Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Software Engineering

2020

Institution
Keyword
Publication
Publication Type
File Type

Articles 1 - 30 of 260

Full-Text Articles in Physical Sciences and Mathematics

Distributed Load Testing By Modeling And Simulating User Behavior, Chester Ira Parrott Dec 2020

Distributed Load Testing By Modeling And Simulating User Behavior, Chester Ira Parrott

LSU Doctoral Dissertations

Modern human-machine systems such as microservices rely upon agile engineering practices which require changes to be tested and released more frequently than classically engineered systems. A critical step in the testing of such systems is the generation of realistic workloads or load testing. Generated workload emulates the expected behaviors of users and machines within a system under test in order to find potentially unknown failure states. Typical testing tools rely on static testing artifacts to generate realistic workload conditions. Such artifacts can be cumbersome and costly to maintain; however, even model-based alternatives can prevent adaptation to changes in a system …


Analysis Of Github Pull Requests, Canon Ellis Dec 2020

Analysis Of Github Pull Requests, Canon Ellis

Computer Science and Engineering Theses and Dissertations

The popularity of the software repository site GitHub has created a rise in the Pull Based Development Models' use. An essential portion of pull-based development is the creation of Pull Requests. Pull Requests often have to be reviewed by an individual to be approved and accepted into the Master branch of a software repository. The reviewing process can often be time-consuming and introduce a relatively high level of lost development time. This paper examines thousands of pull requests to understand the most valuable metadata of pull requests. We then introduce metrics in comparing the metadata of pull requests to understand …


Analyzing Performance, Energy Consumption, And Reliability Of Mobile Applications, Osama Barack Dec 2020

Analyzing Performance, Energy Consumption, And Reliability Of Mobile Applications, Osama Barack

Computer Science and Engineering Theses and Dissertations

Mobile applications have become a high priority for software developers. Researchers and practitioners are working toward improving and optimizing the energy efficiency and performance of mobile applications due to the capacity limitation of mobile device processors and batteries. In addition, mobile applications have become popular among end-users, developers have introduced a wide range of features that increase the complexity of application code.

To improve and enhance the maintainability, extensibility, and understandability of application code, refactoring techniques were introduced. However, implementing such techniques to mobile applications affects energy efficiency and performance. To evaluate and categorize software implementation and optimization efficiency, several …


Automatically Classifying Non-Functional Requirements With Feature Extraction And Supervised Machine Learning Techniques, Mahtab Ezzatikarami Dec 2020

Automatically Classifying Non-Functional Requirements With Feature Extraction And Supervised Machine Learning Techniques, Mahtab Ezzatikarami

Electronic Thesis and Dissertation Repository

Abstract. Context and Motivation: Non-functional requirements (NFRs) of a system need to be classified into different types such as usability, performance, etc. This would enable stakeholders to ensure the completeness of their work by extracting specific NFRs related to their expertise. Question/Problem: Because of the size and complexity of requirement specification documents, the manual classification of NFRs is time-consuming, labour-intensive, and error-prone. We thus need an automated solution that can provide a highly accurate and efficient categorization of NFRs. Principal ideas/results: In this investigation, using natural language processing and supervised machine learning (SML) techniques, we investigate with feature extraction techniques …


Methodological Aspects Of Distance Learning For Developing The Professional Competence Of Students Of The Direction "Computer Engineering, B Kuznetsova, Gulnora Muxtarova, Umida Azimova, Kim Yelena Dec 2020

Methodological Aspects Of Distance Learning For Developing The Professional Competence Of Students Of The Direction "Computer Engineering, B Kuznetsova, Gulnora Muxtarova, Umida Azimova, Kim Yelena

Bulletin of TUIT: Management and Communication Technologies

This work is based on the use of distance learning technologies in education, which will make it possible to individualize training, and in turn contributes to the formation of professionally important qualities for students of the direction of "Computer Engineering". The experimental work was aimed at developing a technology for the formation of students' professional competence.

