Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Singapore Management University (159)
- Walden University (76)
- CCT College Dublin (14)
- City University of New York (CUNY) (11)
- Dakota State University (7)
-
- Chulalongkorn University (6)
- University of Nebraska - Lincoln (6)
- Ateneo de Manila University (5)
- New Jersey Institute of Technology (5)
- San Jose State University (5)
- Universitas Negeri Yogyakarta (5)
- Western University (5)
- Chapman University (4)
- Old Dominion University (4)
- University of Arkansas, Fayetteville (4)
- University of South Florida (4)
- University of Wisconsin Milwaukee (4)
- University of Texas Rio Grande Valley (3)
- Western Michigan University (3)
- Air Force Institute of Technology (2)
- Association of Arab Universities (2)
- Illinois State University (2)
- Montclair State University (2)
- Technological University Dublin (2)
- The University of Maine (2)
- University of Central Florida (2)
- Arcadia University (1)
- Boise State University (1)
- Bowdoin College (1)
- Brigham Young University (1)
- Keyword
-
- Research Project (14)
- Mobile Application (11)
- Social media (9)
- Machine Learning (8)
- Machine learning (8)
-
- Cybersecurity (7)
- Deep learning (7)
- Artificial intelligence (6)
- Cloud computing (6)
- Information Technology (6)
- Strategies (6)
- Analytics (5)
- Data analytics (5)
- Database (5)
- State of the art (5)
- Training (5)
- Big data (4)
- Natural Language Processing (4)
- Neural networks (4)
- Privacy (4)
- Singapore (4)
- Task analysis (4)
- Blockchain (3)
- COVID-19 (3)
- Cloud (3)
- Cloud Computing (3)
- Clustering (3)
- Computer science (3)
- Data science (3)
- Deep Learning (3)
- Publication
-
- Research Collection School Of Computing and Information Systems (154)
- Walden Dissertations and Doctoral Studies (76)
- ICT (14)
- Theses and Dissertations (11)
- Open Educational Resources (8)
-
- Chulalongkorn University Theses and Dissertations (Chula ETD) (6)
- Dissertations (6)
- Department of Information Systems & Computer Science Faculty Publications (5)
- Electronic Thesis and Dissertation Repository (5)
- Elinvo (Electronics, Informatics, and Vocational Education) (5)
- Master's Projects (5)
- Graduate Theses and Dissertations (4)
- Masters Theses & Doctoral Dissertations (4)
- USF Tampa Graduate Theses and Dissertations (4)
- Dissertations and Theses Collection (Open Access) (3)
- Honors Theses (3)
- Al Jinan الجنان (2)
- Articles (2)
- Copyright, Fair Use, Scholarly Communication, etc. (2)
- Department of Computer Science Faculty Scholarship and Creative Works (2)
- Dissertations, Theses, and Capstone Projects (2)
- Electronic Theses and Dissertations (2)
- Faculty Research & Publications (2)
- General University of Maine Publications (2)
- Honors Projects (2)
- Library Philosophy and Practice (e-journal) (2)
- Mathematics, Physics, and Computer Science Faculty Articles and Research (2)
- All Undergraduate Theses and Capstone Projects (1)
- Annual Research Symposium (1)
- Boise State University Theses and Dissertations (1)
- Publication Type
- File Type
Articles 1 - 30 of 391
Full-Text Articles in Physical Sciences and Mathematics
Drone-Assisted Emergency Communications, Di Wu
Drone-Assisted Emergency Communications, Di Wu
Dissertations
Drone-mounted base stations (DBSs) have been proposed to extend coverage and improve communications between mobile users (MUs) and their corresponding macro base stations (MBSs). Different from the base stations on the ground, DBSs can flexibly fly over and close to MUs to establish a better vantage for communications. Thus, the pathloss between a DBS and an MU can be much smaller than that between the MU and MBS. In addition, by hovering in the air, the DBS can likely establish a Line-of-Sight link to the MBS. DBSs can be leveraged to recover communications in a large natural disaster struck area …
Supporting User Interaction And Social Relationship Formation In A Collaborative Online Shopping Context, Yu Xu
Dissertations
