Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Default methods (4)
- Java (4)
- Refactoring (3)
- Icse2017 (2)
- Interfaces (2)
-
- Java 8 (2)
- Type constraints (2)
- Aesthetical theory (1)
- Aesthetics (1)
- Anonymity (1)
- Artifica lIntelligence (1)
- Artificial intelligence (1)
- Assistive indoor localization (1)
- Automated (1)
- Automated refactoring (1)
- Business (1)
- Computational creativity (1)
- Computer science (1)
- DPSO (1)
- Dark web (1)
- Deep Learning (1)
- Discrete Swarm Particle Optimization (1)
- Entropy (1)
- Evolution (1)
- Excel (1)
- GPU acceleration (1)
- Gene expression (1)
- Generative music (1)
- Geographic information systems (1)
- Gis (1)
Articles 1 - 19 of 19
Full-Text Articles in Physical Sciences and Mathematics
Real-Time Indoor Assistive Localization With Mobile Omnidirectional Vision And Cloud Gpu Acceleration, Feng Hu, Zhigang Zhu, Jeury Mejia, Hao Tang
Real-Time Indoor Assistive Localization With Mobile Omnidirectional Vision And Cloud Gpu Acceleration, Feng Hu, Zhigang Zhu, Jeury Mejia, Hao Tang
Publications and Research
In this paper we propose a real-time assistive localization approach to help blind and visually impaired people in navigating an indoor environment. The system consists of a mobile vision front end with a portable panoramic lens mounted on a smart phone, and a remote image feature-based database of the scene on a GPU-enabled server. Compact and elective omnidirectional image features are extracted and represented in the smart phone front end, and then transmitted to the server in the cloud. These features of a short video clip are used to search the database of the indoor environment via image-based indexing to …
The Ability Of Different Imputation Methods To Preserve The Significant Genes And Pathways In Cancer, Rosa Aghdam, Taban Baghfalaki, Pegah Khosravi, Elnaz Saberi Ansari
The Ability Of Different Imputation Methods To Preserve The Significant Genes And Pathways In Cancer, Rosa Aghdam, Taban Baghfalaki, Pegah Khosravi, Elnaz Saberi Ansari
Publications and Research
Deciphering important genes and pathways from incomplete gene expression data could facilitate a better understanding of cancer. Different imputation methods can be applied to estimate the missing values. In our study, we evaluated various imputation methods for their performance in preserving significant genes and pathways. In the first step, 5% genes are considered in random for two types of ignorable and non-ignorable missingness mechanisms with various missing rates. Next, 10 well-known imputation methods were applied to the complete datasets. The significance analysis of microarrays (SAM) method was applied to detect the significant genes in rectal and lung cancers to showcase …
On Improvised Music, Computational Creativity And Human-Becoming, Arto Artinian, Adam James Wilson
On Improvised Music, Computational Creativity And Human-Becoming, Arto Artinian, Adam James Wilson
Publications and Research
Music improvisation is an act of human-becoming: of self-expression—an articulation of histories and memories that have molded its participants—and of exploration—a search for unimagined structures that break with the stale norms of majoritarian culture. Given that the former objective may inhibit the latter, we propose an integration of human musical improvisers and deliberately flawed creative software agents that are designed to catalyze the development of human-ratified minoritarian musical structures.
