Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Other Computer Sciences

Series

2015

Institution
Keyword
Publication

Articles 1 - 30 of 45

Full-Text Articles in Physical Sciences and Mathematics

An Immersive Telepresence System Using Rgb-D Sensors And Head-Mounted Display, Xinzhong Lu, Ju Shen, Saverio Perugini, Jianjun Yang Dec 2015

An Immersive Telepresence System Using Rgb-D Sensors And Head-Mounted Display, Xinzhong Lu, Ju Shen, Saverio Perugini, Jianjun Yang

Computer Science Faculty Publications

We present a tele-immersive system that enables people to interact with each other in a virtual world using body gestures in addition to verbal communication. Beyond the obvious applications, including general online conversations and gaming, we hypothesize that our proposed system would be particularly beneficial to education by offering rich visual contents and interactivity. One distinct feature is the integration of egocentric pose recognition that allows participants to use their gestures to demonstrate and manipulate virtual objects simultaneously. This functionality enables the instructor to effectively and efficiently explain and illustrate complex concepts or sophisticated problems in an intuitive manner. The …


Salad: A Multimodal Approach For Contextual Video Advertising, Chen Xiang, Tam Nguyen, Mohan Kankanhalli Dec 2015

Salad: A Multimodal Approach For Contextual Video Advertising, Chen Xiang, Tam Nguyen, Mohan Kankanhalli

Computer Science Faculty Publications

The explosive growth of multimedia data on Internet has created huge opportunities for online video advertising. In this paper, we propose a novel advertising technique called SalAd, which utilizes textual information, visual content and the webpage saliency, to automatically associate the most suitable companion ads with online videos. Unlike most existing approaches that only focus on selecting the most relevant ads, SalAd further considers the saliency of selected ads to reduce intentional ignorance. SalAd consists of three basic steps. Given an online video and a set of advertisements, we first roughly identify a set of relevant ads based on the …


Mlaas: Machine Learning As A Service, Mauro Ribeiro, Katarina Grolinger, Miriam Am Capretz Nov 2015

Mlaas: Machine Learning As A Service, Mauro Ribeiro, Katarina Grolinger, Miriam Am Capretz

Electrical and Computer Engineering Publications

The demand for knowledge extraction has been increasing. With the growing amount of data being generated by global data sources (e.g., social media and mobile apps) and the popularization of context-specific data (e.g., the Internet of Things), companies and researchers need to connect all these data and extract valuable information. Machine learning has been gaining much attention in data mining, leveraging the birth of new solutions. This paper proposes an architecture to create a flexible and scalable machine learning as a service. An open source solution was implemented and presented. As a case study, a forecast of electricity demand was …


Qubit Measurement Error From Coupling With A Detuned Neighbor In Circuit Qed, Mostafa Khezri, Justin Dressel, Alexander N. Korotkov Nov 2015

Qubit Measurement Error From Coupling With A Detuned Neighbor In Circuit Qed, Mostafa Khezri, Justin Dressel, Alexander N. Korotkov

Mathematics, Physics, and Computer Science Faculty Articles and Research

In modern circuit QED architectures, superconducting transmon qubits are measured via the state-dependent phase and amplitude shift of a microwave field leaking from a coupled resonator. Determining this shift requires integrating the field quadratures for a nonzero duration, which can permit unwanted concurrent evolution. Here we investigate such dynamical degradation of the measurement fidelity caused by a detuned neighboring qubit. We find that in realistic parameter regimes, where the qubit ensemble-dephasing rate is slower than the qubit-qubit detuning, the joint qubit-qubit eigenstates are better discriminated by measurement than the bare states. Furthermore, we show that when the resonator leaks much …


Why It Is Difficult To Apply Revenue Management Techniques To The Car Rental Business And What Can Be Done About It, Robert F. Gordon Ph.D. Nov 2015

Why It Is Difficult To Apply Revenue Management Techniques To The Car Rental Business And What Can Be Done About It, Robert F. Gordon Ph.D.

Faculty Works: MCS (1984-2023)

Revenue management systems are used by airlines, hotels, and cruise lines to manipulate prices and availability of inventory in real-time, in order to increase profit. We discuss the reasons that the revenue management problem is more complex when applied to the car rental business. We then show how to simplify the model formulation and provide the human-computer interaction, organization, and procedures to make the problem tractable for the car rental business.


