Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Access permissions (1)
- Activity Detection (1)
- Adaptive resonance theory (1)
- Algorithmic processing (1)
- Android (1)
-
- Asynchronous I/O (1)
- Attack target (1)
- Behavior learning (1)
- Caching (1)
- Cloud computing (1)
- Cloud infrastructures (1)
- Cloud services (1)
- Cloud-based simulations (1)
- Clustering (1)
- Conflict Identification (1)
- Conflict Resolution (1)
- Conformance Testing (1)
- Contraction mapping (1)
- Cross-validation (1)
- Dataset Co-Evolution (1)
- Dataset Synchronization (1)
- Decision Support System (1)
- Disjunctive Summary (1)
- Distributed computer systems (1)
- Dynamic programming (1)
- Economic Denial of Sustainability attacks (EDoS) (1)
- Edit distance (1)
- Egocentric Vision (1)
- Electroencephalogram (EEG) (1)
- Firewall (1)
Articles 1 - 26 of 26
Full-Text Articles in Physical Sciences and Mathematics
Preliminary Investigation Of Walking Motion Using A Combination Of Image And Signal Processing, Bradley Schneider, Tanvi Banerjee
Preliminary Investigation Of Walking Motion Using A Combination Of Image And Signal Processing, Bradley Schneider, Tanvi Banerjee
Kno.e.sis Publications
We present the results of analyzing gait motion in first-person video taken from a commercially available wearable camera embedded in a pair of glasses. The video is analyzed with three different computer vision methods to extract motion vectors from different gait sequences from four individuals for comparison against a manually annotated ground truth dataset. Using a combination of signal processing and computer vision techniques, gait features are extracted to identify the walking pace of the individual wearing the camera as well as validated using the ground truth dataset. Our preliminary results indicate that the extraction of activity from the video …
Summarization Of Egocentric Videos: A Comprehensive Survey, Ana Garcia Del Molino, Cheston Tan, Joo-Hwee Lim, Ah-Hwee Tan
Summarization Of Egocentric Videos: A Comprehensive Survey, Ana Garcia Del Molino, Cheston Tan, Joo-Hwee Lim, Ah-Hwee Tan
Research Collection School Of Computing and Information Systems
The introduction of wearable video cameras (e.g., GoPro) in the consumer market has promoted video life-logging, motivating users to generate large amounts of video data. This increasing flow of first-person video has led to a growing need for automatic video summarization adapted to the characteristics and applications of egocentric video. With this paper, we provide the first comprehensive survey of the techniques used specifically to summarize egocentric videos. We present a framework for first-person view summarization and compare the segmentation methods and selection algorithms used by the related work in the literature. Next, we describe the existing egocentric video datasets …
Proteus: Computing Disjunctive Loop Summary Via Path Dependency Analysis, Xiaofei Xie, Bihuan Chen, Yang Liu, Wei Le, Xiaohong Li
Proteus: Computing Disjunctive Loop Summary Via Path Dependency Analysis, Xiaofei Xie, Bihuan Chen, Yang Liu, Wei Le, Xiaohong Li
Research Collection School Of Computing and Information Systems
Loops are challenging structures for program analysis, especially when loops contain multiple paths with complex interleaving executions among these paths. In this paper, we first propose a classification of multi-path loops to understand the complexity of the loop execution, which is based on the variable updates on the loop conditions and the execution order of the loop paths. Secondly, we propose a loop analysis framework, named Proteus, which takes a loop program and a set of variables of interest as inputs and summarizes path-sensitive loop effects on the variables. The key contribution is to use a path dependency automaton (PDA) …
Static Loop Analysis And Its Applications, Xiaofei Xie
Static Loop Analysis And Its Applications, Xiaofei Xie
Research Collection School Of Computing and Information Systems
Loops are challenging structures in program analysis, and an effective loop analysis is crucial in the applications, such as symbolic execution and program verification. In the research, we will first perform a deep analysis and propose a classification according to the complexity of the loops. Then try to propose techniques for analyzing and summarizing different loops. At last, we apply the techniques in multiple applications.
