Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Singapore Management University (499)
- China Simulation Federation (315)
- TÜBİTAK (202)
- University of Texas at El Paso (123)
- Kennesaw State University (116)
-
- Old Dominion University (100)
- University for Business and Technology in Kosovo (78)
- San Jose State University (75)
- Technological University Dublin (68)
- Zayed University (66)
- Chulalongkorn University (65)
- The University of Maine (53)
- Air Force Institute of Technology (52)
- University of Arkansas, Fayetteville (49)
- City University of New York (CUNY) (47)
- University of Nebraska - Lincoln (44)
- Walden University (43)
- Wright State University (40)
- University of South Florida (39)
- University of Central Florida (38)
- University of Windsor (38)
- Boise State University (36)
- MBZUAI (35)
- Western University (35)
- Portland State University (34)
- Karbala International Journal of Modern Science (33)
- California Polytechnic State University, San Luis Obispo (30)
- University of Wisconsin Milwaukee (30)
- University of Massachusetts Amherst (29)
- Utah State University (27)
- Keyword
-
- Deep learning (141)
- Machine learning (140)
- Technical Reports (107)
- UTEP Computer Science Department (107)
- Machine Learning (93)
-
- Deep Learning (68)
- Computer Science (57)
- Artificial intelligence (54)
- COVID-19 (48)
- Cybersecurity (46)
- Artificial Intelligence (39)
- Blockchain (37)
- Computer vision (34)
- Optimization (30)
- Security (30)
- Classification (29)
- Neural networks (28)
- Natural language processing (27)
- Privacy (27)
- Simulation (27)
- Reinforcement learning (25)
- Department of Computer Science (23)
- IoT (22)
- Neural Networks (21)
- Social media (21)
- Computer science (20)
- Feature extraction (20)
- AI (19)
- Clustering (19)
- Computer Vision (19)
- Publication
-
- Research Collection School Of Computing and Information Systems (473)
- Journal of System Simulation (315)
- Turkish Journal of Electrical Engineering and Computer Sciences (202)
- Theses and Dissertations (171)
- Departmental Technical Reports (CS) (107)
-
- C-Day Computing Showcase (87)
- All Works (66)
- Chulalongkorn University Theses and Dissertations (Chula ETD) (65)
- Electronic Theses and Dissertations (60)
- Master's Projects (59)
- Dissertations (44)
- Journal of Spatial Information Science (43)
- Walden Dissertations and Doctoral Studies (43)
- Computer Science Faculty Publications and Presentations (41)
- Doctoral Dissertations (39)
- USF Tampa Graduate Theses and Dissertations (37)
- Karbala International Journal of Modern Science (33)
- Articles (31)
- Electronic Theses and Dissertations, 2020- (31)
- Master's Theses (31)
- Computer Science Faculty Publications (30)
- Browse all Theses and Dissertations (29)
- Honors Theses (29)
- CCE Theses and Dissertations (24)
- Graduate Theses and Dissertations (24)
- Conference papers (23)
- Open Educational Resources (22)
- Computer Vision Faculty Publications (21)
- Research outputs 2014 to 2021 (21)
- McKelvey School of Engineering Theses & Dissertations (20)
- Publication Type
Articles 1 - 30 of 3409
Full-Text Articles in Physical Sciences and Mathematics
Exposing And Fixing Causes Of Inconsistency And Nondeterminism In Clustering Implementations, Xin Yin
Exposing And Fixing Causes Of Inconsistency And Nondeterminism In Clustering Implementations, Xin Yin
Dissertations
Cluster analysis aka Clustering is used in myriad applications, including high-stakes domains, by millions of users. Clustering users should be able to assume that clustering implementations are correct, reliable, and for a given algorithm, interchangeable. Based on observations in a wide-range of real-world clustering implementations, this dissertation challenges the aforementioned assumptions.