The article shows that the mastery by students of knowledge, skills and abilities in the field of computer engineering was aimed at their conscious application in solving problems of the educational and cognitive process, and subsequently in professional activity.

The article presents the results …


A Preliminary Analysis Of How A Software Organization’S Maturity And Size Affect Its Intellectual Property Portfolio, Daniel Gifford Dec 2020

A Preliminary Analysis Of How A Software Organization’S Maturity And Size Affect Its Intellectual Property Portfolio, Daniel Gifford

Master of Science in Software Engineering Theses

Intellectual property, commonly known as IP, is complex. The four main types of software IP, which is what this thesis will focus on, are patents, trade secrets, trademarks, and copyright. Patents, trade secrets, and copyrights were all studied by this thesis. Software IP is unique in that it can by copyrighted. Different IP owners, which can be businesses of different types, individuals, and universities, often have different strategies as to how to use their IP portfolio. This thesis studies differences in IP usage between these entities specifically in the field of software. Large and small software companies were analyzed specifically. …


School District Boundaries Map, Nick Huffman Dec 2020

School District Boundaries Map, Nick Huffman

Honors Theses

The purpose of this project is to provide a school district boundary mapping feature to a product sold by Level Data called SDVS, which is a plugin used by districts inside of PowerSchool. Using primarily the features offered by Mapbox, We have implemented a React component that is capable of plotting useful data points related to a student and their school district on a map. The tool is designed to be used primarily by school administrators to determine whether or not a student lives within their district boundaries. The application uses a dataset that is provided by the NCES to …


On The Generation, Structure, And Semantics Of Grammar Patterns In Source Code Identifiers, Christian D. Newman,, Reem S. Alsuhaibani, Michael J. Decker, Anthony Peruma, Dishant Kaushik, Mohamed Wiem Mkaouer, Emily Hill Dec 2020

On The Generation, Structure, And Semantics Of Grammar Patterns In Source Code Identifiers, Christian D. Newman,, Reem S. Alsuhaibani, Michael J. Decker, Anthony Peruma, Dishant Kaushik, Mohamed Wiem Mkaouer, Emily Hill

Articles

Identifier names are the atoms of program comprehension. Weak identifier names decrease developer productivity and degrade the performance of automated approaches that leverage identifier names in source code analysis; threatening many of the advantages which stand to be gained from advances in artificial intelligence and machine learning. Therefore, it is vital to support developers in naming and renaming identifiers. In this paper, we extend our prior work, which studies the primary method through which names evolve: rename refactorings. In our prior work, we contextualize rename changes by examining commit messages and other refactorings. In this extension, we further consider data …


Prediction Of Nocturia In Live Alone Elderly Using Unobtrusive In-Home Sensors, Barry Nuqoba, Hwee-Pink Tan Dec 2020

Prediction Of Nocturia In Live Alone Elderly Using Unobtrusive In-Home Sensors, Barry Nuqoba, Hwee-Pink Tan

Research Collection School Of Computing and Information Systems

Nocturia, or the need to void (or urinate) one or more times in the middle of night time sleeping, represents a significant economic burden for individuals and healthcare systems. Although it can be diagnosed in the hospital, most people tend to regard nocturia as a usual event, resulting in underreported diagnosis and treatment. Data from self-reporting via a voiding diary may be irregular and subjective especially among the elderly due to memory problems. This study aims to detect the presence of nocturia through passive in-home monitoring to inform intervention (e.g., seeking diagnosis and treatment) to improve the physical and mental …


Audee: Automated Testing For Deep Learning Frameworks, Qianyu Guo, Xiaofei Xie, Yi Li, Xiaoyu Zhang, Yang Liu, Xiaohong Li, Chao Shen Dec 2020

Audee: Automated Testing For Deep Learning Frameworks, Qianyu Guo, Xiaofei Xie, Yi Li, Xiaoyu Zhang, Yang Liu, Xiaohong Li, Chao Shen

