Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 3 of 3

Full-Text Articles in Physical Sciences and Mathematics

Methods For Classification Of Consumer Review Into The Ones Written Before Or After The Product Purchase, Md Mehedi Hasan Jan 2019

Methods For Classification Of Consumer Review Into The Ones Written Before Or After The Product Purchase, Md Mehedi Hasan

Wayne State University Theses

Online consumer reviews provide a wealth of information about products and services that, if properly identified and extracted, could be of immense value to businesses. While classification of reviews according to sentiment polarity has been extensively studied in previous work, many more focused types of review analysis remain open problems. In this work, we introduce a novel text classification problem of separating post-purchase from pre-purchase consumer review fragments that can facilitate identification of immediate actionable insights based on the feedback from the customers, who actually purchased and own a product. To address this problem, we propose the features, which are …


Molecular Exchange Monte Carlo. A Generalized Method For Identity Exchanges In Grand Canonical Monte Carlo Simulations, Mohammad Soroush Barhaghi Jan 2019

Molecular Exchange Monte Carlo. A Generalized Method For Identity Exchanges In Grand Canonical Monte Carlo Simulations, Mohammad Soroush Barhaghi

Wayne State University Theses

A generalized identity exchange algorithm is presented for Monte Carlo simulations in the grand canonical ensemble. The algorithm, referred to as Molecular Exchange Monte Carlo (MEMC), may be applied to multicomponent systems of arbitrary molecular topology, and provides significant enhancements in the sampling of phase space over a wide range of compositions and temperatures. Three different approaches are presented for the insertion of large molecules, and the pros and cons of each method are discussed. The performance of the algorithms is highlighted through grand canonical Monte Carlo histogram-reweighting simulations performed on several systems, including 2,2,4-trimethylpentane+neopentane, butane+perfluorobutane, methane+n-alkanes, and water+impurity. Relative …


An Empirical Study On Deterministic Collusive Attack Using Inter Component Communication In Android Applications, Tanzeer Hossain Jan 2019

An Empirical Study On Deterministic Collusive Attack Using Inter Component Communication In Android Applications, Tanzeer Hossain

Wayne State University Theses

Security threats using intent based inter component communication (ICC) channels in Android are under constant scrutiny of software engineering researchers. Though prior research provides empirical evidence on the existence of collusive communication channels in popular android apps, little is known about developers’willful involvement and motivation to exploit these channels.To shed light on this matter, in this paper we devised a novel methodology to deterministically identify developers’ involvement in establishing collusive inter app communication channels. We incorporate static analysis and relational database technology to discover sensitive collusive channels and domain knowledge of the Android SDK to build a model to identify …