Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Series

2014

Computer Sciences

Institution
Keyword
Publication
File Type

Articles 1 - 30 of 960

Full-Text Articles in Physical Sciences and Mathematics

Drip - Data Rich, Information Poor: A Concise Synopsis Of Data Mining, Muhammad Obeidat, Max North, Lloyd Burgess, Sarah North Dec 2014

Drip - Data Rich, Information Poor: A Concise Synopsis Of Data Mining, Muhammad Obeidat, Max North, Lloyd Burgess, Sarah North

Faculty and Research Publications

As production of data is exponentially growing with a drastically lower cost, the importance of data mining required to extract and discover valuable information is becoming more paramount. To be functional in any business or industry, data must be capable of supporting sound decision-making and plausible prediction. The purpose of this paper is concisely but broadly to provide a synopsis of the technology and theory of data mining, providing an enhanced comprehension of the methods by which massive data can be transferred into meaningful information.


Dynamics Of Propagation Of Premature Impulses In Structurally Remodeled Infarcted Myocardium: A Computational Analysis, Candido Cabo Dec 2014

Dynamics Of Propagation Of Premature Impulses In Structurally Remodeled Infarcted Myocardium: A Computational Analysis, Candido Cabo

Publications and Research

Initiation of cardiac arrhythmias typically follows one or more premature impulses either occurring spontaneously or applied externally. In this study, we characterize the dynamics of propagation of single (S2) and double premature impulses (S3), and the mechanisms of block of premature impulses at structural heterogeneities caused by remodeling of gap junctional conductance (Gj) in infarcted myocardium. Using a sub-cellular computer model of infarcted tissue, we found that |INa,max|, prematurity (coupling interval with the previous impulse), and conduction velocity (CV) of premature impulses change dynamically as they propagate away from the site of initiation. There are fundamental differences between the dynamics …


Kaczmarz Iterative Projection And Nonuniform Sampling With Complexity Estimates, Tim Wallace, Ali Safak Sekmen Dec 2014

Kaczmarz Iterative Projection And Nonuniform Sampling With Complexity Estimates, Tim Wallace, Ali Safak Sekmen

Computer Science Faculty Research

Kaczmarz’s alternating projection method has been widely used for solving mostly over-determined linear system of equations Ax = b in various fields of engineering, medical imaging, and computational science. Because of its simple iterative nature with light computation, this method was successfully applied in computerized tomography. Since tomography generates a matrix A with highly coherent rows, randomized Kaczmarz algorithm is expected to provide faster convergence as it picks a row for each iteration at random, based on a certain probability distribution. Since Kaczmarz’s method is a subspace projection method, the convergence rate for simple Kaczmarz algorithm was developed in …


Online Learning On Incremental Distance Metric For Person Re-Identification, Yuke Sun, Hong Liu, Qianru Sun Dec 2014

Online Learning On Incremental Distance Metric For Person Re-Identification, Yuke Sun, Hong Liu, Qianru Sun

Research Collection School Of Computing and Information Systems

Person re-identification is to match persons appearing across non-overlapping cameras. The matching is challenging due to visual ambiguities and disparities of human bodies. Most previous distance metrics are learned by off-line and supervised approaches. However, they are not practical in real-world applications in which online data comes in without any label. In this paper, a novel online learning approach on incremental distance metric, OL-IDM, is proposed. The approach firstly modifies Self-Organizing Incremental Neural Network (SOINN) using Mahalanobis distance metric to cluster incoming data into neural nodes. Such metric maximizes the likelihood of a true image pair matches with a smaller …


Human Action Classification Based On Sequential Bag-Of-Words Model, Hong Liu, Qiaoduo Zhang, Qianru Sun Dec 2014

Human Action Classification Based On Sequential Bag-Of-Words Model, Hong Liu, Qiaoduo Zhang, Qianru Sun