Analyzing And Organizing The Sonic Space Of Vocal Imitation, Davide Andrea Mauro Phd, D. Rocchesso Oct 2015

Analyzing And Organizing The Sonic Space Of Vocal Imitation, Davide Andrea Mauro Phd, D. Rocchesso

Computer Sciences and Electrical Engineering Faculty Research

The sonic space that can be spanned with the voice is vast and complex and, therefore, it is difficult to organize and explore. In order to devise tools that facilitate sound design by vocal sketching we attempt at organizing a database of short excerpts of vocal imitations. By clustering the sound samples on a space whose dimensionality has been reduced to the two principal components, it is experimentally checked how meaningful the resulting clusters are for humans. Eventually, a representative of each cluster, chosen to be close to its centroid, may serve as a landmark in the exploration of the …


Data Science In Statistics Curricula: Preparing Students To “Think With Data”, J. Hardin, R. Hoerl, Nicholas J. Horton, D. Nolan, B. Baumer, O. Hall-Holt, P. Murrell, R. Peng, P. Roback, D. Temple Lang, M. D. Ward Oct 2015

Data Science In Statistics Curricula: Preparing Students To “Think With Data”, J. Hardin, R. Hoerl, Nicholas J. Horton, D. Nolan, B. Baumer, O. Hall-Holt, P. Murrell, R. Peng, P. Roback, D. Temple Lang, M. D. Ward

Statistical and Data Sciences: Faculty Publications

A growing number of students are completing undergraduate degrees in statistics and entering the workforce as data analysts. In these positions, they are expected to understand how to use databases and other data warehouses, scrape data from Internet sources, program solutions to complex problems in multiple languages, and think algorithmically as well as statistically. These data science topics have not traditionally been a major component of undergraduate programs in statistics. Consequently, a curricular shift is needed to address additional learning outcomes. The goal of this article is to motivate the importance of data science proficiency and to provide examples and …


Mutations Of Adjacent Amino Acid Pairs Are Not Always Independent, Jyotsna Ramanan, Peter Revesz Oct 2015

Mutations Of Adjacent Amino Acid Pairs Are Not Always Independent, Jyotsna Ramanan, Peter Revesz

CSE Conference and Workshop Papers

Evolutionary studies usually assume that the genetic mutations are independent of each other. This paper tests the independence hypothesis for genetic mutations with regard to protein coding regions. According to the new experimental results the independence assumption generally holds, but there are certain exceptions. In particular, the coding regions that represent two adjacent amino acids seem to change in ways that sometimes deviate significantly from the expected theoretical probability under the independence assumption.


A Computational Translation Of The Phaistos Disk, Peter Revesz Oct 2015

A Computational Translation Of The Phaistos Disk, Peter Revesz

CSE Conference and Workshop Papers

For over a century the text of the Phaistos Disk remained an enigma without a convincing translation. This paper presents a novel semi-automatic translation method that uses for the first time a recently discovered connection between the Phaistos Disk symbols and other ancient scripts, including the Old Hungarian alphabet. The connection between the Phaistos Disk script and the Old Hungarian alphabet suggested the possibility that the Phaistos Disk language may be related to Proto-Finno-Ugric, Proto-Ugric, or Proto-Hungarian. Using words and suffixes from those languages, it is possible to translate the Phaistos Disk text as an ancient sun hymn, possibly connected …


A Computational Model Of The Spread Of Ancient Human Populations Based On Mitochondrial Dna Samples, Peter Revesz Oct 2015

A Computational Model Of The Spread Of Ancient Human Populations Based On Mitochondrial Dna Samples, Peter Revesz

CSE Conference and Workshop Papers

The extraction of mitochondrial DNA (mtDNA) from ancient human population samples provides important data for the reconstruction of population influences, spread and evolution from the Neolithic to the present. This paper presents a mtDNA-based similarity measure between pairs of human populations and a computational model for the evolution of human populations. In a computational experiment, the paper studies the mtDNA information from five Neolithic and Bronze Age populations, namely the Andronovo, the Bell Beaker, the Minoan, the Rössen and the Únětice populations. In the past these populations were identified as separate cultural groups based on geographic location, age and the …


