Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 11 of 11

Full-Text Articles in Physical Sciences and Mathematics

On The Exactitude Of Big Data: La Bêtise And Artificial Intelligence, Noel Fitzpatrick, John D. Kelleher Dec 2018

On The Exactitude Of Big Data: La Bêtise And Artificial Intelligence, Noel Fitzpatrick, John D. Kelleher

Articles

This article revisits the question of ‘la bêtise’ or stupidity in the era of Artificial Intelligence driven by Big Data, it extends on the questions posed by Gille Deleuze and more recently by Bernard Stiegler. However, the framework for revisiting the question of la bêtise will be through the lens of contemporary computer science, in particular the development of data science as a mode of analysis, sometimes, misinterpreted as a mode of intelligence. In particular, this article will argue that with the advent of forms of hype (sometimes referred to as the hype cycle) in relation to big data and …


Exchanging Personal Health Data With Electronic Health Records: A Standardized Information Model For Patient Generated Health Data And Observations Of Daily Living, Panagiotis Plastiras, Dympna O'Sullivan Nov 2018

Exchanging Personal Health Data With Electronic Health Records: A Standardized Information Model For Patient Generated Health Data And Observations Of Daily Living, Panagiotis Plastiras, Dympna O'Sullivan

Articles

Objective: The development of a middleware information model to facilitate better interoperability between Personal and Electronic Health Record systems in order to allow exchange of Patient Generated Health Data and Observations of Daily Leaving between patients and providers in order to encourage patient self-management.

Materials and methods: An information model based on HL7 standards for interoperability has been extended to support PGHD and ODL data types. The new information models uses HL7 CDA to represent data, is instantiated as a Protégé ontology and uses a set of mapping rules to transfer data between Personal and Electronic Health Record …


Ideating Mobile Health Behavioral Support For Compliance To Therapy For Patients With Chronic Disease: A Case Study Of Atrial Fibrillation Management, Mor Peleg, Wojtek Michalowski, Szymon Wilk, Enea Parimbelli, Silvia Bonaccio, Dympna O'Sullivan, Martin Michalowski, Silvana Quaglini, Marc Carrier Oct 2018

Ideating Mobile Health Behavioral Support For Compliance To Therapy For Patients With Chronic Disease: A Case Study Of Atrial Fibrillation Management, Mor Peleg, Wojtek Michalowski, Szymon Wilk, Enea Parimbelli, Silvia Bonaccio, Dympna O'Sullivan, Martin Michalowski, Silvana Quaglini, Marc Carrier

Articles

Poor patient compliance to therapy results in a worsening condition that often increases healthcare costs. In the MobiGuide project, we developed an evidence-based clinical decision-support system that delivered personalized reminders and recommendations to patients, helping to achieve higher therapy compliance. Yet compliance could still be improved and therefore building on the MobiGuide project experience, we designed a new component called the Motivational Patient Assistant (MPA) that is integrated within the MobiGuide architecture to further improve compliance. This component draws from psychological theories to provide behavioral support to improve patient engagement and thereby increasing patients' compliance. Behavior modification interventions are delivered …


Performance Comparison Of Support Vector Machine, Random Forest, And Extreme Learning Machine For Intrusion Detection, Iftikhar Ahmad, Muhammad Javed Iqbal, Mohammad Basheri, Aneel Rahim Jul 2018

Performance Comparison Of Support Vector Machine, Random Forest, And Extreme Learning Machine For Intrusion Detection, Iftikhar Ahmad, Muhammad Javed Iqbal, Mohammad Basheri, Aneel Rahim

Articles

Intrusion detection is a fundamental part of security tools, such as adaptive security appliances, intrusion detection systems, intrusion prevention systems, and firewalls. Various intrusion detection techniques are used, but their performance is an issue. Intrusion detection performance depends on accuracy, which needs to improve to decrease false alarms and to increase the detection rate. To resolve concerns on performance, multilayer perceptron, support vector machine (SVM), and other techniques have been used in recent work. Such techniques indicate limitations and are not efficient for use in large data sets, such as system and network data. The intrusion detection system is used …


Hollow Core Fiber Based Interferometer For High Temperature (1000 °C) Measurement, Dejun Liu, Qiang Wu, Chao Mei, Jinhui Yuan, Xiangjun Xin, Arun Mallik, Fangfang Wei, Wei Han, Rahul Kumar, Chongxiu Yu, Shengpeng Wan, Xingdao He, Bo Liu, Gang-Ding Peng, Yuliya Semenova, Gerald Farrell Jan 2018

Hollow Core Fiber Based Interferometer For High Temperature (1000 °C) Measurement, Dejun Liu, Qiang Wu, Chao Mei, Jinhui Yuan, Xiangjun Xin, Arun Mallik, Fangfang Wei, Wei Han, Rahul Kumar, Chongxiu Yu, Shengpeng Wan, Xingdao He, Bo Liu, Gang-Ding Peng, Yuliya Semenova, Gerald Farrell

