19 pandemic is considered as the most crucial global health calamity of the century. It has impacted different business sectors around the world and software development is not an exception. This study investigates the impact of COVID-19 on software projects and software development professionals. We conducted a mining software repository study based on 100 GitHub projects developed in Java using ten different metrics. Next, we surveyed 279 software development professionals for better understanding the impact of COVID-19 on daily activities and wellbeing. We identified 12 observations related to productivity, code quality, and wellbeing. Our findings highlight that the impact …


Broken External Links On Stack Overflow, Jiakun Liu, Xin Xia, David Lo, Haoxiang Zhang, Ying Zou, Ahmed E. Hassan, Shanping Li Feb 2022

Broken External Links On Stack Overflow, Jiakun Liu, Xin Xia, David Lo, Haoxiang Zhang, Ying Zou, Ahmed E. Hassan, Shanping Li

Research Collection School Of Computing and Information Systems

Stack Overflow hosts valuable programming-related knowledge with 11,926,354 links that reference to the third-party websites. The links that reference to the resources hosted outside the Stack Overflow websites extend the Stack Overflow knowledge base substantially. However, with the rapid development of programming-related knowledge, many resources hosted on the Internet are not available anymore. Based on our analysis of the Stack Overflow data that was released on Jun. 2, 2019, 14.2 percent of the links on Stack Overflow are broken links. The broken links on Stack Overflow can obstruct viewers from obtaining desired programming-related knowledge, and potentially damage the reputation of …


Defectchecker: Automated Smart Contract Defect Detection By Analyzing Evm Bytecode, Jiachi Chen, Xin Xia, David Lo, John Grundy, Xiapu Luo, Ting Chen Feb 2022

Defectchecker: Automated Smart Contract Defect Detection By Analyzing Evm Bytecode, Jiachi Chen, Xin Xia, David Lo, John Grundy, Xiapu Luo, Ting Chen

Research Collection School Of Computing and Information Systems

Smart contracts are Turing-complete programs running on the blockchain. They are immutable and cannot be modified, even when bugs are detected. Therefore, ensuring smart contracts are bug-free and well-designed before deploying them to the blockchain is extremely important. A contract defect is an error, flaw or fault in a smart contract that causes it to produce an incorrect or unexpected result, or to behave in unintended ways. Detecting and removing contract defects can avoid potential bugs and make programs more robust. Our previous work defined 20 contract defects for smart contracts and divided them into five impact levels. According to …


Seqseg: A Sequential Method To Achieve Nasopharyngeal Carcinoma Segmentation Free From Background Dominance, Guihua Tao, Haojiang Li, Jiabin Huang, Chu Han, Jiazhou Chen, Guangying Ruan, Wenjie Huang, Yu Hu, Tingting Dan, Bin Zhang, Shengfeng He Feb 2022

Seqseg: A Sequential Method To Achieve Nasopharyngeal Carcinoma Segmentation Free From Background Dominance, Guihua Tao, Haojiang Li, Jiabin Huang, Chu Han, Jiazhou Chen, Guangying Ruan, Wenjie Huang, Yu Hu, Tingting Dan, Bin Zhang, Shengfeng He

Research Collection School Of Computing and Information Systems

Reliable nasopharyngeal carcinoma (NPC) segmentation plays an important role in radiotherapy planning. However, recent deep learning methods fail to achieve satisfactory NPC segmentation in magnetic resonance (MR) images, since NPC is infiltrative and typically has a small or even tiny volume with indistinguishable border, making it indiscernible from tightly connected surrounding tissues from immense and complex backgrounds. To address such background dominance problems, this paper proposes a sequential method (SeqSeg) to achieve accurate NPC segmentation. Specifically, the proposed SeqSeg is devoted to solving the problem at two scales: the instance level and feature level. At the instance level, SeqSeg is …


Early Fire Detection: A New Indoor Laboratory Dataset And Data Distribution Analysis, Amril Nazir, Husam Mosleh, Maen Takruri, Abdul Halim Jallad, Hamad Alhebsi Feb 2022