A-Maze-D: Advanced Maze Development Kit Using Constraint Databases, Shruti Daggumarti, Peter Revesz, Corey Svehla Oct 2015

A-Maze-D: Advanced Maze Development Kit Using Constraint Databases, Shruti Daggumarti, Peter Revesz, Corey Svehla

CSE Conference and Workshop Papers

In this paper, we describe the A-Maze-D system which shows that constraint databases can be applied conveniently and efficiently to the design of maze games. A-Maze-D provides a versatile set of features by a combination of a MATLAB library and the MLPQ constraint database system. A-Maze-D is the first system that uses constraint databases to build maze games and opens new ideas in video game development.


A Computational Study Of The Evolution Of Cretan And Related Scripts, Peter Revesz Oct 2015

A Computational Study Of The Evolution Of Cretan And Related Scripts, Peter Revesz

CSE Conference and Workshop Papers

Crete was the birthplace of several ancient writings, including the Cretan Hieroglyphs, the Linear A and the Linear B scripts. Out of these three only Linear B is deciphered. The sound values of the Cretan Hieroglyph and the Linear A symbols are unknown and attempts to reconstruct them based on Linear B have not been fruitful. In this paper, we compare the ancient Cretan scripts with four other Mediterranean and Black Sea scripts, namely Phoenician, South Arabic, Greek and Old Hungarian. We provide a computational study of the evolution of the three Cretan and four other scripts. This study encompasses …


Sense Beyond Expressions: Cuteness, Kang Wang, Tam Nguyen, Jiashi Feng, Jose Sepulveda Oct 2015

Sense Beyond Expressions: Cuteness, Kang Wang, Tam Nguyen, Jiashi Feng, Jose Sepulveda

Computer Science Faculty Publications

With the development of Internet culture, cute has become a popular concept. Many people are curious about what factors making a person look cute. However, there is rare research to answer this interesting question. In this work, we construct a dataset of personal images with comprehensively annotated cuteness scores and facial attributes to investigate this high-level concept in depth. Based on this dataset, through an automatic attributes mining process, we find several critical attributes determining the cuteness of a person.

We also develop a novel Continuous Latent Support Vector Machine (C-LSVM) method to predict the cuteness score of one person …


Adaptive Nonparametric Image Parsing, Tam Nguyen, Canyi Lu, Jose Sepulveda, Shuicheng Yan Oct 2015

Adaptive Nonparametric Image Parsing, Tam Nguyen, Canyi Lu, Jose Sepulveda, Shuicheng Yan

Computer Science Faculty Publications

In this paper, we present an adaptive nonparametric solution to the image parsing task, namely, annotating each image pixel with its corresponding category label. For a given test image, first, a locality-aware retrieval set is extracted from the training data based on superpixel matching similarities, which are augmented with feature extraction for better differentiation of local superpixels. Then, the category of each superpixel is initialized by the majority vote of the k -nearest-neighbor superpixels in the retrieval set. Instead of fixing k as in traditional nonparametric approaches, here, we propose a novel adaptive nonparametric approach that determines the sample-specific k …


Information Diffusion, Facebook Clusters, And The Simplicial Model Of Social Aggregation: A Computational Simulation Of Simplicial Diffusers For Community Health Interventions, Kerk Kee, Lisa Sparks, Daniele C. Struppa, Mirco A. Manucci, Alberto Damiano Sep 2015

Information Diffusion, Facebook Clusters, And The Simplicial Model Of Social Aggregation: A Computational Simulation Of Simplicial Diffusers For Community Health Interventions, Kerk Kee, Lisa Sparks, Daniele C. Struppa, Mirco A. Manucci, Alberto Damiano

Communication Faculty Articles and Research

By integrating the simplicial model of social aggregation with existing research on opinion leadership and diffusion networks, this article introduces the constructs of simplicial diffusers (mathematically defined as nodes embedded in simplexes; a simplex is a socially bonded cluster) and simplicial diffusing sets (mathematically defined as minimal covers of a simplicial complex; a simplicial complex is a social aggregation in which socially bonded clusters are embedded) to propose a strategic approach for information diffusion of cancer screenings as a health intervention on Facebook for community cancer prevention and control. This approach is novel in its incorporation of interpersonally bonded clusters, …