Articles

A simple, cost effective high temperature sensor (up to 1000 °C) based on a hollow core fiber (HCF) structure is reported. It is configured by fusion splicing a short section of HCF with a length of few millimeters between two standard single mode fibers (SMF-28). Due to multiple beam interference introduced by the cladding of the HCF, periodic transmission dips with high spectral extinction ratio and high quality (Q) factor are excited. However, theoretical analysis shows that minor variations of the HCF cladding diameter may result in a significant decrease in the Q factor. Experimental results demonstrate that the position …


Programming: Predicting Student Success Early In Cs1. A Re-Validation And Replication Study, Keith Quille, Susan Bergin Jan 2018

Programming: Predicting Student Success Early In Cs1. A Re-Validation And Replication Study, Keith Quille, Susan Bergin

Articles

This paper describes a large, multi-institutional revalidation study conducted in the academic year 2015-16. Six hundred and ninetytwo students participated in this study, from 11 institutions (ten institutions in Ireland and one in Denmark). The primary goal was to validate and further develop an existing computational prediction model called Predict Student Success (PreSS). In doing so, this study addressed a call from the 2015 ITiCSE working group (the second "Grand Challenge"), to "systematically analyse and verify previous studies using data from multiple contexts to tease out tacit factors that contribute to previously observed outcomes". PreSS was developed and validated in …


Survivability Strategies For Emerging Wireless Networks With Data Mining Techniques: A Case Study With Netlogo And Rapidminer, Ivan Garcia-Magarino, Geraldine Gray, Raquel Lacuesta, Jaime Lloret Jan 2018

Survivability Strategies For Emerging Wireless Networks With Data Mining Techniques: A Case Study With Netlogo And Rapidminer, Ivan Garcia-Magarino, Geraldine Gray, Raquel Lacuesta, Jaime Lloret

Articles

Emerging wireless networks have brought Internet and communications to more users and areas. Some of the most relevant emerging wireless technologies are Worldwide Interoperability for Microwave Access, Long-Term Evolution Advanced, and ad hoc and mesh networks. An open challenge is to ensure the reliability and robustness of these networks when individual components fail. The survivability and performance of these networks can be especially relevant when emergencies arise in rural areas, for example supporting communications during a medical emergency. This can be done by anticipating failures and finding alternative solutions. This paper proposes using big data analytics techniques, such as decision …


Towards Dynamic Interaction-Based Reputation Models, Almas Melnikov, Manuel Mazzara, Victor Rivera, Jooyoung Lee, Luca Longo Jan 2018

Towards Dynamic Interaction-Based Reputation Models, Almas Melnikov, Manuel Mazzara, Victor Rivera, Jooyoung Lee, Luca Longo

Articles

In this paper, we investigate how dynamic properties of reputation can influence the quality of users’ ranking. Reputation systems should be based on rules that can guarantee high level of trust and help identify unreliable units. To understand the effectiveness of dynamic properties in the evaluation of reputation, we propose our own model (DIB-RM) that utilizes three factors: forgetting, cumulative, and activity period. In order to evaluate the model, we use data from StackOverflow which also has its own reputation model. We estimate similarity of ratings between DIB-RM and the StackOverflow reputation model to test our hypothesis. We use two …


Pseudorehearsal In Actor-Critic Agents With Neural Network Function Approximation, Vladimir Marochko, Leonard Johard, Manuel Mazzara, Luca Longo Jan 2018

Pseudorehearsal In Actor-Critic Agents With Neural Network Function Approximation, Vladimir Marochko, Leonard Johard, Manuel Mazzara, Luca Longo

Articles

Catastrophic forgetting has a significant negative impact in reinforcement learning. The purpose of this study is to investigate how pseudorehearsal can change performance of an actor-critic agent with neural-network function approximation. We tested agent in a pole balancing task and compared different pseudorehearsal approaches. We have found that pseudorehearsal can assist learning and decrease forgetting.


A Wikipedia Powered State-Based Approach To Automatic Search Query Enhancement, Kyle Goslin, Markus Hofmann Jan 2018

A Wikipedia Powered State-Based Approach To Automatic Search Query Enhancement, Kyle Goslin, Markus Hofmann

Articles

This paper describes the development and testing of a novel Automatic Search Query Enhancement (ASQE) algorithm, the Wikipedia N Sub-state Algorithm (WNSSA), which utilises Wikipedia as the sole data source for prior knowledge. This algorithm is built upon the concept of iterative states and sub-states, harnessing the power of Wikipedia's data set and link information to identify and utilise reoccurring terms to aid term selection and weighting during enhancement. This algorithm is designed to prevent query drift by making callbacks to the user's original search intent by persisting the original query between internal states with additional selected enhancement terms. The …


Three Decades Of Universal Design - Defining Moments, Margaret Kinsella Jan 2018

Three Decades Of Universal Design - Defining Moments, Margaret Kinsella

Articles

This paper contributes to the growing research on incorporating Universal Design in the Higher Education landscape by presenting a Practitioner's Perspective on Universal Design as delivered in the Institute of Technology, Blanchardstown (ITB) in the first year of a creative digital media degree as part of the first year experience. This first year experience is a transition time for many students and has many complexities; while being an exciting and fulfilling time, the transition can also be challenging and isolating. Through Universal Design, the aim is to enable students to 'Get connected' and 'Stay connected'. Universal Design for Learning is …