Research Collection School Of Computing and Information Systems

Recently, approaches utilizing spatial-temporal features have achieved great success in human action classification. However, they typically rely on bag-of-words (BoWs) model, and ignore the spatial and temporal structure information of visual words, bringing ambiguities among similar actions. In this paper, we present a novel approach called sequential BoWs for efficient human action classification. It captures temporal sequential structure by segmenting the entire action into sub-actions. Each sub-action has a tiny movement within a narrow range of action. Then the sequential BoWs are created, in which each sub-action is assigned with a certain weight and salience to highlight the distinguishing sections. …


Data Visualization For Network Simulations, Luiz Felipe Perrone, Greg L. Shrock, Christopher S. Main Dec 2014

Data Visualization For Network Simulations, Luiz Felipe Perrone, Greg L. Shrock, Christopher S. Main

Faculty Journal Articles

As many other kinds of simulation experiments, simulations of computer networks tend to generate high volumes of output data. While the collection and the statistical processing of these data are challenges in and of themselves, creating meaningful visualizations from them is as much an art as it is a science. A sophisticated body of knowledge in information design and data visualization has been developed and continues to evolve. However, many of the visualizations created by the network simulation community tend to be less than optimal at creating compelling, informative narratives from experimental output data. The primary contribution of this paper …


Perspectives On Languages For Specifying Simulation Experiments, Luiz Felipe Perrone, Johannes Schützel, Danhua Peng, Adelinde Urhmacher Dec 2014

Perspectives On Languages For Specifying Simulation Experiments, Luiz Felipe Perrone, Johannes Schützel, Danhua Peng, Adelinde Urhmacher

Faculty Journal Articles

While domain specific languages are well established for describing the system of interest in modeling and simulation, the last years have seen increasingly domain specific languages also exploited for specifying experiments. This development, whose application areas range from computational biology to network simulation, is motivated by the desire to facilitate the reproducibility of simulation results. Thereby, the experimentation process is treated as a first class object of simulation studies. As the experimentation process contains different tasks such as configuration, observation, analysis, and evaluation, domain-specific languages can be exploited to specify experiments as well as individual sub-tasks or even the goal …


College Of Engineering Senior Design Competition Fall 2014, University Of Nevada, Las Vegas Dec 2014

College Of Engineering Senior Design Competition Fall 2014, University Of Nevada, Las Vegas

Fred and Harriet Cox Senior Design Competition Projects

Part of every UNLV engineering student’s academic experience, the senior design project stimulates engineering innovation and entrepreneurship. Each student in their senior year chooses, plans, designs, and prototypes a product in this required element of the curriculum. A capstone to the student’s educational career, the senior design project encourages the student to use everything learned in the engineering program to create a practical, real world solution to an engineering challenge. The senior design competition helps focus the senior students in increasing the quality and potential for commercial application for their design projects. Judges from local industry evaluate the projects on …


The Potentials And Challenges Of Big Data In Public Health, Rena N. Vithiatharan Dec 2014

The Potentials And Challenges Of Big Data In Public Health, Rena N. Vithiatharan

Australian eHealth Informatics and Security Conference

The potential to use big data sources for public health increases with the broadening availability of data and improved methods of analysis. Whilst there are some well-known examples of the opportunistic use of big data, such as GoogleFlu, public health has not yet realised the full potential of such data sources. A literature review was undertaken to identify the potential of such data collections to impact public health, and to identify what challenges are currently limiting this potential. The potential include improved real-time analysis, research and development and genome studies. However, challenges listed are poor universal standardisation and classification, privacy …


Byod In Ehealth: Herding Cats And Stable Doors, Or A Catastrophe Waiting To Happen?, Krishnun Sansurooh, Patricia A H Williams Dec 2014

Byod In Ehealth: Herding Cats And Stable Doors, Or A Catastrophe Waiting To Happen?, Krishnun Sansurooh, Patricia A H Williams