An Interactive User Interface Improves Data Visualization In R, Nathan Sweem Aug 2015

An Interactive User Interface Improves Data Visualization In R, Nathan Sweem

STAR Program Research Presentations

An interactive user interface application was created using the R statistical computing environment and the Shiny package to visualize historical data on the performance of mutual funds and exchange-traded funds (ETFs). Historical data for these funds is scraped from the Yahoo! Finance webpage. The application allows the user to analyze this historical data by category and fund family, which are also scraped from Yahoo! Finance. The application generates interactive plots to compare the performance of selected mutual funds and ETFs given the baseline and center determined by the user. The application has been modified to attentively match the data with …


A Visual Analysis Of Articulated Motion Complexity Based On Optical Flow And Spatial-Temporal Features, Beau Michael Christ Aug 2015

A Visual Analysis Of Articulated Motion Complexity Based On Optical Flow And Spatial-Temporal Features, Beau Michael Christ

Department of Computer Science and Engineering: Dissertations, Theses, and Student Research

The understanding of motion is an important problem in computer vision with applications including crowd-flow analysis, video surveillance, and estimating three-dimensional structure. A less-explored problem is the visual characterization and quantification of motion complexity. An important motion class that is prevalent in living beings is articulated motion (segments connected by joints). At present, no known standardized measure for quantifying the complexity of articulated motion exists. Such a measure could facilitate advanced motion analysis with applications including video indexing, motion comparison, and advanced biological study of visual signals in organisms.

This dissertation presents an in-depth study of the development of several …


Teaching Big Data By Three Levels Of Projects, Jianjun Yang, Ju Shen Jul 2015

Teaching Big Data By Three Levels Of Projects, Jianjun Yang, Ju Shen

Computer Science Faculty Publications

Big Data is a new topic and it is very hot nowadays. However, it is difficult to teach Big Data effectively by regular lecture. In this paper, we present a unique way to teach students Big Data by developing three levels of projects from easy to difficult. The three levels projects are initializing project, designing project, and comprehensive projects. They are developed to involve students in Big Data, train students' skills to analyze concrete problems of Big Data, and develop students' creative abilities and their abilities to solve real setting problems.


Growing The Practice Of Vocal Sketching, S. Delle Monache, D. Rocchesso, S. Baldan, Davide Andrea Mauro Phd Jul 2015

Growing The Practice Of Vocal Sketching, S. Delle Monache, D. Rocchesso, S. Baldan, Davide Andrea Mauro Phd

Computer Sciences and Electrical Engineering Faculty Research

Sketch-thinking in the design domain is a complex representational activity, emerging from the reflective conversation with the sketch. A recent line of research on computational support for sound design has been focusing on the exploitation of voice, and especially vocal imitations, as effective representation strategy for the early stage of the design process. A set of introductory exercises on vocal sketching, to probe the communication effectiveness of vocal imitations for design purposes, are presented and discussed, in the scope of the research-through-design workshop activities of the EU project SkAT-VG.


Between Worlds: Securing Mixed Javascript/Actionscript Multi-Party Web Content, Phu Huu Phung, Maliheh Monshizadeh, Meera Sridhar, Kevin W. Hamlen, V. N. Venkatakrishnan Jul 2015

Between Worlds: Securing Mixed Javascript/Actionscript Multi-Party Web Content, Phu Huu Phung, Maliheh Monshizadeh, Meera Sridhar, Kevin W. Hamlen, V. N. Venkatakrishnan

Computer Science Faculty Publications

Mixed Flash and JavaScript content has become increasingly prevalent; its purveyance of dynamic features unique to each platform has popularized it for myriad Web development projects. Although Flash and JavaScript security has been examined extensively, the security of untrusted content that combines both has received considerably less attention. This article considers this fusion in detail, outlining several practical scenarios that threaten the security of Web applications. The severity of these attacks warrants the development of new techniques that address the security of Flash-JavaScript content considered as a whole, in contrast to prior solutions that have examined Flash or JavaScript security …