Defaultification Refactoring: A Tool For Automatically Converting Java Methods To Default, Raffi T. Khatchadourian, Hidehiko Masuhara
Defaultification Refactoring: A Tool For Automatically Converting Java Methods To Default, Raffi T. Khatchadourian, Hidehiko Masuhara
Publications and Research
Enabling interfaces to declare (instance) method implementations, Java 8 default methods can be used as a substitute for the ubiquitous skeletal implementation software design pattern. Performing this transformation on legacy software manually, though, may be non-trivial. The refactoring requires analyzing complex type hierarchies, resolving multiple implementation inheritance issues, reconciling differences between class and interface methods, and analyzing tie-breakers (dispatch precedence) with overriding class methods. All of this is necessary to preserve type-correctness and confirm semantics preservation. We demonstrate an automated refactoring tool called Migrate Skeletal Implementation to Interface for transforming legacy Java code to use the new default construct. The …
Zero Textbook Cost Syllabus For Cis 3367 (Spreadsheet Applications In Business), Soniya Dsouza
Zero Textbook Cost Syllabus For Cis 3367 (Spreadsheet Applications In Business), Soniya Dsouza
Open Educational Resources
The primary focus of this course is to learn how to construct and use powerful spreadsheets for effective managerial decision-making. This course is mostly project- oriented with a dual focus on spreadsheet engineering and quantitative modeling of financial applications. Students will learn to develop powerful spreadsheet models and perform data analysis using Pivot Tables, VLookUp, Data Validation techniques and Sub Total functions. Students will also learn how to enhance spreadsheets by creating dashboards on financial data. The Visual Basic (macro) concepts will also be introduced to students. With the knowledge and hands-on experience of these concepts, students will be prepared …
Introduction To Gis Using Open Source Software, 8th Ed, Frank Donnelly
Introduction To Gis Using Open Source Software, 8th Ed, Frank Donnelly
Open Educational Resources
This tutorial was created to accompany the GIS Practicum, a day-long workshop offered by the Newman Library at Baruch College CUNY that introduces participants to geographic information systems (GIS) using the open source software QGIS. The practicum introduces GIS as a concept for envisioning information and as a tool for conducting geographic analyses and creating maps. Participants learn how to navigate a GIS interface, how to prepare layers and conduct a basic geographic analysis, and how to create thematic maps. This tutorial was written using QGIS version 2.18 "Las Palmas", a cross-platform (Windows, Mac, Linux) desktop GIS software package.
Tumor Necrosis Factor Dynamically Regulates The Mrna Stabilome In Rheumatoid Arthritis Fibroblast-Like Synoviocytes, Konstantinos Loupasakis, David Kuo, Upneet K. Sokhi, Christopher Sohn, Bethany Syracuse, Eugenia G. Giannopoulou, Sung Ho Park, Hyelim Kang, Gunnar Rätsch, Lionel B. Ivashkiv, George D. Kalliolias
Tumor Necrosis Factor Dynamically Regulates The Mrna Stabilome In Rheumatoid Arthritis Fibroblast-Like Synoviocytes, Konstantinos Loupasakis, David Kuo, Upneet K. Sokhi, Christopher Sohn, Bethany Syracuse, Eugenia G. Giannopoulou, Sung Ho Park, Hyelim Kang, Gunnar Rätsch, Lionel B. Ivashkiv, George D. Kalliolias
Publications and Research
During rheumatoid arthritis (RA), Tumor Necrosis Factor (TNF) activates fibroblast-like synoviocytes (FLS) inducing in a temporal order a constellation of genes, which perpetuate synovial inflammation. Although the molecular mechanisms regulating TNF-induced transcription are well characterized, little is known about the impact of mRNA stability on gene expression and the impact of TNF on decay rates of mRNA transcripts in FLS. To address these issues we performed RNA sequencing and genome-wide analysis of the mRNA stabilome in RA FLS. We found that TNF induces a biphasic gene expression program: initially, the inducible transcriptome consists primarily of unstable transcripts but progressively switches …
Insights Into The Binding Mode Of Mek Type-Iii Inhibitors. A Step Towards Discovering And Designing Allosteric Kinase Inhibitors Across The Human Kinome, Zheng Zhao, Lei Xie, Philip E. Bourne
Insights Into The Binding Mode Of Mek Type-Iii Inhibitors. A Step Towards Discovering And Designing Allosteric Kinase Inhibitors Across The Human Kinome, Zheng Zhao, Lei Xie, Philip E. Bourne
Publications and Research