Australian eHealth Informatics and Security Conference

The use of personal devices in the work environment has crossed the boundaries of work and socially related tasks. With cyber criminals seriously targeting healthcare for medical identity theft, the lack of control of new technologies within healthcare networks becomes an increasing vulnerability. The prolific adoption of personal mobile devices in the healthcare environment requires a proactive approach to the management of Bring Your Own Device (BYOD). This paper analysed the current state of the problem and the challenges that this creates in an environment that has stringent privacy and security requirements. The discourse demonstrates that the issue is not …


3rd Australian Ehealth Informatics And Security Conference, 2014, Edith Cowan University: Conference Details, Security Research Institute, Edith Cowan University Dec 2014

3rd Australian Ehealth Informatics And Security Conference, 2014, Edith Cowan University: Conference Details, Security Research Institute, Edith Cowan University

Australian eHealth Informatics and Security Conference

No abstract provided.


Customising Doctor-Nurse Communications, Brian Cusack, Dave Parry Dec 2014

Customising Doctor-Nurse Communications, Brian Cusack, Dave Parry

Australian eHealth Informatics and Security Conference

Doctor-Nurse communications are critical for patient safety and workflow effectiveness. Our research question was: What further improvements can be made to current communication systems? A variety of mobile and land based communication systems have been used and experimented with. In the study, the pager was found to be most common and more recent attempts to provide broadband capability with systems such as the iBeep. We built an alternative information system using Android phones and a software application that was customised by feedback from the medical professionals. The trial in five wards with 22 doctors and 170 nurses over one month …


Managing Wireless Security Risks In Medical Services, Brian Cusack, Akar Kyaw Dec 2014

Managing Wireless Security Risks In Medical Services, Brian Cusack, Akar Kyaw

Australian eHealth Informatics and Security Conference

Medical systems are designed for a range of end users from different professional skill groups and people who carry the devices in and on their bodies. Open, accurate, and efficient communication is the priority for medical systems and consequently strong protection costs are traded against the utility benefits for open systems. In this paper we assess the vulnerabilities created by the professional and end user expectations, and theorise ways to mitigate wireless security vulnerabilities. The benefits of wireless medical services are great in terms of efficiencies, mobility, and information management. These benefits may be realised by treating the vulnerabilities and …


Security Of Electronic Health Records In A Resource Limited Setting: The Case Of Smart-Care Electronic Health Record In Zambia, Keith Mweebo Dec 2014

Security Of Electronic Health Records In A Resource Limited Setting: The Case Of Smart-Care Electronic Health Record In Zambia, Keith Mweebo

Australian eHealth Informatics and Security Conference

This paper presents a case study of security issues related to the operationalization of smart-care, an electronic medical record (EMR) used to manage Human Immunodeficiency Virus (HIV) health information in Zambia. The aim of the smart-care program is to link up services and improve access to health information, by providing a reliable way to collect, store, retrieve and analyse health data in a secure way. As health professionals gain improved access to patient health information electronically, there is need to ensure this information is secured, and that patient privacy and confidentiality is maintained. During the initial stages of the program …


Avoiding Epic Fails: Software And Standards Directions To Increase Clinical Safety, Patricia A H Williams, Vincent B. Mccauley Dec 2014

Avoiding Epic Fails: Software And Standards Directions To Increase Clinical Safety, Patricia A H Williams, Vincent B. Mccauley

Australian eHealth Informatics and Security Conference

No abstract provided.