This dissertation introduces an approach named SmokeOut that uses differential clustering to show that clustering implementations suffer from nondeterminism and inconsistency: on a given input dataset and using a given clustering algorithm, clustering outcomes and accuracy vary widely between (1) successive runs of the same toolkit, i.e., nondeterminism, and …
On Performance Optimization And Prediction Of Parallel Computing Frameworks In Big Data Systems, Haifa Alquwaiee
On Performance Optimization And Prediction Of Parallel Computing Frameworks In Big Data Systems, Haifa Alquwaiee
Dissertations
A wide spectrum of big data applications in science, engineering, and industry generate large datasets, which must be managed and processed in a timely and reliable manner for knowledge discovery. These tasks are now commonly executed in big data computing systems exemplified by Hadoop based on parallel processing and distributed storage and management. For example, many companies and research institutions have developed and deployed big data systems on top of NoSQL databases such as HBase and MongoDB, and parallel computing frameworks such as MapReduce and Spark, to ensure timely data analyses and efficient result delivery for decision making and business …
Private And Federated Deep Learning: System, Theory, And Applications For Social Good, Han Hu
Private And Federated Deep Learning: System, Theory, And Applications For Social Good, Han Hu
Dissertations
During the past decade, drug abuse continues to accelerate towards becoming the most severe public health problem in the United States. The ability to detect drugabuse risk behavior at a population scale, such as among the population of Twitter users, can help to monitor the trend of drugabuse incidents. However, traditional methods do not effectively detect drugabuse risk behavior in tweets, mainly due to the sparsity of such tweets and the noisy nature of tweets. In the first part of this dissertation work, the task of classifying tweets as containing drugabuse risk behavior or not, is studied. Millions of public …
A Practical Approach To Automated Software Correctness Enhancement, Aleksandr Zakharchenko
A Practical Approach To Automated Software Correctness Enhancement, Aleksandr Zakharchenko
Dissertations
To repair an incorrect program does not mean to make it correct; it only means to make it more-correct, in some sense, than it is. In the absence of a concept of relative correctness, i.e. the property of a program to be more-correct than another with respect to a specification, the discipline of program repair has resorted to various approximations of absolute (traditional) correctness, with varying degrees of success. This shortcoming is concealed by the fact that most program repair tools are tested on basic cases, whence making them absolutely correct is not clearly distinguishable from making them relatively more-correct. …
Parameter Estimation And Inference Of Spatial Autoregressive Model By Stochastic Gradient Descent, Gan Luan
Parameter Estimation And Inference Of Spatial Autoregressive Model By Stochastic Gradient Descent, Gan Luan
Dissertations
Stochastic gradient descent (SGD) is a popular iterative method for model parameter estimation in large-scale data and online learning settings since it goes through the data in only one pass. While SGD has been well studied for independent data, its application to spatially-correlated data largely remains unexplored. This dissertation develops SGD-based parameter estimation and statistical inference algorithms for the spatial autoregressive (SAR) model, a common model for spatial lattice data.
This research contains three parts. (I) The first part concerns SGD estimation and inference for the SAR mean regression model. A new SGD algorithm based on maximum likelihood estimator (MLE) …
Machine Learning And Computer Vision In Solar Physics, Haodi Jiang
Machine Learning And Computer Vision In Solar Physics, Haodi Jiang
Dissertations
In the recent decades, the difficult task of understanding and predicting violent solar eruptions and their terrestrial impacts has become a strategic national priority, as it affects the life of human beings, including communication, transportation, the power grid, national defense, space travel, and more. This dissertation explores new machine learning and computer vision techniques to tackle this difficult task. Specifically, the dissertation addresses four interrelated problems in solar physics: magnetic flux tracking, fibril tracing, Stokes inversion and vector magnetogram generation.