Early Fire Detection: A New Indoor Laboratory Dataset And Data Distribution Analysis, Amril Nazir, Husam Mosleh, Maen Takruri, Abdul Halim Jallad, Hamad Alhebsi

All Works

Fire alarm systems are typically equipped with various sensors such as heat, smoke, and gas detectors. These provide fire alerts and notifications of emergency exits when a fire has been detected. However, such systems do not give early warning in order to allow appropriate action to be taken when an alarm is first triggered, as the fire may have already caused severe damage. This paper analyzes a new dataset gathered from controlled realistic fire experiments conducted in an indoor laboratory environment. The experiments were conducted in a controlled manner by triggering the source of fire using electrical devices and charcoal …


Modeling Functional Similarity In Source Code With Graph-Based Siamese Networks, Nikita Mehrotra, Navdha Agarwal, Piyush Gupta, Saket Anand, David Lo, Rahul Purandare Feb 2022

Modeling Functional Similarity In Source Code With Graph-Based Siamese Networks, Nikita Mehrotra, Navdha Agarwal, Piyush Gupta, Saket Anand, David Lo, Rahul Purandare

Research Collection School Of Computing and Information Systems

Code clones are duplicate code fragments that share (nearly) similar syntax or semantics. Code clone detection plays an important role in software maintenance, code refactoring, and reuse. A substantial amount of research has been conducted in the past to detect clones. A majority of these approaches use lexical and syntactic information to detect clones. However, only a few of them target semantic clones. Recently, motivated by the success of deep learning models in other fields, including natural language processing and computer vision, researchers have attempted to adopt deep learning techniques to detect code clones. These approaches use lexical information (tokens) …


Choices Are Not Independent: Stackelberg Security Games With Nested Quantal Response Models, Tien Mai, Arunesh Sinha Feb 2022

Choices Are Not Independent: Stackelberg Security Games With Nested Quantal Response Models, Tien Mai, Arunesh Sinha

Research Collection School Of Computing and Information Systems

The quantal response (QR) model is widely used in Stackelberg security games (SSG) to model a bounded rational adversary. The QR model is a model of human response from among a large variety of prominent models known as discrete choice models. QR is the simplest type of discrete choice models and does not capture commonly observed phenomenon such as correlation among choices. We introduce the nested QR adversary model (based on nested logit model in discrete choice theory) in SSG which addresses shortcoming of the QR model. We present tractable approximation of the resulting equilibrium problem with nested QR adversary. …


Scriptchecker: To Tame Third-Party Script Execution With Task Capabilities, Wu Luo, Xuhua Ding, Pengfei Wu, Xiaolei Zhang, Qingni Shen, Zhonghai Wu Feb 2022

Scriptchecker: To Tame Third-Party Script Execution With Task Capabilities, Wu Luo, Xuhua Ding, Pengfei Wu, Xiaolei Zhang, Qingni Shen, Zhonghai Wu

Research Collection School Of Computing and Information Systems

We present ScriptChecker, a novel browser-based framework to effectively and efficiently restrict third-party script execution according to the host web page’s directives. Different from all existing schemes functioning at the JavaScript layer, ScriptChecker holistically harnesses context separation and the browser’s security monitors to enforce on-demand access controls upon tasks executing untrusted code. The host page can flexibly assign resource-access capabilities to tasks upon their creation. Reaping the benefits of the task capability approach, ScriptChecker outperforms existing techniques in security, usability and performance. We have implemented a prototype of ScriptChecker on Chrome and rigorously evaluated its security against 1373 malicious scripts …


Speeding Up Routing Schedules On Aisle Graphs With Single Access, Francesco Betti Sorbelli, Stefano Carpin, Federico Coro, Sajal K. Das, Alfredo Navarra, Cristina M. Pinotti Feb 2022