Big Data In Healthcare: What Is It Used For?, Rebecca Hermon, Patricia A H Williams Dec 2014

Big Data In Healthcare: What Is It Used For?, Rebecca Hermon, Patricia A H Williams

Australian eHealth Informatics and Security Conference

Big data analytics is a growth area with the potential to provide useful insight in healthcare. Whilst many dimensions of big data still present issues in its use and adoption, such as managing the volume, variety, velocity, veracity, and value, the accuracy, integrity, and semantic interpretation are of greater concern in clinical application. However, such challenges have not deterred the use and exploration of big data as an evidence source in healthcare. This drives the need to investigate healthcare information to control and reduce the burgeoning cost of healthcare, as well as to seek evidence to improve patient outcomes. Whilst …


Fresh: Fair And Efficient Slot Configuration And Scheduling For Hadoop Clusters, Jiayin Wang, Yi Yao, Ying Mao, Bo Sheng, Ningfang Mi Dec 2014

Fresh: Fair And Efficient Slot Configuration And Scheduling For Hadoop Clusters, Jiayin Wang, Yi Yao, Ying Mao, Bo Sheng, Ningfang Mi

Department of Computer Science Faculty Scholarship and Creative Works

Hadoop is an emerging framework for parallel big data processing. While becoming popular, Hadoop is too complex for regular users to fully understand all the system parameters and tune them appropriately. Especially when processing a batch of jobs, default Hadoop setting may cause inefficient resource utilization and unnecessarily prolong the execution time. This paper considers an extremely important setting of slot configuration which by default is fixed and static. We proposed an enhanced Hadoop system called FRESH which can derive the best slot setting, dynamically configure slots, and appropriately assign tasks to the available slots. The experimental results show that …


A Partner-Matching Framework For Social Activity Communities, Chunyu Ai, Wei Zhong, Mingyuan Yan, Feng Gu Dec 2014

A Partner-Matching Framework For Social Activity Communities, Chunyu Ai, Wei Zhong, Mingyuan Yan, Feng Gu

Publications and Research

A lot of daily activities require more than one person to participate and collaborate with each other; however, for many people, it is not easy to find good partners to engage in activities with one another. With the rapid growth of social network applications, more and more people get used to creating connections with people on the social network. Therefore, designing social network framework for partner-matching is significant in helping people to easily find good partners. In this paper, we proposed a framework which can match partners for an active community. In order to improve the matching performance, all users …


Vehicle Base Station, Emad William Saad, John L. Vian, Matthew A. Vavrina, Jared A. Nisbett, Donald C. Wunsch Dec 2014

Vehicle Base Station, Emad William Saad, John L. Vian, Matthew A. Vavrina, Jared A. Nisbett, Donald C. Wunsch

Electrical and Computer Engineering Faculty Research & Creative Works

A system to load and unload material from a vehicle comprises a vehicle base station and an assembly to autonomously load and unload material from the vehicle.


Facilitating Natural Conversational Agent Interactions: Lessons From A Deception Experiment, Ryan M. Schuetzler, Mark Grimes, Justin Scott Giboney, Joesph Buckman Dec 2014

Facilitating Natural Conversational Agent Interactions: Lessons From A Deception Experiment, Ryan M. Schuetzler, Mark Grimes, Justin Scott Giboney, Joesph Buckman

Information Systems and Quantitative Analysis Faculty Proceedings & Presentations

This study reports the results of a laboratory experiment exploring interactions between humans and a conversational agent. Using the ChatScript language, we created a chat bot that asked participants to describe a series of images. The two objectives of this study were (1) to analyze the impact of dynamic responses on participants’ perceptions of the conversational agent, and (2) to explore behavioral changes in interactions with the chat bot (i.e. response latency and pauses) when participants engaged in deception. We discovered that a chat bot that provides adaptive responses based on the participant’s input dramatically increases the perceived humanness and …


Security Issues In Data Warehouse, Saiqa Aleem, Luiz Fernando Capretz, Faheem Ahmed Dr. Dec 2014

Security Issues In Data Warehouse, Saiqa Aleem, Luiz Fernando Capretz, Faheem Ahmed Dr.

Electrical and Computer Engineering Publications

Data Warehouse (DWH) provides storage for huge amounts of historical data from heterogeneous operational sources in the form of multidimensional views, thus supplying sensitive and useful information which help decision-makers to improve the organization’s business processes. A data warehouse environment must ensure that data collected and stored in one big repository are not vulnerable. A review of security approaches specifically for data warehouse environment and issues concerning each type of security approach have been provided in this paper.