First, the dissertation presents a new deep learning method, named SolarUnet, to identify and track solar magnetic flux elements in …
User Experience Design Practices In Industry (Case Study From Indonesian Information Technology Companies), Isnan Nugraha, Agung Fatwanto
User Experience Design Practices In Industry (Case Study From Indonesian Information Technology Companies), Isnan Nugraha, Agung Fatwanto
Elinvo (Electronics, Informatics, and Vocational Education)
User Experience (UX) is a term that has received a lot of attention in the last decade. The number of industries whose consider the importance of implementing the UX design process within their development cycle has increased. Therefore, we think it is important to investigate how UX design processes are implemented in the industries. In this research, we take a qualitative approach with descriptive methods by investigating six information technology companies in Indonesia. As a result, we found that most of these information technology companies implement the UX design process as part of their operation and consider that the UX …
Energy Planning Model Design For Forecasting The Final Energy Consumption Using Artificial Neural Networks, Haidy Eissa
Energy Planning Model Design For Forecasting The Final Energy Consumption Using Artificial Neural Networks, Haidy Eissa
Theses and Dissertations
“Energy Trilemma” has recently received an increasing concern among policy makers. The trilemma conceptual framework is based on three main dimensions: environmental sustainability, energy equity, and energy security. Energy security reflects a nation’s capability to meet current and future energy demand. Rational energy planning is thus a fundamental aspect to articulate energy policies. The energy system is huge and complex, accordingly in order to guarantee the availability of energy supply, it is necessary to implement strategies on the consumption side. Energy modeling is a tool that helps policy makers and researchers understand the fluctuations in the energy system. Over the …
Long Term Predictive Modeling On Big Spatio-Temporal Data, Yong Zhuang
Long Term Predictive Modeling On Big Spatio-Temporal Data, Yong Zhuang
Graduate Doctoral Dissertations
In the era of massive data, one of the most promising research fields involves the analysis of large-scale Spatio-temporal databases to discover exciting and previously unknown but potentially useful patterns from data collected over time and space. A modeling process in this domain must take temporal and spatial correlations into account, but with the dimensionality of the time and space measurements increasing, the number of elements potentially contributing to a target sharply grows, making the target's long-term behavior highly complex, chaotic, highly dynamic, and hard to predict. Therefore, two different considerations are taken into account in this work: one is …
Design And Development Of Alumni Career Information System Using Php Mysql, Mustofa Abi Hamid, Didik Aribowo, Rini Anggraini
Design And Development Of Alumni Career Information System Using Php Mysql, Mustofa Abi Hamid, Didik Aribowo, Rini Anggraini
Elinvo (Electronics, Informatics, and Vocational Education)
Alumni data collection at the Electrical Engineering Vocational Education Universitas Sultan Ageng Tirtayasa was still performed manually and there were no career information media about soft skills training and development, tracer studies, and job vacancies information. Therefore, media is needed to accommodate career information and alumni data collection quickly and effectively. The web-based information system using PHP MySQL was developed and tested for feasibility as an information medium for soft skills training and development, tracer studies, job vacancies information, as well as career counseling and consulting. This study used a Modify R&D as a development method and the waterfall method …
Implementation Of Switching Algorithm For Svpwm Inverter In Induction Motor Drive System On Electric Vehicle Applications, Bayu Praharsena, Mohammad Jauhari, Era Purwanto, Mentari Putri Jati, Angga Wahyu Aditya, Aries Alfian Prasetyo
Implementation Of Switching Algorithm For Svpwm Inverter In Induction Motor Drive System On Electric Vehicle Applications, Bayu Praharsena, Mohammad Jauhari, Era Purwanto, Mentari Putri Jati, Angga Wahyu Aditya, Aries Alfian Prasetyo
Elinvo (Electronics, Informatics, and Vocational Education)
Electric cars are the way to reduce global warming and fuel shortages. Performance variable speed drive is needed for various drive electric vehicle applications. Unfortunately, high performance is still being investigated with a variety of drive systems. This paper presents a design, analysis, and implementation of the SV-PWM inverter motor drive system. The SV-PWM algorithm in design using Matlab, to analyze the system include signal response, THD-V, THD-I. All algorithms are embedded in STM32F4, as the main controller. The hardware uses a 3-phase motor control Steval power module. Response speed and output signal inverters are shown in chart form for …