Salient Object Detection Via Augmented Hypotheses, Tam Nguyen, Jose Sepulveda Jul 2015

Salient Object Detection Via Augmented Hypotheses, Tam Nguyen, Jose Sepulveda

Computer Science Faculty Publications

In this paper, we propose using augmented hypotheses which consider objectness, foreground, and compactness for salient object detection. Our algorithm consists of four basic steps. First, our method generates the objectness map via objectness hypotheses. Based on the objectness map, we estimate the foreground margin and compute the corresponding foreground map which prefers the foreground objects. From the objectness map and the foreground map, the compactness map is formed to favor the compact objects. We then derive a saliency measure that produces a pixel-accurate saliency map which uniformly covers the objects of interest and consistently separates foreground and background.

We …


Automatic Video Self Modeling For Voice Disorder, Ju Shen, Changpeng Ti, Anusha Raghunathan, Sen-Ching S. Cheung, Rita Patel Jul 2015

Automatic Video Self Modeling For Voice Disorder, Ju Shen, Changpeng Ti, Anusha Raghunathan, Sen-Ching S. Cheung, Rita Patel

Computer Science Faculty Publications

Video self modeling (VSM) is a behavioral intervention technique in which a learner models a target behavior by watching a video of him- or herself. In the field of speech language pathology, the approach of VSM has been successfully used for treatment of language in children with Autism and in individuals with fluency disorder of stuttering. Technical challenges remain in creating VSM contents that depict previously unseen behaviors. In this paper, we propose a novel system that synthesizes new video sequences for VSM treatment of patients with voice disorders. Starting with a video recording of a voice-disorder patient, the proposed …


Compression Of Video Tracking And Bandwidth Balancing Routing In Wireless Multimedia Sensor Networks, Yin Wang, Jianjun Yang, Ju Shen, Bryson Payne, Juan Guo, Kun Hua May 2015

Compression Of Video Tracking And Bandwidth Balancing Routing In Wireless Multimedia Sensor Networks, Yin Wang, Jianjun Yang, Ju Shen, Bryson Payne, Juan Guo, Kun Hua

Computer Science Faculty Publications

There has been a tremendous growth in multimedia applications over wireless networks. Wireless Multimedia Sensor Networks(WMSNs) have become the premier choice in many research communities and industry. Many state-of-art applications, such as surveillance, traffic monitoring, and remote heath care are essentially video tracking and transmission in WMSNs. The transmission speed is constrained by the big file size of video data and fixed bandwidth allocation in constant routing paths. In this paper, we present a CamShift based algorithm to compress the tracking of videos. Then we propose a bandwidth balancing strategy in which each sensor node is able to dynamically select …


Robust And Real-Time Stereo Matching On Parallel Graphics Hardware Using Gradient-Based Disparity Refinement, Jedrzej Kowalczuk Apr 2015

Robust And Real-Time Stereo Matching On Parallel Graphics Hardware Using Gradient-Based Disparity Refinement, Jedrzej Kowalczuk

Department of Electrical and Computer Engineering: Dissertations, Theses, and Student Research

Computer vision attempts to provide camera-equipped machines with visual perception, i.e., the capability to comprehend their surroundings through the analysis and understanding of images. The ability to perceive depth is a vital component of visual perception that enables machines to interpret the three-dimensional structure of their surroundings and allows them to navigate through the environment. In computer vision, depth perception is achieved via stereo matching, a process that identifies correspondences between pixels in images acquired using a pair of horizontally offset cameras. It is possible to calculate depths from correspondences or, more specifically, the positional offsets (disparities) between pixels in …


Simple Secrecy: Analog Stream Cipher For Secure Voice Communication, John M. Campbell Apr 2015

Simple Secrecy: Analog Stream Cipher For Secure Voice Communication, John M. Campbell

Senior Honors Theses

Voice signals are inherently analog, and some voice communication systems still utilize analog signals. Existing analog cryptographic methods do not satisfactorily provide cryptosecurity for communication systems due to several limitations. This paper proposes a novel means of provided cryptosecurity for analog signals without digitization; thereby avoiding the latency which results from ADC/DAC conversions. This method utilizes the principles of the digital stream cipher, generating instead a continuous pseudorandom analog key stream signal which is transformed with the original analog signal to create an encrypted ciphertext signal which is statistically independent of the original signal and the key stream signal. The …