Research Collection School Of Computing and Information Systems

Deep learning (DL) has been applied widely, and the quality of DL system becomes crucial, especially for safety-critical applications. Existing work mainly focuses on the quality analysis of DL models, but lacks attention to the underlying frameworks on which all DL models depend. In this work, we propose Audee, a novel approach for testing DL frameworks and localizing bugs. Audee adopts a search-based approach and implements three different mutation strategies to generate diverse test cases by exploring combinations of model structures, parameters, weights and inputs. Audee is able to detect three types of bugs: logical bugs, crashes and Not-a-Number (NaN) …


Enabling Collaborative Video Sensing At The Edge Through Convolutional Sharing, Kasthuri Jayarajah, Wanniarachchige Dhanuja Tharith Wanniarachchi, Archan Misra Dec 2020

Enabling Collaborative Video Sensing At The Edge Through Convolutional Sharing, Kasthuri Jayarajah, Wanniarachchige Dhanuja Tharith Wanniarachchi, Archan Misra

Research Collection School Of Computing and Information Systems

While Deep Neural Network (DNN) models have provided remarkable advances in machine vision capabilities, their high computational complexity and model sizes present a formidable roadblock to deployment in AIoT-based sensing applications. In this paper, we propose a novel paradigm by which peer nodes in a network can collaborate to improve their accuracy on person detection, an exemplar machine vision task. The proposed methodology requires no re-training of the DNNs and incurs minimal processing latency as it extracts scene summaries from the collaborators and injects back into DNNs of the reference cameras, on-the-fly. Early results show promise with improvements in recall …


Robust, Fine-Grained Occupancy Estimation Via Combined Camera & Wifi Indoor Localization, Anuradha Ravi, Archan Misra Dec 2020

Robust, Fine-Grained Occupancy Estimation Via Combined Camera & Wifi Indoor Localization, Anuradha Ravi, Archan Misra

Research Collection School Of Computing and Information Systems

We describe the development of a robust, accurate and practically-validated technique for estimating the occupancy count in indoor spaces, based on a combination of WiFi & video sensing. While fusing these two sensing-based inputs is conceptually straightforward, the paper demonstrates and tackles the complexity that arises from several practical artefacts, such as (i) over-counting when a single individual uses multiple WiFi devices and under-counting when the individual has no such device; (ii) corresponding errors in image analysis due to real-world artefacts, such as occlusion, and (iii) the variable errors in mapping image bounding boxes (which can include multiple possible types …


How Do Monetary Incentives Influence Prosocial Fundraising? An Empirical Investigation Of Matching Subsidies On Crowdfunding, Zhiyuan Gao Dec 2020

How Do Monetary Incentives Influence Prosocial Fundraising? An Empirical Investigation Of Matching Subsidies On Crowdfunding, Zhiyuan Gao

Dissertations and Theses Collection (Open Access)

Monetary incentives, such as matching subsidies, are widely used in traditional fundraising and crowdfunding platforms to boost funding activities and improve funding outcomes. However, its effectiveness on prosocial fundraising is still unclear from both theoretical (Bénabou and Tirole, 2006; Frey, 1997; Meier, 2007a) and empirical studies (Ariely et al., 2009; Karlan and List, 2007; Rondeau and List, 2008). This dissertation aims to examine the effectiveness of matching subsidies on prosocial fundraising in the crowdfunding context. Specifically, I study how the presence of matching subsidies affects overall funding outcomes and funding dynamics in the online prosocial crowdfunding environment.