Computation Of Shortest Path Problem In A Network With Sv-Trapezoidal Neutrosophic Numbers, Florentin Smarandache, Said Broumi, Assia Bakali, Mohamed Talea, Luige Vladareanu
Computation Of Shortest Path Problem In A Network With Sv-Trapezoidal Neutrosophic Numbers, Florentin Smarandache, Said Broumi, Assia Bakali, Mohamed Talea, Luige Vladareanu
Branch Mathematics and Statistics Faculty and Staff Publications
In this work, a neutrosophic network method is proposed for finding the shortest path length with single valued trapezoidal neutrosophic number. The proposed algorithm gives the shortest path length using score function from source node to destination node. Here the weights of the edges are considered to be single valued trapezoidal neutrosophic number. Finally, a numerical example is used to illustrate the efficiency of the proposed approach
A Method Of Integrating Correlation Structures For A Generalized Recursive Route Choice Model, Tien Mai
A Method Of Integrating Correlation Structures For A Generalized Recursive Route Choice Model, Tien Mai
Research Collection School Of Computing and Information Systems
We propose a way to estimate a generalized recursive route choice model. The model generalizes other existing recursive models in the literature, i.e., (Fosgerau et al., 2013b; Mai et al., 2015c), while being more flexible since it allows the choice at each stage to be any member of the network multivariate extreme value (network MEV) model (Daly and Bierlaire, 2006). The estimation of the generalized model requires defining a contraction mapping and performing contraction iterations to solve the Bellman’s equation. Given the fact that the contraction mapping is defined based on the choice probability generating functions (CPGF) (Fosgerau et al., …
Hifocap: An Android App For Wearable Health Devices, Yoonsik Cheon, Rodrigo A. Romero
Hifocap: An Android App For Wearable Health Devices, Yoonsik Cheon, Rodrigo A. Romero
Departmental Technical Reports (CS)
Android is becoming a platform for mobile health-care devices and apps. However, there are many challenges in developing soft real-time, health-care apps for non-dedicated mobile devices such as smartphones and tablets. In this paper we share our experiences in developing the HifoCap app, a mobile app for receiving electroencephalogram (EEG) wave samples from a wearable device, visualizing the received EEG samples, and transmitting them to a cloud storage server. The app is network and data-intensive. We describe the challenges we faced while developing the HifoCap app---e.g., ensuring the soft real-time requirement in the presence of uncertainty on the Android platform---along …
Understanding Firewalld In Multi-Zone Configurations, Nathan R. Vance, William F. Polik
Understanding Firewalld In Multi-Zone Configurations, Nathan R. Vance, William F. Polik
Faculty Publications
Stories of compromised servers and data theft fill today's news. It isn't difficult for someone who has read an informative blog post to access a system via a misconfigured service, take advantage of a recently exposed vulnerability, or gain control using a stolen password. Any of the many internet services found on a typical Linux server could harbor a vulnerability that grants unauthorized access to the system.
Since it's an impossible task to harden a system at the application level against every possible threat, firewalls provide security by limiting access to a system. Firewalls filter incoming packets based on their …
Towards Autonomous Behavior Learning Of Non-Player Characters In Games, Shu Feng, Ah-Hwee Tan
Towards Autonomous Behavior Learning Of Non-Player Characters In Games, Shu Feng, Ah-Hwee Tan
Research Collection School Of Computing and Information Systems
Non-Player-Characters (NPCs), as found in computer games, can be modelled as intelligent systems, which serve to improve the interactivity and playability of the games. Although reinforcement learning (RL) has been a promising approach to creating the behavior models of non-player characters (NPC), an initial stage of exploration and low performance is typically required. On the other hand, imitative learning (IL) is an effective approach to pre-building a NPC’s behavior model by observing the opponent’s actions, but learning by imitation limits the agent’s performance to that of its opponents. In view of their complementary strengths, this paper proposes a computational model …
Ra2: Predicting Simulation Execution Time For Cloud-Based Design Space Explorations, Nguyen Binh Duong Ta, Wentong Cai, Zengxiang Li, Suiping Zhou
Ra2: Predicting Simulation Execution Time For Cloud-Based Design Space Explorations, Nguyen Binh Duong Ta, Wentong Cai, Zengxiang Li, Suiping Zhou
Research Collection School Of Computing and Information Systems
Design space exploration refers to the evaluation of implementation alternatives for many engineering and design problems. A popular exploration approach is to run a large number of simulations of the actual system with varying sets of configuration parameters to search for the optimal ones. Due to the potentially huge resource requirements, cloud-based simulation execution strategies should be considered in many cases. In this paper, we look at the issue of running largescale simulation-based design space exploration problems on commercial Infrastructure-as-a-Service clouds, namely Amazon EC2, Microsoft Azure and Google Compute Engine. To efficiently manage cloud resources used for execution, the key …
Analyzing Clinical Depressive Symptoms In Twitter, Amir Hossein Yazdavar, Hussein S. Al-Olimat, Tanvi Banerjee, Krishnaprasad Thirunarayan, Amit P. Sheth
Analyzing Clinical Depressive Symptoms In Twitter, Amir Hossein Yazdavar, Hussein S. Al-Olimat, Tanvi Banerjee, Krishnaprasad Thirunarayan, Amit P. Sheth
Kno.e.sis Publications
350 million people are suffering from clinical depression worldwide.
