Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- 3D Human Body Reconstruction (1)
- 3D Reconstruction (1)
- Ab initio calculations (1)
- Ablation (1)
- Algorithm (1)
-
- Amazon AWS (1)
- Answer Set Program (1)
- Applications (1)
- Atmospheric entry (1)
- Band gap (1)
- Band structure (1)
- Bezier Crust (1)
- Big Data (1)
- BlendSCAPE (1)
- Capsule (1)
- Catmull-Clark (1)
- Charring Ablator (1)
- Cloud computing (1)
- Collaborative filtering (1)
- Computer security (1)
- Consistency Checking (1)
- Cybersecurity (1)
- Data Mining (1)
- Data mining (1)
- Data update (1)
- Doping (1)
- Education (1)
- Faces (1)
- Facial attributes (1)
- Gaussian Mixture Model (1)
- Publication
- Publication Type
Articles 1 - 14 of 14
Full-Text Articles in Physical Sciences and Mathematics
Smart Sensing And Mobile Computing, Guihai Chen, Dakshnamoorthy Manivannan, Chen Qian, Fangming Liu, Jinsong Han
Smart Sensing And Mobile Computing, Guihai Chen, Dakshnamoorthy Manivannan, Chen Qian, Fangming Liu, Jinsong Han
Computer Science Faculty Publications
No abstract provided.
Large-Scale Geo-Facial Image Analysis, Mohammed T. Islam, Connor Greenwell, Richard Souvenir, Nathan Jacobs
Large-Scale Geo-Facial Image Analysis, Mohammed T. Islam, Connor Greenwell, Richard Souvenir, Nathan Jacobs
Computer Science Faculty Publications
While face analysis from images is a well-studied area, little work has explored the dependence of facial appearance on the geographic location from which the image was captured. To fill this gap, we constructed GeoFaces, a large dataset of geotagged face images, and used it to examine the geo-dependence of facial features and attributes, such as ethnicity, gender, or the presence of facial hair. Our analysis illuminates the relationship between raw facial appearance, facial attributes, and geographic location, both globally and in selected major urban areas. Some of our experiments, and the resulting visualizations, confirm prior expectations, such as the …
Teaching Cybersecurity Using The Cloud, Khaled Salah, Mohammad Hammoud, Sherali Zeadally
Teaching Cybersecurity Using The Cloud, Khaled Salah, Mohammad Hammoud, Sherali Zeadally
Information Science Faculty Publications
Cloud computing platforms can be highly attractive to conduct course assignments and empower students with valuable and indispensable hands-on experience. In particular, the cloud can offer teaching staff and students (whether local or remote) on-demand, elastic, dedicated, isolated, (virtually) unlimited, and easily configurable virtual machines. As such, employing cloud-based laboratories can have clear advantages over using classical ones, which impose major hindrances against fulfilling pedagogical objectives and do not scale well when the number of students and distant university campuses grows up. We show how the cloud paradigm can be leveraged to teach a cybersecurity course. Specifically, we share our …
Band Gap Engineering Via Doping: A Predictive Approach, Antonis N. Andriotis, Madhu Menon
Band Gap Engineering Via Doping: A Predictive Approach, Antonis N. Andriotis, Madhu Menon
Center for Computational Sciences Faculty Publications
We employ an extension of Harrison's theory at the tight binding level of approximation to develop a predictive approach for band gap engineering involving isovalent doping of wide band gap semiconductors. Our results indicate that reasonably accurate predictions can be achieved at qualitative as well as quantitative levels. The predictive results were checked against ab initio ones obtained at the level of DFT/SGGA + U approximation. The minor disagreements between predicted and ab initio results can be attributed to the electronic processes not incorporated in Harrison's theory. These include processes such as the conduction band anticrossing [Shan et al., …
Novel Computational Methods For Transcript Reconstruction And Quantification Using Rna-Seq Data, Yan Huang
Novel Computational Methods For Transcript Reconstruction And Quantification Using Rna-Seq Data, Yan Huang
Theses and Dissertations--Computer Science
The advent of RNA-seq technologies provides an unprecedented opportunity to precisely profile the mRNA transcriptome of a specific cell population. It helps reveal the characteristics of the cell under the particular condition such as a disease. It is now possible to discover mRNA transcripts not cataloged in existing database, in addition to assessing the identities and quantities of the known transcripts in a given sample or cell. However, the sequence reads obtained from an RNA-seq experiment is only a short fragment of the original transcript. How to recapitulate the mRNA transcriptome from short RNA-seq reads remains a challenging problem. We …
Numerical Investigation On Charring Ablator Geometric Effects: Study Of Stardust Sample Return Capsule Heat Shield, Haoyue Weng, Alexandre Martin
Numerical Investigation On Charring Ablator Geometric Effects: Study Of Stardust Sample Return Capsule Heat Shield, Haoyue Weng, Alexandre Martin
Mechanical Engineering Faculty Publications
Sample geometry is very influential in small charring ablative articles where 1D assumption might not be accurate. In heat shield design, 1D is often assumed since the nose radius is much larger than the thickness of charring. Whether the 1D assumption is valid for the heat shield is unknown. Therefore, the geometric effects of Stardust sample return capsule heat shield are numerically studied using a material response program. The developed computer program models material charring, conductive heat transfer, surface energy balance, pyrolysis gas transport and orthotropic material properties in 3D Cartesian coordinates. Simulation results show that the centerline temperatures predicted …
Singular Value Computation And Subspace Clustering, Qiao Liang
Singular Value Computation And Subspace Clustering, Qiao Liang
Theses and Dissertations--Mathematics
In this dissertation we discuss two problems. In the first part, we consider the problem of computing a few extreme eigenvalues of a symmetric definite generalized eigenvalue problem or a few extreme singular values of a large and sparse matrix. The standard method of choice of computing a few extreme eigenvalues of a large symmetric matrix is the Lanczos or the implicitly restarted Lanczos method. These methods usually employ a shift-and-invert transformation to accelerate the speed of convergence, which is not practical for truly large problems. With this in mind, Golub and Ye proposes an inverse-free preconditioned Krylov subspace method, …
Data Privacy Preservation In Collaborative Filtering Based Recommender Systems, Xiwei Wang
Data Privacy Preservation In Collaborative Filtering Based Recommender Systems, Xiwei Wang
Theses and Dissertations--Computer Science
This dissertation studies data privacy preservation in collaborative filtering based recommender systems and proposes several collaborative filtering models that aim at preserving user privacy from different perspectives.