The first essay …


Vision-Based Analytics For Improved Ai-Driven Iot Applications, Amit Sharma Dec 2020

Vision-Based Analytics For Improved Ai-Driven Iot Applications, Amit Sharma

Dissertations and Theses Collection (Open Access)

Proliferation of Internet of Things (IoT) sensor systems, primarily driven by cheaper embedded hardware platforms and wide availability of light-weight software platforms, has opened up doors for large-scale data collection opportunities. The availability of massive amount of data has in-turn given way to rapidly growing machine learning models e.g. You Only Look Once (YOLO), Single-Shot-Detectors (SSD) and so on. There has been a growing trend of applying machine learning techniques, e.g., object detection, image classification, face detection etc., on data collected from camera sensors and therefore enabling plethora of vision-sensing applications namely self-driving cars, automatic crowd monitoring, traffic-flow analysis, occupancy …


Modeling User-Affected Software Properties For Open Source Software Supply Chains, Tapajit Dey Dec 2020

Modeling User-Affected Software Properties For Open Source Software Supply Chains, Tapajit Dey

Doctoral Dissertations

Background: Open Source Software development community relies heavily on users of the software and contributors outside of the core developers to produce top-quality software and provide long-term support. However, the relationship between a software and its contributors in terms of exactly how they are related through dependencies and how the users of a software affect many of its properties are not very well understood.

Aim: My research covers a number of aspects related to answering the overarching question of modeling the software properties affected by users and the supply chain structure of software ecosystems, viz. 1) Understanding how software usage …


Graphmp: I/O-Efficient Big Graph Analytics On A Single Commodity Machine, Peng Sun, Yonggang Wen, Nguyen Binh Duong Ta, Xiaokui Xiao Dec 2020

Graphmp: I/O-Efficient Big Graph Analytics On A Single Commodity Machine, Peng Sun, Yonggang Wen, Nguyen Binh Duong Ta, Xiaokui Xiao

Research Collection School Of Computing and Information Systems

Recent studies showed that single-machine graph processing systems can be as highly competitive as cluster-based approaches on large-scale problems. While several out-of-core graph processing systems and computation models have been proposed, the high disk I/O overhead could significantly reduce performance in many practical cases. In this paper, we propose GraphMP to tackle big graph analytics on a single machine. GraphMP achieves low disk I/O overhead with three techniques. First, we design a vertex-centric sliding window (VSW) computation model to avoid reading and writing vertices on disk. Second, we propose a selective scheduling method to skip loading and processing unnecessary edge …


Ppmexplorer: Using Information Retrieval, Computer Vision And Transfer Learning Methods To Index And Explore Images Of Pompeii, Cindy Roullet Dec 2020

Ppmexplorer: Using Information Retrieval, Computer Vision And Transfer Learning Methods To Index And Explore Images Of Pompeii, Cindy Roullet

Graduate Theses and Dissertations

In this dissertation, we present and analyze the technology used in the making of PPMExplorer: Search, Find, and Explore Pompeii. PPMExplorer is a software tool made with data extracted from the Pompei: Pitture e Mosaic (PPM) volumes. PPM is a valuable set of volumes containing 20,000 historical annotated images of the archaeological site of Pompeii, Italy accompanied by extensive captions. We transformed the volumes from paper, to digital, to searchable. PPMExplorer enables archaeologist researchers to conduct and check hypotheses on historical findings. We present a theory that such a concept is possible by leveraging computer generated correlations between artifacts using …


Mcst : An App For Patron Awareness Of Covid-19 Safety Measures Instituted By Small Businesses, Jorge Torres Dec 2020

Mcst : An App For Patron Awareness Of Covid-19 Safety Measures Instituted By Small Businesses, Jorge Torres

Theses, Dissertations and Culminating Projects

Small businesses across America are having restrictions placed upon them due to the COVID-19 pandemic. Those fortunate enough to remain open now face the challenge of trying to generate enough revenue to stay afloat. Small businesses, with their lack of funds, have resorted to listing their safety precautions on their front door to inform patrons. However, viewing these rules would require patrons to leave their homes. Additionally, there is no consistent set of rules being enforced by the government which is dangerous as some patrons may feel that stricter procedures be in place. These inconsistencies and lack of information can …