Speeding Up Routing Schedules On Aisle Graphs With Single Access, Francesco Betti Sorbelli, Stefano Carpin, Federico Coro, Sajal K. Das, Alfredo Navarra, Cristina M. Pinotti

Computer Science Faculty Research & Creative Works

In this article, we study the orienteering aisle-graph single-access problem (OASP), a variant of the orienteering problem for a robot moving in a so-called single-access aisle graph, i.e., a graph consisting of a set of rows that can be accessed from one side only. Aisle graphs model, among others, vineyards or warehouses. Each aisle-graph vertex is associated with a reward that a robot obtains when it visits the vertex itself. As the energy of the robot is limited, only a subset of vertices can be visited with a fully charged battery. The objective is to maximize the total reward collected …


Usability Of Health-Related Websites By Filipino-American Adults And Nursing Informatics Experts, Kathleen Begonia Feb 2022

Usability Of Health-Related Websites By Filipino-American Adults And Nursing Informatics Experts, Kathleen Begonia

Dissertations, Theses, and Capstone Projects

Filipino-Americans are an understudied minority group with high prevalence and mortality from chronic conditions, such as cardiovascular disease and diabetes. Facing barriers to care and lack of culturally appropriate health resources, they frequently use the internet to obtain health information. It is unknown whether they perceive health-related websites to be useful or easy to use because there are no published usability studies involving this population. Using the Technology Acceptance Model as a theoretical framework, this study investigated the difference between website design ratings by experts and the perceptions of Filipino-American users to determine if usability guidelines influenced the perceived ease …


Representation Learning For Chemical Activity Predictions, Mohamed S. Ayed Feb 2022

Representation Learning For Chemical Activity Predictions, Mohamed S. Ayed

Dissertations, Theses, and Capstone Projects

Computational prediction of a phenotypic response upon the chemical perturbation on a biological system plays an important role in drug discovery and many other applications. Chemical fingerprints derived from chemical structures are a widely used feature to build machine learning models. However, the fingerprints ignore the biological context, thus, they suffer from several problems such as the activity cliff and curse of dimensionality. Fundamentally, the chemical modulation of biological activities is a multi-scale process. It is the genome-wide chemical-target interactions that modulate chemical phenotypic responses. Thus, the genome-scale chemical-target interaction profile will more directly correlate with in vitro and in …


Understanding Deep Learning - Challenges And Prospects, Niha Adnan, Fahad Umer Feb 2022

Understanding Deep Learning - Challenges And Prospects, Niha Adnan, Fahad Umer

Department of Surgery

The developments in Artificial Intelligence have been on the rise since its advent. The advancements in this field have been the innovative research area across a wide range of industries, making its incorporation in dentistry inevitable. Artificial Intelligence techniques are making serious progress in the diagnostic and treatment planning aspects of dental clinical practice. This will ultimately help in the elimination of subjectivity and human error that are often part of radiographic interpretations, and will improve the overall efficiency of the process. The various types of Artificial Intelligence algorithms that exist today make the understanding of their application quite complex. …


Performance Analysis Of Lightweight Internet Of Things Devices On Blockchainnetworks, Cem Kösemen, Gökhan Dalkiliç, Şafak Öksüzer Feb 2022

Performance Analysis Of Lightweight Internet Of Things Devices On Blockchainnetworks, Cem Kösemen, Gökhan Dalkiliç, Şafak Öksüzer

Turkish Journal of Electrical Engineering and Computer Sciences

Potential integration or cooperation of the Internet of things (IoT) systems and the blockchain technology is nowadays attracting remarkable interest from the researchers. These inter-operating systems often have to rely on lowcost, low-power, and robust IoT devices that can communicate with the blockchain network through smart contracts. In this work, we designed and ran a benchmark study for ESP32-based lightweight IoT devices interacting within the Quorum blockchain. A software library was built for ESP32 devices to enable elliptic-curve digital signing, Keccak-256 hashing, decoding, encoding, and secure private key generation capabilities, which all are the basic functional requirements for running a …