A Novel Arabic Corpus For Text Classification Using Deep Learning And Word Embedding, Roua A. Abou Khachfeh, Islam El Kabani, Ziad Osman
A Novel Arabic Corpus For Text Classification Using Deep Learning And Word Embedding, Roua A. Abou Khachfeh, Islam El Kabani, Ziad Osman
BAU Journal - Science and Technology
Over the last years, Natural Language Processing (NLP) for Arabic language has obtained increasing importance due to the massive textual information available online in an unstructured text format, and its capability in facilitating and making information retrieval easier. One of the widely used NLP task is “Text Classification”. Its goal is to employ machine learning technics to automatically classify the text documents into one or more predefined categories. An important step in machine learning is to find suitable and large data for training and testing an algorithm. Moreover, Deep Learning (DL), the trending machine learning research, requires a lot of …
Evaluating Technology-Mediated Collaborative Workflows For Telehealth, Christopher Bondy Ph.D., Pengcheng Shi, Pamela Grover Md, Vicki Hanson, Linlin Chen, Rui Li
Evaluating Technology-Mediated Collaborative Workflows For Telehealth, Christopher Bondy Ph.D., Pengcheng Shi, Pamela Grover Md, Vicki Hanson, Linlin Chen, Rui Li
Articles
Goals: This paper discusses the need for a predictable method to evaluate gains and gaps of collaborative technology-mediated workflows and introduces an evaluation framework to address this need. Methods: The Collaborative Space Analysis Framework (CS-AF), introduced in this research, is a cross-disciplinary evaluation method designed to evaluate technology-mediated collaborative workflows. The 5-step CS-AF approach includes: (1) current-state workflow definition, (2) current-state (baseline) workflow assessment, (3) technology-mediated workflow development and deployment, (4) technology-mediated workflow assessment, (5) analysis, and conclusions. For this research, a comprehensive, empirical study of hypertension exam workflow for telehealth was conducted using the CS-AF approach. Results: The CS-AF …
A Framework Of Web-Based Dark Patterns That Can Be Detected Manually Or Automatically, Ioannis Stavrakakis, Andrea Curley, Dympna O'Sullivan, Damian Gordon, Brendan Tierney
A Framework Of Web-Based Dark Patterns That Can Be Detected Manually Or Automatically, Ioannis Stavrakakis, Andrea Curley, Dympna O'Sullivan, Damian Gordon, Brendan Tierney
Articles
This research explores the design and development of a framework for the detection of Dark Patterns, which are a series of user interface tricks that manipulate users into actions that they do not intend to do, for example, share more data than they want to, or spend more money than they plan to. The interface does this using either deception or other psychological nudges. User Interface experts have categorized a number of these tricks that are commonly used and have called them Dark Patterns. They are typically varied in their form and what they do, and the goal of this …
On The Documentation Of Refactoring Types, Eman Abdullah Alomar, Jiaqian Liu, Kenneth Addo, Mohamed Wiem Mkaouer, Christian D. Newman, Ali Ouni, Zhe Yu
On The Documentation Of Refactoring Types, Eman Abdullah Alomar, Jiaqian Liu, Kenneth Addo, Mohamed Wiem Mkaouer, Christian D. Newman, Ali Ouni, Zhe Yu
Articles
Commit messages are the atomic level of software documentation. They provide a natural language description of the code change and its purpose. Messages are critical for software maintenance and program comprehension. Unlike documenting feature updates and bug fixes, little is known about how developers document their refactoring activities. Specifically, developers can perform multiple refactoring operations, including moving methods, extracting classes, renaming attributes, for various reasons, such as improving software quality, managing technical debt, and removing defects. Yet, there is no systematic study that analyzes the extent to which the documentation of refactoring accurately describes the refactoring operations performed at the …
What Interactive Web Features Are Most Used, Travis Tyler
What Interactive Web Features Are Most Used, Travis Tyler
Experiential Learning Projects
The use of interactive features in websites has become common place on the internet. People use these tools to help navigate and understand the content related to that website. However, due the large variety of websites it can be tricky to understand what features are best to utilize based on the topic of your site. This paper seeks to address this issue by researching how users interact and utilized different features on different websites. Research is gathered via scholarly articles and direct data gathered from volunteers. This data shows users tend to favor more interactive tools to help with navigation, …