Implementation Of An Electronic Alert For Improving Adherence To Diabetic Foot Exam Screenings In Type 2 Diabetic Patients In Primary Care Clinics, Ruby Denson Dec 2020

Implementation Of An Electronic Alert For Improving Adherence To Diabetic Foot Exam Screenings In Type 2 Diabetic Patients In Primary Care Clinics, Ruby Denson

Student Scholarly Projects

Practice Problem: Patients with type 2 diabetes mellitus (T2DM) are at an increased risk of complications including foot ulcerations (Harris-Hayes et al., 2020). Preventive care is essential for the early detection of foot ulcers but despite the advantages of preventive screening, a limited number of primary care providers perform annual foot exams (Williams et al., 2018).

PICOT: The clinical question that guided this project was, “In adult patients with T2DM receiving care in a primary care setting, will the implementation of an electronic clinical reminder alert (ECR) increase provider adherence to performing an annual diabetic foot exam and risk …


Refinements Of The Concept Of Privacy In Distributed Computing, Entisar Seedi Alshammry Dec 2020

Refinements Of The Concept Of Privacy In Distributed Computing, Entisar Seedi Alshammry

Theses and Dissertations

In light of the tremendous development of technology in the modern world in which we live, privacy concerns are increasing, especially after the massive spread of distributed computing systems and the technologies that depend on it, whether in personal devices or public services. Hence, this research proposes refinements on the concept of privacy for enhancing the development of privacy-related strategies in distributed computing systems to address the elements of privacy. In particular, the study introduces the new concept of Privacy Appetite to describe and model the nature of the relationship between the intended disclosure of private information and gained value …


Sadt: Syntax-Aware Differential Testing Of Certificate Validation In Ssl/Tls Implementations, Lili Quan, Qianyu Guo, Hongxu Chen, Xiaofei Xie, Xiaohong Li, Yang Liu, Jing Hu Dec 2020

Sadt: Syntax-Aware Differential Testing Of Certificate Validation In Ssl/Tls Implementations, Lili Quan, Qianyu Guo, Hongxu Chen, Xiaofei Xie, Xiaohong Li, Yang Liu, Jing Hu

Research Collection School Of Computing and Information Systems

The security assurance of SSL/TLS critically depends on the correct validation of X.509 certificates. Therefore, it is important to check whether a certificate is correctly validated by the SSL/TLS implementations. Although differential testing has been proven to be effective in finding semantic bugs, it still suffers from the following limitations: (1) The syntax of test cases cannot be correctly guaranteed. (2) Current test cases are not diverse enough to cover more implementation behaviours. This paper tackles these problems by introducing SADT, a novel syntax-aware differential testing framework for evaluating the certificate validation process in SSL/TLS implementations. We first propose a …


Smartfuzz: An Automated Smart Fuzzing Approach For Testing Smartthings Apps, Lwin Khin Shar, Nguyen Binh Duong Ta, Lingxiao Jiang, David Lo, Wei Minn, Kiah Yong Glenn Yeo, Eugene Kim Dec 2020

Smartfuzz: An Automated Smart Fuzzing Approach For Testing Smartthings Apps, Lwin Khin Shar, Nguyen Binh Duong Ta, Lingxiao Jiang, David Lo, Wei Minn, Kiah Yong Glenn Yeo, Eugene Kim

Research Collection School Of Computing and Information Systems

As IoT ecosystem has been fast-growing recently, there have been various security concerns of this new computing paradigm. Malicious IoT apps gaining access to IoT devices and capabilities to execute sensitive operations (sinks), e.g., controlling door locks and switches, may cause serious security and safety issues. Unlike traditional mobile/web apps, IoT apps highly interact with a wide variety of physical IoT devices and respond to environmental events, in addition to user inputs. It is therefore important to conduct comprehensive testing of IoT apps to identify possible anomalous behaviours. On the other hand, it is also important to optimize the number …