Leading Undergraduate Students To Big Data Generation, Jianjun Yang, Ju Shen Mar 2015

Leading Undergraduate Students To Big Data Generation, Jianjun Yang, Ju Shen

Computer Science Faculty Publications

People are facing a flood of data today. Data are being collected at unprecedented scale in many areas, such as networking, image processing, virtualization, scientific computation, and algorithms. The huge data nowadays are called Big Data. Big data is an all encompassing term for any collection of data sets so large and complex that it becomes difficult to process them using traditional data processing applications. In this article, the authors present a unique way which uses network simulator and tools of image processing to train students abilities to learn, analyze, manipulate, and apply Big Data. Thus they develop students hands-on …


Assessing The Emphasis On Information Security In The Systems Analysis And Design Course, William David Salisbury, Thomas W. Ferratt, Donald E. Wynn Mar 2015

Assessing The Emphasis On Information Security In The Systems Analysis And Design Course, William David Salisbury, Thomas W. Ferratt, Donald E. Wynn

MIS/OM/DS Faculty Publications

Due to several recent highly publicized information breaches, information security has gained a higher profile. Hence, it is reasonable to expect that information security would receive an equally significant emphasis in the education of future systems professionals. A variety of security standards that various entities (e.g., NIST, COSO, ISACA-COBIT, ISO) have put forth emphasize the importance of information security from the very beginning of the system development lifecycle (SDLC) to avoid significant redesign in later phases. To determine the emphasis on security in typical systems analysis and design (SA&D) courses, we examine (1) to what extent security is emphasized in …


Clustering Header Categories Extracted From Web Tables, George Nagy, David W. Embley, Mukkai Krishnamoorthy, Sharad C. Seth Feb 2015

Clustering Header Categories Extracted From Web Tables, George Nagy, David W. Embley, Mukkai Krishnamoorthy, Sharad C. Seth

CSE Conference and Workshop Papers

Revealing related content among heterogeneous web tables is part of our long term objective of formulating queries over multiple sources of information. Two hundred HTML tables from institutional web sites are segmented and each table cell is classified according to the fundamental indexing property of row and column headers. The categories that correspond to the multi-dimensional data cube view of a table are extracted by factoring the (often multi-row/column) headers. To reveal commonalities between tables from diverse sources, the Jaccard distances between pairs of category headers (and also table titles) are computed. We show how about one third of our …


Hole Detection And Shape-Free Representation And Double Landmarks Based Geographic Routing In Wireless Sensor Networks, Jianjun Yang, Zongming Fei, Ju Shen Feb 2015

Hole Detection And Shape-Free Representation And Double Landmarks Based Geographic Routing In Wireless Sensor Networks, Jianjun Yang, Zongming Fei, Ju Shen

Computer Science Faculty Publications

In wireless sensor networks, an important issue of geographic routing is “local minimum” problem, which is caused by a “hole” that blocks the greedy forwarding process. Existing geographic routing algorithms use perimeter routing strategies to find a long detour path when such a situation occurs. To avoid the long detour path, recent research focuses on detecting the hole in advance, then the nodes located on the boundary of the hole advertise the hole information to the nodes near the hole. Hence the long detour path can be avoided in future routing. We propose a heuristic hole detecting algorithm which identifies …


A Simulation-Based Approach To Solve A Specific Type Of Chance Constrained Optimization, Lijian Chan Feb 2015

A Simulation-Based Approach To Solve A Specific Type Of Chance Constrained Optimization, Lijian Chan

MIS/OM/DS Faculty Publications

We solve the chance constrained optimization with convex feasible set through approximating the chance constraint by another convex smooth function. The approximation is based on the numerical properties of the Bernstein polynomial that is capable of effectively controlling the approximation error for both function value and gradient. Thus, we adopt a first-order algorithm to reach a satisfactory solution which is expected to be optimal. When the explicit expression of joint distribution is not available, we then use Monte Carlo approach to numerically evaluate the chance constraint to obtain an optimal solution by probability. Numerical results for known problem instances are …