Evaluation Of Gpu Acceleration For Wrf–Sfire, Joshua Benz
Evaluation Of Gpu Acceleration For Wrf–Sfire, Joshua Benz
Master's Projects
WRF–SFIRE is an open source, atmospheric–wildfire model that couples the WRF model with the level set fire spread model to simulate wildfires in real time. This model has many applications and more scientific questions can be asked and answered if the model can be run faster. Nvidia has put a lot of effort into easing the barrier of entry for accelerating applications with their tools to be run on GPUs. Various physical simulations have been successfully ported to utilize GPUs and have benefited from the speed increase. In this research, we take a look at WRF-SFIRE and try to use …
Explaining Deep Learning Models For Tabular Data Using Layer-Wise Relevance Propagation, Ihsan Ullah, Andre Rios, Vaibhov Gala, Susan Mckeever
Explaining Deep Learning Models For Tabular Data Using Layer-Wise Relevance Propagation, Ihsan Ullah, Andre Rios, Vaibhov Gala, Susan Mckeever
Articles
Trust and credibility in machine learning models are bolstered by the ability of a model to explain its decisions. While explainability of deep learning models is a well-known challenge, a further challenge is clarity of the explanation itself for relevant stakeholders of the model. Layer-wise Relevance Propagation (LRP), an established explainability technique developed for deep models in computer vision, provides intuitive human-readable heat maps of input images. We present the novel application of LRP with tabular datasets containing mixed data (categorical and numerical) using a deep neural network (1D-CNN), for Credit Card Fraud detection and Telecom Customer Churn prediction use …
Workflow Critical Path: A Data-Oriented Critical Path Metric For Holistic Hpc Workflows, Daniel D. Nguyen, Karen L. Karavanic
Workflow Critical Path: A Data-Oriented Critical Path Metric For Holistic Hpc Workflows, Daniel D. Nguyen, Karen L. Karavanic
Computer Science Faculty Publications and Presentations
Current trends in HPC, such as the push to exascale, convergence with Big Data, and growing complexity of HPC applications, have created gaps that traditional performance tools do not cover. One example is Holistic HPC Workflows — HPC workflows comprising multiple codes, paradigms, or platforms that are not developed using a workflow management system. To diagnose the performance of these applications, we define a new metric called Workflow Critical Path (WCP), a data-oriented metric for Holistic HPC Workflows. WCP constructs graphs that span across the workflow codes and platforms, using data states as vertices and data mutations as edges. …
Seedemu: The Seed Internet Emulator, Honghao Zeng
Seedemu: The Seed Internet Emulator, Honghao Zeng
Theses - ALL
I studied and experimented with the idea of building an emulator for the Internet. While there are various already available options for such a task, none of them takes the emulation of the entire Internet as an important feature in mind. Those emulators and simulators can handle small-scale networks pretty well, but lacks the ability to handle large-size networks, mainly due to:
- Not being able to run many nodes, or requires very powerful hardware to do so,- Lacks convenient ways to build a large emulation, and - Lacks reusability: once something is built, it is very hard to re-use …
Winter 2021
In The Loop
2021 Emmy Nominees; Animator Tapped by Cartoon Network; IndieCade Horizons 2021; Hack4Space; Security Daemons Prevail; Role Models: DePaul Originals Game Studio students build industry-level skills that benefit themselves and others; Frames and Fortune: Eugene Bush programmed his indie video studio with patience and planning; Reality Check: Heather Snyder Quinn augments reality to question systems of unchecked power
Twin Anomaly Detection System, Paaras Chand
Twin Anomaly Detection System, Paaras Chand
Master's Projects
Anomaly detection performs well in situations where signature (and other rule-based) methods fail; there is no need to identify every threat as long as it is different from the norm. The tradeoff is that anomaly detection often results in a large number of false positives. While previous work has capitalized on the data imbalance problem to train models with only one set of data (one-class classification), few have utilized the limiting set for anything other than testing purposes. This paper seeks to utilize two anomaly detectors: one that is trained on the positive set and one that is trained on …
A Hybrid Machine Learning Framework For Predicting Students’ Performance In Virtual Learning Environment, Edmund Evangelista
A Hybrid Machine Learning Framework For Predicting Students’ Performance In Virtual Learning Environment, Edmund Evangelista
All Works