Jointly Optimizing Sensing Pipelines For Multimodal Mixed Reality Interaction, Darshana Rathnayake, Ashen De Silva, Dasun Puwakdandawa, Lakmal Meegahapola, Archan Misra, Indika Perera Dec 2020

Jointly Optimizing Sensing Pipelines For Multimodal Mixed Reality Interaction, Darshana Rathnayake, Ashen De Silva, Dasun Puwakdandawa, Lakmal Meegahapola, Archan Misra, Indika Perera

Research Collection School Of Computing and Information Systems

Natural human interactions for Mixed Reality Applications are overwhelmingly multimodal: humans communicate intent and instructions via a combination of visual, aural and gestural cues. However, supporting low-latency and accurate comprehension of such multimodal instructions (MMI), on resource-constrained wearable devices, remains an open challenge, especially as the state-of-the-art comprehension techniques for each individual modality increasingly utilize complex Deep Neural Network models. We demonstrate the possibility of overcoming the core limitation of latency--vs.--accuracy tradeoff by exploiting cross-modal dependencies -- i.e., by compensating for the inferior performance of one model with an increased accuracy of more complex model of a different modality. We …


Watch Out! Motion Is Blurring The Vision Of Your Deep Neural Networks, Qing Guo, Felix Juefei-Xu, Xiaofei Xie, Lei Ma, Jian Wang, Bing Yu, Wei Feng, Yang Liu Dec 2020

Watch Out! Motion Is Blurring The Vision Of Your Deep Neural Networks, Qing Guo, Felix Juefei-Xu, Xiaofei Xie, Lei Ma, Jian Wang, Bing Yu, Wei Feng, Yang Liu

Research Collection School Of Computing and Information Systems

The state-of-the-art deep neural networks (DNNs) are vulnerable to adversarial examples with additive random noise-like perturbations. While such examples are hardly found in the physical world, the image blurring effect caused by object motion, on the other hand, commonly occurs in practice, making the study of which greatly important especially for the widely adopted real-time image processing tasks (e.g., object detection, tracking). In this paper, we initiate the first step to comprehensively investigate the potential hazards of blur effect for DNN, caused by object motion. We propose a novel adversarial attack method that can generate visually natural motion-blurred adversarial examples, …


Extended Functionalities For Automating Comic Book Pull Files, Jackson Cunningham Dec 2020

Extended Functionalities For Automating Comic Book Pull Files, Jackson Cunningham

Theses/Capstones/Creative Projects

This Honors Thesis project involves programming additional features for a Java application developed as a team for the UNO Computer Science Capstone Project. The purpose of this Capstone project was to develop an updated Pull File system for Dragon’s Lair Comics & Games, which has been running an outdated system in need of improvement. The pull file is an organizational system used by customers to reserve new issues of specific on-going comic book series as they are released. The comic book store can use a pull file system to maintain records of customers, store inventory, and order requests, gaining important …


New Methods For Deep Learning Based Real-Valued Inter-Residue Distance Prediction, Jacob Barger Nov 2020

New Methods For Deep Learning Based Real-Valued Inter-Residue Distance Prediction, Jacob Barger

Theses

Background: Much of the recent success in protein structure prediction has been a result of accurate protein contact prediction--a binary classification problem. Dozens of methods, built from various types of machine learning and deep learning algorithms, have been published over the last two decades for predicting contacts. Recently, many groups, including Google DeepMind, have demonstrated that reformulating the problem as a multi-class classification problem is a more promising direction to pursue. As an alternative approach, we recently proposed real-valued distance predictions, formulating the problem as a regression problem. The nuances of protein 3D structures make this formulation appropriate, allowing predictions …


Actor Concurrency Bugs: A Comprehensive Study On Symptoms, Root Causes, Api Usages, And Differences, Mehdi Bagherzadeh, Nicholas Fireman, Anas Shawesh, Raffi T. Khatchadourian Nov 2020