What Motivates High School Students To Take Precautions Against The Spread Of Influenza? A Data Science Approach To Latent Modeling Of Compliance With Preventative Practice, William L. Romine, Tanvi Banerjee, William R. Folk, Lloyd H. Barrow
What Motivates High School Students To Take Precautions Against The Spread Of Influenza? A Data Science Approach To Latent Modeling Of Compliance With Preventative Practice, William L. Romine, Tanvi Banerjee, William R. Folk, Lloyd H. Barrow
Kno.e.sis Publications
– This study focuses on a central question: What key behavioral factors influence high school students’ compliance with preventative measures against the transmission of influenza? We use multilevel logistic regression to equate logit measures for eight precautions to students’ latent compliance levels on a common scale. Using linear regression, we explore the efficacy of knowledge of influenza, affective perceptions about influenza and its prevention, prior illness, and gender in predicting compliance. Hand washing and respiratory etiquette are the easiest precautions for students, and hand sanitizer use and keeping the hands away from the face are the most difficult. Perceptions of …
Self-Regulated Incremental Clustering With Focused Preferences, Di Wang, Ah-Hwee Tan
Self-Regulated Incremental Clustering With Focused Preferences, Di Wang, Ah-Hwee Tan
Research Collection School Of Computing and Information Systems
Due to their online learning nature, incremental clustering techniques can handle a continuous stream of data. In particular, various incremental clustering techniques based on Adaptive Resonance Theory (ART) have been shown to have low computational complexity in adaptive learning and are less sensitive to noisy information. However, parameter regularization in existing ART clustering techniques is applied either on different features or on different clusters exclusively. In this paper, we introduce Interest-Focused Clustering based on Adaptive Resonance Theory (IFC-ART), which self-regulates the vigilance parameter associated with each feature and each cluster. As such, we can incorporate the domain knowledge of the …
Edit Distance Based Encryption And Its Application, Tran Viet Xuan Phuong, Guomin Yang, Willy Susilo, Kaitai Liang
Edit Distance Based Encryption And Its Application, Tran Viet Xuan Phuong, Guomin Yang, Willy Susilo, Kaitai Liang
Research Collection School Of Computing and Information Systems
Edit distance, also known as Levenshtein distance, is a very useful tool to measure the similarity between two strings. It has been widely used in many applications such as natural language processing and bioinformatics. In this paper, we introduce a new type of fuzzy public key encryption called Edit Distance-based Encryption (EDE). In EDE, the encryptor can specify an alphabet string and a threshold when encrypting a message, and a decryptor can obtain a decryption key generated from another alphabet string, and the decryption will be successful if and only if the edit distance between the two strings is within …
Passively Testing Routing Protocols In Wireless Sensor Networks, Xiaoping Che, Stephane Maag, Hwee-Xian Tan, Hwee-Pink Tan
Passively Testing Routing Protocols In Wireless Sensor Networks, Xiaoping Che, Stephane Maag, Hwee-Xian Tan, Hwee-Pink Tan
Research Collection School Of Computing and Information Systems
Smart systems are today increasingly developed with the number of wireless sensor devices that drastically increases. They are implemented within several contexts through our environment. Thus, sensed data transported in ubiquitous systems are important and the way to carry them must be efficient and reliable. For that purpose, several routing protocols have been proposed to wireless sensor networks (WSN). However, one stage that is often neglected before their deployment, is the conformance testing process, a crucial and challenging step. Active testing techniques commonly used in wired networks are not suitable to WSN and passive approaches are needed. While some works …
Optimizing Main Memory Usage In Modern Computing Systems To Improve Overall System Performance, Daniel Jose Campello
Optimizing Main Memory Usage In Modern Computing Systems To Improve Overall System Performance, Daniel Jose Campello
FIU Electronic Theses and Dissertations
Operating Systems use fast, CPU-addressable main memory to maintain an application’s temporary data as anonymous data and to cache copies of persistent data stored in slower block-based storage devices. However, the use of this faster memory comes at a high cost. Therefore, several techniques have been implemented to use main memory more efficiently in the literature. In this dissertation we introduce three distinct approaches to improve overall system performance by optimizing main memory usage.