Virtual Learning Environments (VLE), such as Moodle and Blackboard, store vast data to help identify students' performance and engagement. As a result, researchers have been focusing their efforts on assisting educational institutions in providing machine learning models to predict at-risk students and improve their performance. However, it requires an efficient approach to construct a model that can ultimately provide accurate predictions. Consequently, this study proposes a hybrid machine learning framework to predict students' performance using eight classification algorithms and three ensemble methods (Bagging, Boosting, Voting) to determine the best-performing predictive model. In addition, this study used filter-based and wrapper-based feature …
Comparative Analysis Of Rgb-Based Eye-Tracking For Large-Scale Human-Machine Applications, Brett Thaman, Trung Cao
Comparative Analysis Of Rgb-Based Eye-Tracking For Large-Scale Human-Machine Applications, Brett Thaman, Trung Cao
Posters-at-the-Capitol
Gaze tracking has become an established technology that enables using an individual’s gaze as an input signal to support a variety of applications in the context of Human-Computer Interaction. Gaze tracking primarily relies on sensing devices such as infrared (IR) cameras. Nevertheless, in the recent years, several attempts have been realized at detecting gaze by acquiring and processing images acquired from standard RGB cameras. Nowadays, there are only a few publicly available open-source libraries and they have not been tested extensively. In this paper, we present the result of a comparative analysis that studied a commercial eye-tracking device using IR …
Development Experience Of International Open Source And Its Enlightenment To Construction Of Open Source Innovation System In China, Yuntao Long, Xiaoming Wang, Rong Gu, Yungang Bao
Development Experience Of International Open Source And Its Enlightenment To Construction Of Open Source Innovation System In China, Yuntao Long, Xiaoming Wang, Rong Gu, Yungang Bao
Bulletin of Chinese Academy of Sciences (Chinese Version)
Open source has become an essential innovation model for global technological progress and the construction of an open source innovation system is an important path for China to achieve self-reliance and self-improvement in science and technology. As an indispensable part of the global software value chain and high-tech industry chain, China needs to improve its open source innovation ecosystem. The paper, based on a systematic review of the related development policies and successful experiences on the open source work in US and Europe, puts forward a series of policy suggestions to solve the practical problems faced by the construction of …
Teaching Computer Science Csc 222, Harrison Dekker
Teaching Computer Science Csc 222, Harrison Dekker
Library Impact Statements
No abstract provided.
A Note From The Co-Editors, Fayth Schutter
A Note From The Co-Editors, Fayth Schutter
Ideas: Exhibit Catalog for the Honors College Visiting Scholars Series
An introduction to the first issue of the third volume of Ideas Magazine, concerning the work and research of Dr. Shoshana Magnet.
Sufficient Condition For The Possibility Of Completing The Pursuit, Nodirbek Umrzaqov
Sufficient Condition For The Possibility Of Completing The Pursuit, Nodirbek Umrzaqov
Scientific Bulletin. Physical and Mathematical Research
In this paper, the problem of chase is represented by a system of linear differential equations of motion dynamics. In this case, there is an integral limit to the control parameter of the evader, and a geometric limit to the control parameter of the pursuer. The pursuer is allowed to use the control that the fugitive has used so far to build his control. There are enough conditions for the game to end even if it starts from any starting point. An algorithm for constructing the control function of the pursuer is defined. It should also be noted that the …
Computational Thinking For Teachers, Susan Imberman
Computational Thinking For Teachers, Susan Imberman
Open Educational Resources
This is a syllabus for a course in computational thinking. The course described introduces preservice and inservice teachers to the fundamental concepts of computer science, including web design, coding, ethics, computational thinking, course resources, etc.
Achieving Fairness Through Load-Balancing In Social Cloud Computing Networks, Kaiyi Huang
Achieving Fairness Through Load-Balancing In Social Cloud Computing Networks, Kaiyi Huang
Master's Projects
Cloud-based computing networks have taken over the digital landscape. From small non-profits to large multinational corporations, more and more entities have been offloading computing effort to the cloud in order to take advantage of the increased cost-efficiency and scalability of cloud computing. One of the new types of cloud that have emerged is the P2P cloud, which disengages from a traditional datacenter setup by allowing users to instead share their own computing hardware into a cloud to take advantage of cloud computing’s advantages at an even lower cost. However, this new paradigm comes with a slew of challenges, notably, security …