Promoting Functions To Type Families In Haskell, Richard A. Eisenberg, Jan Stolarek Dec 2014

Promoting Functions To Type Families In Haskell, Richard A. Eisenberg, Jan Stolarek

Computer Science Faculty Research and Scholarship

Haskell, as implemented in the Glasgow Haskell Compiler (GHC), is enriched with many extensions that support type-level programming, such as promoted datatypes, kind polymorphism, and type families. Yet, the expressiveness of the type-level language remains limited. It is missing many features present at the term level, including case expressions, anonymous functions, partially-applied functions, and letexpressions. In this paper, we present an algorithm - with a proof of correctness - to encode these term-level constructs at the type level. Our approach is automated and capable of promoting a wide array of functions to type families. We also highlight and discuss …


Information-Theoretic Limits For Density Estimation, James Brofos Dec 2014

Information-Theoretic Limits For Density Estimation, James Brofos

Computer Science Technical Reports

This paper is concerned with the information-theoretical limits of density estimation for Gaussian random variables with data drawn independently and with identical distributions. We apply Fano's inequality to the space of densities and an arbitrary estimator. We derive necessary conditions on the sample size for reliable density recovery and for reliable density estimation. These conditions are true simultaneously for both finitely and infinitely dimensional density spaces.


Flow Dynamics Of Byrd Glacier, East Antarctica, C. J. Van Der Veen, L. A. Stearns, Jesse Johnson, B. Csatho Dec 2014

Flow Dynamics Of Byrd Glacier, East Antarctica, C. J. Van Der Veen, L. A. Stearns, Jesse Johnson, B. Csatho

Computer Science Faculty Publications

Force-balance calculations on Byrd Glacier, East Antarctica, reveal large spatial variations in the along-flow component of driving stress with corresponding sticky spots that are stationary over time. On the large scale, flow resistance is partitioned between basal (�80%) and lateral (�20%) drag. Ice flow is due mostly to basal sliding and concentrated vertical shear in the basal ice layers, indicating the bed is at or close to the pressure-melting temperature. There is a significant component of driving stress in the across-flow direction resulting in nonzero basal drag in that direction. This is an unrealistic result and we propose that there …


A Function-To-Task Process Model For Adaptive Automation System Design, Jason M. Bindewald, Michael E. Miller, Gilbert L. Peterson Dec 2014

A Function-To-Task Process Model For Adaptive Automation System Design, Jason M. Bindewald, Michael E. Miller, Gilbert L. Peterson

Faculty Publications

Adaptive automation systems allow the user to complete a task seamlessly with a computer performing tasks at which the human operator struggles. Unlike traditional systems that allocate functions to either the human or the machine, adaptive automation varies the allocation of functions during system operation. Creating these systems requires designers to consider issues not present during static system development. To assist in adaptive automation system design, this paper presents the concept of inherent tasks and takes advantage of this concept to create the function-to-task design process model. This process model helps the designer determine how to allocate functions to the …


Modeling The Evolution Of Generativity And The Emergence Of Digital Ecosystems, C. Jason Woodard, Eric K. Clemons Dec 2014

Modeling The Evolution Of Generativity And The Emergence Of Digital Ecosystems, C. Jason Woodard, Eric K. Clemons

Research Collection School Of Computing and Information Systems

Recent literature on sociotechnical systems has employed the concept of generativity to explain the remarkable capacity for digital artifacts to support decentralized innovation and the emergence of rich business ecosystems. In this paper, we propose agent-based computational modeling as a tool for studying the evolution of generativity, and offer a set of building blocks for constructing agent-based models in which generativity evolves. We describe a series of models that we have created using these building blocks, and summarize the results of our computational experiments to date. We find in several different settings that key features of generative systems can themselves …