First, DRAM and host-side caching of file system data are used for speeding up virtual machine performance in today’s virtualized data centers. The clustering of VM …
Semantic, Cognitive, And Perceptual Computing: Paradigms That Shape Human Experience, Amit P. Sheth, Pramod Anantharam, Cory Henson
Semantic, Cognitive, And Perceptual Computing: Paradigms That Shape Human Experience, Amit P. Sheth, Pramod Anantharam, Cory Henson
Kno.e.sis Publications
Unlike machine-centric computing, in which efficient data processing takes precedence over contextual tailoring, human-centric computation provides a personalized data interpretation that most users find highly relevant to their needs. The authors show how semantic, cognitive, and perceptual computing paradigms work together to produce actionable information.
Semantic Memory Modeling And Memory Interaction In Learning Agents, Wenwen Wang, Ah-Hwee Tan, Loo-Nin Teow
Semantic Memory Modeling And Memory Interaction In Learning Agents, Wenwen Wang, Ah-Hwee Tan, Loo-Nin Teow
Research Collection School Of Computing and Information Systems
Semantic memory plays a critical role in reasoning and decision making. It enables an agent to abstract useful knowledge learned from its past experience. Based on an extension of fusion adaptive resonance theory network, this paper presents a novel self-organizing memory model to represent and learn various types of semantic knowledge in a unified manner. The proposed model, called fusion adaptive resonance theory for multimemory learning, incorporates a set of neural processes, through which it may transfer knowledge and cooperate with other long-term memory systems, including episodic memory and procedural memory. Specifically, we present a generic learning process, under which …
Nlu Framework For Voice Enabling Non-Native Applications On Smart Devices, Soujanya Lanka, Deepika Panthania, Pooja Kushalappa, Pradeep Varakantham
Nlu Framework For Voice Enabling Non-Native Applications On Smart Devices, Soujanya Lanka, Deepika Panthania, Pooja Kushalappa, Pradeep Varakantham
Research Collection School Of Computing and Information Systems
Voice is a critical user interface on smart devices (wearables, phones, speakers, televisions) to access applications (or services) available on them. Unfortunately, only a few native applications (provided by the OS developer) are typically voice enabled in devices of today. Since, the utility of a smart device is determined more by the strength of external applications developed for the device, voice enabling non-native applications in a scalable, seamless manner within the device is a critical use case and is the focus of our work. We have developed a Natural Language Understanding (NLU) framework that uses templates supported by the application …
Robust Decision Making For Stochastic Network Design, Akshat Kumar, Arambam James Singh, Pradeep Varakantham, Daniel Sheldon
Robust Decision Making For Stochastic Network Design, Akshat Kumar, Arambam James Singh, Pradeep Varakantham, Daniel Sheldon
Research Collection School Of Computing and Information Systems
We address the problem of robust decision making for stochastic network design. Our work is motivated by spatial conservation planning where the goal is to take management decisions within a fixed budget to maximize the expected spread of a population of species over a network of land parcels. Most previous work for this problem assumes that accurate estimates of different network parameters (edge activation probabilities, habitat suitability scores) are available, which is an unrealistic assumption. To address this shortcoming, we assume that network parameters are only partially known, specified via interval bounds. We then develop a decision making approach that …
Controlled Access To Cloud Resources For Mitigating Economic Denial Of Sustainability (Edos) Attacks, Zubair A. Baig, Sadiq M. Sait, Farid Binbeshr
Controlled Access To Cloud Resources For Mitigating Economic Denial Of Sustainability (Edos) Attacks, Zubair A. Baig, Sadiq M. Sait, Farid Binbeshr
Research outputs 2014 to 2021
Cloud computing is a paradigm that provides scalable IT resources as a service over the Internet. Vulnerabilities in the cloud infrastructure have been readily exploited by the adversary class. Therefore, providing the desired level of assurance to all stakeholders through safeguarding data (sensitive or otherwise) which is stored in the cloud, is of utmost importance. In addition, protecting the cloud from adversarial attacks of diverse types and intents, cannot be understated. Economic Denial of Sustainability (EDoS) attack is considered as one of the concerns that has stalled many organizations from migrating their operations and/or data to the cloud. This is …
A Study Of Social Web Data On Buprenorphine Abuse Using Semantic Web Technology, Raminta Daniulaityte, Amit P. Sheth
A Study Of Social Web Data On Buprenorphine Abuse Using Semantic Web Technology, Raminta Daniulaityte, Amit P. Sheth
Kno.e.sis Publications
The Specific Aims of this application are to use a paradigmatic approach that combines Semantic Web technology, Natural Language Processing and Machine Learning techniques to:
1) Describe drug users’ knowledge, attitudes, and behaviors related to the non-medical use of Suboxone and Subutex as discussed on Web-based forums.