The combination of online shopping and social media allow people with similar shopping interests and experiences to share, comment, and discuss about shopping from anywhere and at any time, which also leads to the emergence of online shopping communities. Today, more people turn to online platforms to share their opinions about products, solicit various opinions from their friends, family members, and other customers, and have fun through interactions with others with similar interests. This dissertation explores how collaborative online shopping presents itself as a context and platform for users' interpersonal interactions and social relationship formation through a series of studies. …
Pengembangan Sistem Informasi Pemasaran Produk Pertanian Berbasis Website, Veronika Asri Tandirerung, Syahrul Syahrul, Achmad Padil
Pengembangan Sistem Informasi Pemasaran Produk Pertanian Berbasis Website, Veronika Asri Tandirerung, Syahrul Syahrul, Achmad Padil
Elinvo (Electronics, Informatics, and Vocational Education)
Pengembangan sistem informasi pemasaran produk pertanian (SIPTANI) dibutuhkan untuk membantu para petani dalam memasarkan produk-produk pertanian khususnya di era pandemic Covid-19. Penelitian ini merupakan penelitian pengembangan sistem dengan model pengembangan prototype dengan studi kelayakan menggunakan standar ISO 9126. Data penelitian diperoleh dari hasil observasi dan pengisian kuesioner oleh responden. Hasil pengujian aplikasi diperoleh dengan menganalisis aspek-aspek pada functional suitability, usability, compatibility, dan portability. Pada aspek functional suitability berada pada kategori layak diterima. Pada aspek usability, kategori sangat setuju memiliki dengan persentase 90%, sehingga aplikasi dinyatakan layak dan ditanggapi baik oleh pengguna. Pada aspek compatibility, sistem pemasaran pertanian ini dapat …
Penggunaan Analytical Hierarchy Process (Ahp) Pada Penentuan Prioritas Supplier Food Chemical Di Pt. Garuda Hidrotive Internasional, Nehemia Hadiwijaya, Jenie Sundari
Penggunaan Analytical Hierarchy Process (Ahp) Pada Penentuan Prioritas Supplier Food Chemical Di Pt. Garuda Hidrotive Internasional, Nehemia Hadiwijaya, Jenie Sundari
Elinvo (Electronics, Informatics, and Vocational Education)
Abstract-Supplier selection is one of the important things in purchasing activities for companies. Supplier selection is a multi-criteria problem which includes quantitative and qualitative factors. One method that can be used for supplier selection is the AHP (Analytical Hierarchy Process) method. The problems that will be discussed in this study are: (1) how is the order of priority criteria and sub-criteria in the selection of suppliers at PT Garuda Hidrotive International? (2) which supplier / supplier should PT Garuda Hidrotive International choose based on the AHP method? The sampling technique uses judgment sampling because the AHP method requires dependence on …
Traversal Struktur Data Bipartite Graph Dalam Graph Database Menggunakan Depth-First Search, Pradana Setialana, Muhammad Nurwidya Ardiansyah
Traversal Struktur Data Bipartite Graph Dalam Graph Database Menggunakan Depth-First Search, Pradana Setialana, Muhammad Nurwidya Ardiansyah
Elinvo (Electronics, Informatics, and Vocational Education)
Bipartite graph merupakan satu bentuk graph yang dapat digunakan dalam membentuk sebuah strukur data yang saling berelasi namun memiliki karakteristik dengan dua jenis node yang berbeda seperti data hubungan keluarga atau data pohon keluarga. Dalam menyimpan struktur data bipartite graph ke sebuah database dapat digunakan graph database dengan konsep dimana node saling saling terhubung dengan node lainnya. Bipartite graph yang dikombinasikan dengan graph database menghasilkan solusi yang tepat dalam menyimpan data berelasi dengan dua jenis node yang berbeda. Namun dalam solusi tersebut menimbulkan permasalahan baru mengenai pencarian atau penelusuran (traversal) terhadap data yang terdapat dalam struktur data tersebut. Tujuan dari …
Optimalisasi Media Penyimpanan Pada Sistem Inventori Stok Barang Untuk Pt. Multi Usaha Sejahtera Jaya Menggunakan Metode Goldbach Codes, Angga Debby Frayudha, Siti Purwanti
Optimalisasi Media Penyimpanan Pada Sistem Inventori Stok Barang Untuk Pt. Multi Usaha Sejahtera Jaya Menggunakan Metode Goldbach Codes, Angga Debby Frayudha, Siti Purwanti