Cardioguard: A Brassiere-Based Reliable Ecg Monitoring Sensor System For Supporting Daily Smartphone Healthcare Applications, Sungjun Kwon, Jeehoon Kim, Seungwoo Kang, Youngki Lee, Hyunjae Baek, Kwangsuk Park Dec 2014

Cardioguard: A Brassiere-Based Reliable Ecg Monitoring Sensor System For Supporting Daily Smartphone Healthcare Applications, Sungjun Kwon, Jeehoon Kim, Seungwoo Kang, Youngki Lee, Hyunjae Baek, Kwangsuk Park

Research Collection School Of Computing and Information Systems

We propose CardioGuard, a brassiere-based reliable electrocardiogram (ECG) monitoring sensor system, for supporting daily smartphone healthcare applications. It is designed to satisfy two key requirements for user-unobtrusive daily ECG monitoring: reliability of ECG sensing and usability of the sensor. The system is validated through extensive evaluations. The evaluation results showed that the CardioGuard sensor reliably measure the ECG during 12 representative daily activities including diverse movement levels; 89.53% of QRS peaks were detected on average. The questionnaire-based user study with 15 participants showed that the CardioGuard sensor was comfortable and unobtrusive. Additionally, the signal-to-noise ratio test and the washing durability …


A Metrics Suite Of Cloud Computing Adoption Readiness, Robert J. Kauffman, Dan Ma, Martin Yu Dec 2014

A Metrics Suite Of Cloud Computing Adoption Readiness, Robert J. Kauffman, Dan Ma, Martin Yu

Research Collection School Of Computing and Information Systems

Recent research on cloud computing adoption indicates that there has been a lack of deep understanding of its benefits by managers and organizations. This has been an obstacle for adoption. We report on an initial design for a firm-level cloud computing readiness metrics suite. We propose categories and measures to form a set of metrics to measure adoption readiness and assess the required adjustments in strategy and management, technology and operations, and business policies. We reviewed the relevant interdisciplinary literature and interviewed industry professionals to ground our metrics based on theory and practice knowledge. We identified four relevant categories for …


Mydeal: A Mobile Shopping Assistant Matching User Preferences To Promotions, Kartik Muralidharan, Swapna Gottipati, Jing Jiang, Narayan Ramasubbu, Rajesh Krishna Balan Dec 2014

Mydeal: A Mobile Shopping Assistant Matching User Preferences To Promotions, Kartik Muralidharan, Swapna Gottipati, Jing Jiang, Narayan Ramasubbu, Rajesh Krishna Balan

Research Collection School Of Computing and Information Systems

A common problem in large urban cities is the huge number of retail options available. In response, a number of shopping assistance applications have been created for mobile phones. However, these applications mostly allow users to know where stores are or find promotions on specific items. What is missing is a system that factors in a user's shopping preferences and automatically tells them which stores are of their interest. The key challenge in this system is twofold; 1) building a matching algorithm that can combine user preferences with fairly unstructured deals and store information to generate a final rank ordered …


Android Or Ios For Better Privacy Protection?, Jin Han, Qiang Yan, Debin Gao, Jianying Zhou, Huijie Robert Deng Dec 2014

Android Or Ios For Better Privacy Protection?, Jin Han, Qiang Yan, Debin Gao, Jianying Zhou, Huijie Robert Deng

Research Collection School Of Computing and Information Systems

With the rapid growth of the mobile market, security of mobile platforms is receiving increasing attention from both research community as well as the public. In this paper, we make the first attempt to establish a baseline for security comparison between the two most popular mobile platforms. We investigate applications that run on both Android and iOS and examine the difference in the usage of their security sensitive APIs (SS-APIs). Our analysis over 2,600 applications shows that iOS applications consistently access more SS-APIs than their counterparts on Android. The additional privileges gained on iOS are often associated with accessing private …