Protein kinases are critical drug targets for treating a large variety of human diseases. Type- III kinase inhibitors have attracted increasing attention as highly selective therapeutics. Thus, understanding the binding mechanism of existing type-III kinase inhibitors provides useful insights into designing new type-III kinase inhibitors. In this work, we have systematically studied the binding mode of MEK-targeted type-III inhibitors using structural systems pharmacology and molecular dynamics simulation. Our studies provide detailed sequence, structure, interaction-fingerprint, pharmacophore and binding-site information on the binding characteristics of MEK type-III kinase inhibitors. We hypothesize that the helix-folding activation loop is a hallmark allosteric binding site …
Sliding Window Based Feature Extraction And Traffic Clustering For Green Mobile Cyberphysical Systems, Jiao Zhang, Li Zhou, Angran Xiao, Sai Zeng, Haitao Zhao, Jibo Wei
Sliding Window Based Feature Extraction And Traffic Clustering For Green Mobile Cyberphysical Systems, Jiao Zhang, Li Zhou, Angran Xiao, Sai Zeng, Haitao Zhao, Jibo Wei
Publications and Research
Both the densification of small base stations and the diversity of user activities bring huge challenges for today’s heterogeneous networks, either heavy burdens on base stations or serious energy waste. In order to ensure coverage of the network while reducing the total energy consumption, we adopt a green mobile cyberphysical system (MCPS) to handle this problem. In this paper, we propose a feature extractionmethod using sliding window to extract the distribution feature of mobile user equipment (UE), and a case study is presented to demonstrate that the method is efficacious in reserving the clustering distribution feature. Furthermore, we present traffic …
Automated Refactoring Of Legacy Java Software To Default Methods, Raffi T. Khatchadourian, Hidehiko Masuhara
Automated Refactoring Of Legacy Java Software To Default Methods, Raffi T. Khatchadourian, Hidehiko Masuhara
Publications and Research
Java 8 default methods, which allow interfaces to contain (instance) method implementations, are useful for the skeletal implementation software design pattern. However, it is not easy to transform existing software to exploit default methods as it requires analyzing complex type hierarchies, resolving multiple implementation inheritance issues, reconciling differences between class and interface methods, and analyzing tie-breakers (dispatch precedence) with overriding class methods to preserve type-correctness and confirm semantics preservation. In this paper, we present an efficient, fully-automated, type constraint-based refactoring approach that assists developers in taking advantage of enhanced interfaces for their legacy Java software. The approach features an extensive …
Automated Refactoring Of Legacy Java Software To Default Methods, Raffi T. Khatchadourian, Hidehiko Masuhara
Automated Refactoring Of Legacy Java Software To Default Methods, Raffi T. Khatchadourian, Hidehiko Masuhara
Publications and Research
Java 8 introduces enhanced interfaces, allowing for default (instance) methods that implementers will inherit if none are provided [3]. Default methods can be used [2] as a replacement of the skeletal implementation pattern [1], which creates abstract skeletal implementation classes that implementers extend. Migrating legacy code using the skeletal implementation pattern to instead use default methods can require significant manual effort due to subtle language and semantic restrictions. It requires preserving typecorrectness by analyzing complex type hierarchies, resolving issues arising from multiple inheritance, reconciling differences between class and interface methods, and ensuring tie-breakers with overriding class methods do not alter …
Toward Measuring Network Aesthetics Based On Symmetry, Zengqiang Chen, Matthias Dehmer, Frank Emmert-Streib, Abbe Mowshowitz, Yongtang Shi
Toward Measuring Network Aesthetics Based On Symmetry, Zengqiang Chen, Matthias Dehmer, Frank Emmert-Streib, Abbe Mowshowitz, Yongtang Shi
Publications and Research
In this exploratory paper, we discuss quantitative graph-theoretical measures of network aesthetics. Related work in this area has typically focused on geometrical features (e.g., line crossings or edge bendiness) of drawings or visual representations of graphs which purportedly affect an observer’s perception. Here we take a very different approach, abandoning reliance on geometrical properties, and apply information-theoretic measures to abstract graphs and networks directly (rather than to their visual representaions) as a means of capturing classical appreciation of structural symmetry. Examples are used solely to motivate the approach to measurement, and to elucidate our symmetry-based mathematical theory of network aesthetics.