Elinvo (Electronics, Informatics, and Vocational Education)
Pengelolaan data secara konvensional, baik manual pada buku maupun penggunaan aplikasi pengolah data (kata atau angka) dinilai masih memiliki keterbatasan terutama dalam hal keterjangkauan akses dan pengelolaan. Sistem informasi inventori mampu menyajikan pengelolaan data berupa informasi-informasi yang dibutuhkan untuk produktivitas tempat usaha sesuai karakteristik pengguna informasi pada tempat usaha tersebut. Lebih lanjut untuk proses transmisi data yang lebih baik, diperlukan optimalisasi media penyimpanan melalui teknik kompresi data tertentu. Salah satu algoritma kompresi data teks yang memiliki keunggulan pada optimalisasi ukuran hasil kompresi adalah Goldbach Codes. Artikel ini mendeskripsikan pengembangan sistem pengelolaan inventori dengan kemampuan dapat menyimpan maupun mengubah data stok …
Penerapan Model Utaut 2 Untuk Mengetahui Faktor-Faktor Yang Memengaruhi Penggunaan Siortu, Nur Azmi Ainul Bashir
Penerapan Model Utaut 2 Untuk Mengetahui Faktor-Faktor Yang Memengaruhi Penggunaan Siortu, Nur Azmi Ainul Bashir
Elinvo (Electronics, Informatics, and Vocational Education)
Layanan sistem informasi akademik untuk orang tua (SIORTU) telah banyak diterapkan di kampus-kampus, salah satunya adalah Universitas Islam Indonesia (UII). Nama resmi SIORTU UII yaitu UNISYS untuk orang tua. Belum banyak orang tua atau wali mahasiswa yang menggunakan SIORTU. Tercatat hanya 7.361 akun SIORTU yang aktif pada rentang April 2018 s.d Maret 2019. Jumlah tersebut hanya 36.68% dari jumlah akun yang disediakan untuk orang tua mahasiswa angkatan 2015-2018 yaitu 20.068 akun. Penelitian ini merupakan pengembangan penelitian yang telah dilakukan sebelumnya. Penelitian ini merupakan penelitian kuantitatif. Data yang dianalisis diperoleh dari data penelitian yang dikembangkan. Tujuan penelitian ini adalah mengetahui pengaruh …
Cat Tracks – Tracking Wildlife Through Crowdsourcing Using Firebase, Tracy Ho
Cat Tracks – Tracking Wildlife Through Crowdsourcing Using Firebase, Tracy Ho
Master's Projects
Many mountain lions are killed in the state of California every year from roadkill. To reduce these numbers, it is important that a system be built to track where these mountain lions have been around. One such system could be built using the platform-as-a-service, Firebase. Firebase is a platform service that collects and manages data that comes in through a mobile application. For the development of cross-platform mobile applications, Flutter is used as a toolkit for developers for both iOS and Android. This entire system, Cat Tracks is proposed as a crowdsource platform to track wildlife, with the current focus …
Data: The Good, The Bad And The Ethical, John D. Kelleher, Filipe Cabral Pinto, Luis M. Cortesao
Data: The Good, The Bad And The Ethical, John D. Kelleher, Filipe Cabral Pinto, Luis M. Cortesao
Articles
It is often the case with new technologies that it is very hard to predict their long-term impacts and as a result, although new technology may be beneficial in the short term, it can still cause problems in the longer term. This is what happened with oil by-products in different areas: the use of plastic as a disposable material did not take into account the hundreds of years necessary for its decomposition and its related long-term environmental damage. Data is said to be the new oil. The message to be conveyed is associated with its intrinsic value. But as in …
The Algorithm Project Research And Modeling Of Information Systems, Victoria Kuznetsova, S.B. Dovletova, Mixriddin Raximov, Gulnora Muxtorova, Kim Yelena
The Algorithm Project Research And Modeling Of Information Systems, Victoria Kuznetsova, S.B. Dovletova, Mixriddin Raximov, Gulnora Muxtorova, Kim Yelena
Bulletin of TUIT: Management and Communication Technologies
Pre-project research is a strategic stage of the object design process, based on the results of which a decision is made on the level of competitiveness, development prospects, setting a task for the project, labor intensity and feasibilityof creating a system in general.