2) Identify and describe temporal patterns of non-medical use of Suboxone and Subutex as discussed on Web-based forums.
The research was carried out by an interdisciplinary team of members of the Center for Interventions, Treatment and Addictions Research (CITAR) and the Ohio Center of Excellence in Knowledge- enabled Computing (Kno.e.sis) at Wright State …
Co-Evolution Of Rdf Datasets, Sidra Faisal, Kemele M. Endris, Saeedeh Shekarpour, Sören Auer, Maria-Esther Vidal
Co-Evolution Of Rdf Datasets, Sidra Faisal, Kemele M. Endris, Saeedeh Shekarpour, Sören Auer, Maria-Esther Vidal
Kno.e.sis Publications
Linking Data initiatives have fostered the publication of large number of RDF datasets in the Linked Open Data (LOD) cloud, as well as the development of query processing infrastructures to access these data in a federated fashion. However, different experimental studies have shown that availability of LOD datasets cannot be always ensured, being RDF data replication required for envisioning reliable federated query frameworks. Albeit enhancing data availability, RDF data replication requires synchronization and conflict resolution when replicas and source datasets are allowed to change data over time, i.e., co-evolution management needs to be provided to ensure consistency. In this paper, …
802.11ac Wireless Standard, Brent Marshall
802.11ac Wireless Standard, Brent Marshall
A with Honors Projects
In this student paper, the author compares wireless standard 802.11ac to 802.11n standard. In 2011 the IEEE began development of the newest wireless 802.11 standard. This standard would be known as 802.11ac. Development of this standard continued until 2013 and was approved in January 2014. The new standard was touted as having many improvements over the 802.11n standard. Improvements such as higher data rates, more capacity, being ideal for multimedia, and being more robust.
Building The Web Of Knowledge With Smart Iot Applications, Amelie Gyrard, Pankesh Patel, Amit P. Sheth, Martin Serrano
Building The Web Of Knowledge With Smart Iot Applications, Amelie Gyrard, Pankesh Patel, Amit P. Sheth, Martin Serrano
Kno.e.sis Publications
The Internet of Things (IoT) is experiencing fast adoption because of its positive impact to change all aspects of our lives, from agriculture in rural areas, to health and wellness, to smart home and smart-x applications in cities. The development of IoT applications and deployment of smart IoT-based solutions is just starting; smart IoT applications will modify our physical world and our interaction with cyber spaces, from how we remotely control appliances at home to how we care for patients or elderly persons. The massive deployment of IoT devices represents a tremendous economic impact and at the same time offers …
An Indicator Of Inclusion With Applications To Computer Vision, Florentin Smarandache, Ovidiu Ilie Sandru
An Indicator Of Inclusion With Applications To Computer Vision, Florentin Smarandache, Ovidiu Ilie Sandru
Branch Mathematics and Statistics Faculty and Staff Publications
In this paper we present an algorithmic process of necessary operations for the automatic movement of a predefined object from a video image in the target region of that image, intended to facilitate the implementation of specialized software applications in solving this kind of problems.