Actor Concurrency Bugs: A Comprehensive Study On Symptoms, Root Causes, Api Usages, And Differences, Mehdi Bagherzadeh, Nicholas Fireman, Anas Shawesh, Raffi T. Khatchadourian

Publications and Research

Actor concurrency is becoming increasingly important in the development of real-world software systems. Although actor concurrency may be less susceptible to some multithreaded concurrency bugs, such as low-level data races and deadlocks, it comes with its own bugs that may be different. However, the fundamental characteristics of actor concurrency bugs, including their symptoms, root causes, API usages, examples, and differences when they come from different sources are still largely unknown. Actor software development can significantly benefit from a comprehensive qualitative and quantitative understanding of these characteristics, which is the focus of this work, to foster better API documentations, development practices, …


Perceptions, Expectations, And Challenges In Defect Prediction, Zhiyuan Wan, Xin Xia, Ahmed E. Hassan, David Lo, Jianwei Yin, Xiaohu Yang Nov 2020

Perceptions, Expectations, And Challenges In Defect Prediction, Zhiyuan Wan, Xin Xia, Ahmed E. Hassan, David Lo, Jianwei Yin, Xiaohu Yang

Research Collection School Of Computing and Information Systems

Defect prediction has been an active research area for over four decades. Despite numerous studies on defect prediction, the potential value of defect prediction in practice remains unclear. To address this issue, we performed a mixed qualitative and quantitative study to investigate what practitioners think, behave and expect in contrast to research findings when it comes to defect prediction. We collected hypotheses from open-ended interviews and a literature review, followed by a validation survey. We received 395 responses from practitioners. Some of our key findings include: 1) Over 90% of respondents are willing to adopt defect prediction techniques. 2) There …


Erica: Enabling Real-Time Mistake Detection And Corrective Feedback For Free-Weights Exercises, Meeralakshmi Radhakrishnan, Darshana Rathnayake, Koon Han Ong, Inseok Hwang, Archan Misra Nov 2020

Erica: Enabling Real-Time Mistake Detection And Corrective Feedback For Free-Weights Exercises, Meeralakshmi Radhakrishnan, Darshana Rathnayake, Koon Han Ong, Inseok Hwang, Archan Misra

Research Collection School Of Computing and Information Systems

We present ERICA, a digital personal trainer for users performing free weights exercises, with two key differentiators: (a) First, unlike prior approaches that either require multiple on-body wearables or specialized infrastructural sensing, ERICA uses a single in-ear "earable" device (piggybacking on a form factor routinely used by millions of gym-goers) and a simple inertial sensor mounted on each weight equipment; (b) Second, unlike prior work that focuses primarily on quantifying a workout, ERICA additionally identifies a variety of fine-grained exercising mistakes and delivers real-time, in-situ corrective instructions. To achieve this, we (a) design a robust approach for user-equipment association that …


Reducing Estimation Bias Via Triplet-Average Deep Deterministic Policy Gradient, Dongming Wu, Xingping Dong, Jianbing Shen, Steven C. H. Hoi Nov 2020

Reducing Estimation Bias Via Triplet-Average Deep Deterministic Policy Gradient, Dongming Wu, Xingping Dong, Jianbing Shen, Steven C. H. Hoi

Research Collection School Of Computing and Information Systems

The overestimation caused by function approximation is a well-known property in Q-learning algorithms, especially in single-critic models, which leads to poor performance in practical tasks. However, the opposite property, underestimation, which often occurs in Q-learning methods with double critics, has been largely left untouched. In this article, we investigate the underestimation phenomenon in the recent twin delay deep deterministic actor-critic algorithm and theoretically demonstrate its existence. We also observe that this underestimation bias does indeed hurt performance in various experiments. Considering the opposite properties of single-critic and double-critic methods, we propose a novel triplet-average deep deterministic policy gradient algorithm that …