The existing methods of pre-project research have a high degree of generalization and are practically not formalized in any way. The disadvantage of these methods is that they consider only specific individual prototypes and are aimed at finding solutions to current problems and eliminating individual shortcomings of a particular prototype. Thus, it Is Concluded that It Is …
Regional Integration: Physician Perceptions On Electronic Medical Record Use And Impact In South West Ontario, Sadiq Raji
Electronic Thesis and Dissertation Repository
Regional initiatives in the health care context in Canada are typically organized and administered along geographic boundaries or operational units. Regional integration of Electronic Medical Records (EMR) has been continuing across Canadian provinces in recent years, yet the use and impact of regionally integrated EMRs are not routinely assessed and questions remain about their impact on and use in physicians’ practices. Are stated goals of simplifying connections and sharing of electronic health information collected and managed by many health services providers being met? What are physicians’ perspectives on the use and impact of regionally integrated EMR? In this thesis, I …
School District Boundaries Map, Nick Huffman
School District Boundaries Map, Nick Huffman
Honors Theses
The purpose of this project is to provide a school district boundary mapping feature to a product sold by Level Data called SDVS, which is a plugin used by districts inside of PowerSchool. Using primarily the features offered by Mapbox, We have implemented a React component that is capable of plotting useful data points related to a student and their school district on a map. The tool is designed to be used primarily by school administrators to determine whether or not a student lives within their district boundaries. The application uses a dataset that is provided by the NCES to …
Stem Teacher Database, Veronica Buss
Stem Teacher Database, Veronica Buss
Honors Theses
The College of Engineering and Applied Sciences (CEAS) Recruitment web application provides access to recruitment information for the Manager of Recruitment and Outreach and those who also use the spreadsheet file with their current data. This database is a functional database for the WMU college of engineering and applied sciences’ recruiters to organize their data on STEM teachers from the feeder high schools of WMU. The app provides an interface for its users to filter and search the data they have compiled to create recruitment mailing reports. The main purpose of this app was to facilitate the retrieval and upkeep …
Eelgrass (Zostera Marina) Population Decline In Morro Bay, Ca: A Meta-Analysis Of Herbicide Application In San Luis Obispo County And Morro Bay Watershed, Tyler King Sinnott
Eelgrass (Zostera Marina) Population Decline In Morro Bay, Ca: A Meta-Analysis Of Herbicide Application In San Luis Obispo County And Morro Bay Watershed, Tyler King Sinnott
Master's Theses
The endemic eelgrass (Zostera marina) community of Morro Bay Estuary, located on the central coast of California, has experienced an estimated decline of 95% in occupied area (reduction of 344 acres to 20 acres) from 2008 to 2017 for reasons that are not yet definitively clear. One possible driver of degradation that has yet to be investigated is the role of herbicides from agricultural fields in the watershed that feeds into the estuary. Thus, the primary research goal of this project was to better understand temporal and spatial trends of herbicide use within the context of San Luis …
Cross Dataset Evaluation For Iot Network Intrusion Detection, Anjum Farah
Cross Dataset Evaluation For Iot Network Intrusion Detection, Anjum Farah
Theses and Dissertations
With the advent of Internet of Things (IOT) technology, the need to ensure the security of an IOT network has become important. There are several intrusion detection systems (IDS) that are available for analyzing and predicting network anomalies and threats. However, it is challenging to evaluate them to realistically estimate their performance when deployed. A lot of research has been conducted where the training and testing is done using the same simulated dataset. However, realistically, a network on which an intrusion detection model is deployed will be very different from the network on which it was trained. The aim of …
Teaching Applications And Implications Of Blockchain Via Project-Based Learning: A Case Study, Kevin Mentzer, Mark Frydenberg, David J. Yates
Teaching Applications And Implications Of Blockchain Via Project-Based Learning: A Case Study, Kevin Mentzer, Mark Frydenberg, David J. Yates
Information Systems and Analytics Department Faculty Journal Articles
This paper presents student projects analyzing or using blockchain technologies, created by students enrolled in courses dedicated to teaching blockchain, at two different universities during the 2018-2019 academic year. Students explored perceptions related to storing private healthcare information on a blockchain, managing the security of Internet of Things devices, maintaining public governmental records, and creating smart contracts. The course designs, which were centered around project-based learning, include self-regulated learning and peer feedback as ways to improve student learning. Students either wrote a research paper or worked in teams on a programming project to build and deploy a blockchain-based application using …
Vision-Based Analytics For Improved Ai-Driven Iot Applications, Amit Sharma
Vision-Based Analytics For Improved Ai-Driven Iot Applications, Amit Sharma
Dissertations and Theses Collection (Open Access)