The empirical study on multiple classical recommendation algorithms presents the basic idea of the models and explores their performance on real world datasets. The algorithms that are investigated in this study include a popularity based model, an item similarity based model, a singular value decomposition based model, and a bipartite graph model. Top-N recommendations are evaluated to examine the prediction accuracy.
It is apparent that with more customers' preference data, recommender systems …
High Quality Human 3d Body Modeling, Tracking And Application, Qing Zhang
High Quality Human 3d Body Modeling, Tracking And Application, Qing Zhang
Theses and Dissertations--Computer Science
Geometric reconstruction of dynamic objects is a fundamental task of computer vision and graphics, and modeling human body of high fidelity is considered to be a core of this problem. Traditional human shape and motion capture techniques require an array of surrounding cameras or subjects wear reflective markers, resulting in a limitation of working space and portability. In this dissertation, a complete process is designed from geometric modeling detailed 3D human full body and capturing shape dynamics over time using a flexible setup to guiding clothes/person re-targeting with such data-driven models. As the mechanical movement of human body can be …
Privacy Preserving Data Mining For Numerical Matrices, Social Networks, And Big Data, Lian Liu
Privacy Preserving Data Mining For Numerical Matrices, Social Networks, And Big Data, Lian Liu
Theses and Dissertations--Computer Science
Motivated by increasing public awareness of possible abuse of confidential information, which is considered as a significant hindrance to the development of e-society, medical and financial markets, a privacy preserving data mining framework is presented so that data owners can carefully process data in order to preserve confidential information and guarantee information functionality within an acceptable boundary.
First, among many privacy-preserving methodologies, as a group of popular techniques for achieving a balance between data utility and information privacy, a class of data perturbation methods add a noise signal, following a statistical distribution, to an original numerical matrix. With the help …
Towards Intelligent Telerobotics: Visualization And Control Of Remote Robot, Bo Fu
Towards Intelligent Telerobotics: Visualization And Control Of Remote Robot, Bo Fu
Theses and Dissertations--Computer Science
Human-machine cooperative or co-robotics has been recognized as the next generation of robotics. In contrast to current systems that use limited-reasoning strategies or address problems in narrow contexts, new co-robot systems will be characterized by their flexibility, resourcefulness, varied modeling or reasoning approaches, and use of real-world data in real time, demonstrating a level of intelligence and adaptability seen in humans and animals. The research I focused is in the two sub-field of co-robotics: teleoperation and telepresence. We firstly explore the ways of teleoperation using mixed reality techniques. I proposed a new type of display: hybrid-reality display (HRD) system, which …
Consistency Checking Of Natural Language Temporal Requirements Using Answer-Set Programming, Wenbin Li
Consistency Checking Of Natural Language Temporal Requirements Using Answer-Set Programming, Wenbin Li
Theses and Dissertations--Computer Science
Successful software engineering practice requires high quality requirements. Inconsistency is one of the main requirement issues that may prevent software projects from being success. This is particularly onerous when the requirements concern temporal constraints. Manual checking whether temporal requirements are consistent is tedious and error prone when the number of requirements is large. This dissertation addresses the problem of identifying inconsistencies in temporal requirements expressed as natural language text. The goal of this research is to create an efficient, partially automated, approach for checking temporal consistency of natural language requirements and to minimize analysts' workload.
The key contributions of this …
Smooth Subdivision Surfaces: Mesh Blending And Local Interpolation, Jianzhong Wang
Smooth Subdivision Surfaces: Mesh Blending And Local Interpolation, Jianzhong Wang
Theses and Dissertations--Computer Science
Subdivision surfaces are widely used in computer graphics and animation. Catmull-Clark subdivision (CCS) is one of the most popular subdivision schemes. It is capable of modeling and representing complex shape of arbitrary topology. Polar surface, working on a triangle-quad mixed mesh structure, is proposed to solve the inherent ripple problem of Catmull-Clark subdivision surface (CCSS).
CCSS is known to be C1 continuous at extraordinary points. In this work, we present a G2 scheme at CCS extraordinary points. The work is done by revising CCS subdivision step with Extraordinary-Points-Avoidance model together with mesh blending technique which selects guiding control …
Modeling Of Spallation Phenomenon In An Arc-Jet Environment, Raghava Sai Chaitanya Davuluri
Modeling Of Spallation Phenomenon In An Arc-Jet Environment, Raghava Sai Chaitanya Davuluri
Theses and Dissertations--Mechanical Engineering
Space vehicles, while entering the planetary atmosphere, experience high loads of heat. Ablative materials are commonly used for a thermal protection system, which undergo mass removal mechanisms to counter the heat rates. Spallation is one of the ablative processes, which is characterized by the ejection of solid particles from the material into the flow. Numerical codes that are used in designing the heat shields ignore this phenomenon. Hence, to evaluate the effectiveness of spallation phenomenon, a numerical model is developed to compute the dynamics and chemistry of the particles. The code is one-way coupled to a CFD code that models …