Comparing Tensorflow Deep Learning Performance Using Cpus, Gpus, Local Pcs And Cloud, John Lawrence, Jonas Malmsten, Andrey Rybka, Daniel A. Sabol, Ken Triplin
Comparing Tensorflow Deep Learning Performance Using Cpus, Gpus, Local Pcs And Cloud, John Lawrence, Jonas Malmsten, Andrey Rybka, Daniel A. Sabol, Ken Triplin
Publications and Research
Deep learning is a very computational intensive task. Traditionally GPUs have been used to speed-up computations by several orders of magnitude. TensorFlow is a deep learning framework designed to improve performance further by running on multiple nodes in a distributed system. While TensorFlow has only been available for a little over a year, it has quickly become the most popular open source machine learning project on GitHub. The open source version of TensorFlow was originally only capable of running on a single node while Google’s proprietary version only was capable of leveraging distributed systems. This has now changed. In this …
Monitoring The Dark Web And Securing Onion Services, John Schriner
Monitoring The Dark Web And Securing Onion Services, John Schriner
Publications and Research
This paper focuses on how researchers monitor the Dark Web. After defining what onion services and Tor are, we discuss tools for monitoring and securing onion services. As Tor Project itself is research-driven, we find that the development and use of these tools help us to project where use of the Dark Web is headed.
Cst1101–Problem Solving With Computer Programming, Syllabus, Elena Filatova
Cst1101–Problem Solving With Computer Programming, Syllabus, Elena Filatova
Open Educational Resources
No abstract provided.
A Novel Approach For Library Materials Acquisition Using Discrete Particle Swarm Optimization, Daniel A. Sabol
A Novel Approach For Library Materials Acquisition Using Discrete Particle Swarm Optimization, Daniel A. Sabol
Publications and Research
The academic library materials acquisition problem is a challenge for librarian, since library cannot get enough funding from universities and the price of materials inflates greatly. In this paper, we analyze an integer mathematical model by considering the selection of acquired materials to maximize the average preference value as well as the budget execution rate under practical restrictions. The objective is to improve the Discrete Particle Swarm Optimization (DPSO) algorithm by adding a Simulate Annealing algorithm to reduce premature convergence. Furthermore, the algorithm is implemented in multiple threaded environment. The experimental results show the efficiency of this approach.
Automated Refactoring Of Legacy Java Software To Default Methods, Raffi T. Khatchadourian, Hidehiko Masuhara
Automated Refactoring Of Legacy Java Software To Default Methods, Raffi T. Khatchadourian, Hidehiko Masuhara
Publications and Research
Java 8 default methods, which allow interfaces to contain (instance) method implementations, are useful for the skeletal implementation software design pattern. However, it is not easy to transform existing software to exploit default methods as it requires analyzing complex type hierarchies, resolving multiple implementation inheritance issues, reconciling differences between class and interface methods, and analyzing tie-breakers (dispatch precedence) with overriding class methods to preserve type-correctness and confirm semantics preservation. In this paper, we present an efficient, fully-automated, type constraint-based refactoring approach that assists developers in taking advantage of enhanced interfaces for their legacy Java software. The approach features an extensive …
Detecting Broken Pointcuts Using Structural Commonality And Degree Of Interest, Raffi T. Khatchadourian, Awais Rashid, Hidehiko Masuhara, Takuya Watanabe
Detecting Broken Pointcuts Using Structural Commonality And Degree Of Interest, Raffi T. Khatchadourian, Awais Rashid, Hidehiko Masuhara, Takuya Watanabe
Publications and Research
Pointcut fragility is a well-documented problem in Aspect-Oriented Programming; changes to the base-code can lead to join points incorrectly falling in or out of the scope of pointcuts. Deciding which pointcuts have broken due to base-code changes is a daunting venture, especially in large and complex systems. We present an automated approach that recommends pointcuts that are likely to require modification due to a particular base-code change, as well as ones that do not. Our hypothesis is that join points selected by a pointcut exhibit common structural characteristics. Patterns describing such commonality are used to recommend pointcuts that have potentially …
Geodesic Merging, Konstantinos Georgatos
Geodesic Merging, Konstantinos Georgatos
Publications and Research
We pursue an account of merging through the use of geodesic semantics, the semantics based on the length of the shortest path on a graph. This approach has been fruitful in other areas of belief change such as revision and update. To this end, we introduce three binary merging operators of propositions defined on the graph of their valuations and we characterize them with a finite set of postulates. We also consider a revision operator defined in the extended language of pairs of propositions. This extension allows us to express all merging operators through the set of revision postulates.