Proliferation of Internet of Things (IoT) sensor systems, primarily driven by cheaper embedded hardware platforms and wide availability of light-weight software platforms, has opened up doors for large-scale data collection opportunities. The availability of massive amount of data has in-turn given way to rapidly growing machine learning models e.g. You Only Look Once (YOLO), Single-Shot-Detectors (SSD) and so on. There has been a growing trend of applying machine learning techniques, e.g., object detection, image classification, face detection etc., on data collected from camera sensors and therefore enabling plethora of vision-sensing applications namely self-driving cars, automatic crowd monitoring, traffic-flow analysis, occupancy …
Empowering People With Cognitive Disabilities To Live Independently By Supporting Their Self-Management Of Food And Related Expenses, Apoorv Prasad
Empowering People With Cognitive Disabilities To Live Independently By Supporting Their Self-Management Of Food And Related Expenses, Apoorv Prasad
Theses and Dissertations
People with ADHD (attention deficit hyperactivity disorder) often have difficulty in planning and organization that can impact their eating habits and lifestyle. We have created a novel mobile software application to support choosing meals and making healthy food purchases that meet dietary preferences within a specified budget. The core functions allow 1) Managing user profiles to support personalization 2) Obtaining recipe recommendations to fit profile, budget, and foods-on-hand 3) Planning food purchases, and 4) Reviewing foods-on-hand, budget and the nutritional balance of recent meals and food purchases.The application supports self-introspection to help people with ADHD review their history of food …
A Hybrid Approach For Detecting Prerequisite Relations In Multi-Modal Food Recipes, Liangming Pan, Jingjing Chen, Shaoteng Liu, Chong-Wah Ngo, Min-Yen Kan, Tat-Seng Chua
A Hybrid Approach For Detecting Prerequisite Relations In Multi-Modal Food Recipes, Liangming Pan, Jingjing Chen, Shaoteng Liu, Chong-Wah Ngo, Min-Yen Kan, Tat-Seng Chua
Research Collection School Of Computing and Information Systems
Modeling the structure of culinary recipes is the core of recipe representation learning. Current approaches mostly focus on extracting the workflow graph from recipes based on text descriptions. Process images, which constitute an important part of cooking recipes, has rarely been investigated in recipe structure modeling. We study this recipe structure problem from a multi-modal learning perspective, by proposing a prerequisite tree to represent recipes with cooking images at a step-level granularity. We propose a simple-yet-effective two-stage framework to automatically construct the prerequisite tree for a recipe by (1) utilizing a trained classifier to detect pairwise prerequisite relations that fuses …
Heterogeneous Univariate Outlier Ensembles In Multidimensional Data, Guansong Pang, Longbing Cao
Heterogeneous Univariate Outlier Ensembles In Multidimensional Data, Guansong Pang, Longbing Cao
Research Collection School Of Computing and Information Systems
In outlier detection, recent major research has shifted from developing univariate methods to multivariate methods due to the rapid growth of multidimensional data. However, one typical issue of this paradigm shift is that many multidimensional data often mainly contains univariate outliers, in which many features are actually irrelevant. In such cases, multivariate methods are ineffective in identifying such outliers due to the potential biases and the curse of dimensionality brought by irrelevant features. Those univariate outliers might be well detected by applying univariate outlier detectors in individually relevant features. However, it is very challenging to choose a right univariate detector …
Differential Privacy Protection Over Deep Learning: An Investigation Of Its Impacted Factors, Ying Lin, Ling-Yan Bao, Ze-Minghui Li, Shu-Sheng Si, Chao-Hsien Chu
Differential Privacy Protection Over Deep Learning: An Investigation Of Its Impacted Factors, Ying Lin, Ling-Yan Bao, Ze-Minghui Li, Shu-Sheng Si, Chao-Hsien Chu
Research Collection School Of Computing and Information Systems
Deep learning (DL) has been widely applied to achieve promising results in many fields, but it still exists various privacy concerns and issues. Applying differential privacy (DP) to DL models is an effective way to ensure privacy-preserving training and classification. In this paper, we revisit the DP stochastic gradient descent (DP-SGD) method, which has been used by several algorithms and systems and achieved good privacy protection. However, several factors, such as the sequence of adding noise, the models used etc., may impact its performance with various degrees. We empirically show that adding noise first and clipping second will not only …
Interventional Few-Shot Learning, Zhongqi Yue, Zhang Hanwang, Qianru Sun, Xian-Sheng Hua
Interventional Few-Shot Learning, Zhongqi Yue, Zhang Hanwang, Qianru Sun, Xian-Sheng Hua
Research Collection School Of Computing and Information Systems
We uncover an ever-overlooked deficiency in the prevailing Few-Shot Learning (FSL) methods: the pre-trained knowledge is indeed a confounder that limits the performance. This finding is rooted from our causal assumption: a Structural Causal Model (SCM) for the causalities among the pre-trained knowledge, sample features, and labels. Thanks to it, we propose a novel FSL paradigm: Interventional Few-Shot Learning (IFSL). Specifically, we develop three effective IFSL algorithmic implementations based on the backdoor adjustment, which is essentially a causal intervention towards the SCM of many-shot learning: the upper-bound of FSL in a causal view. It is worth noting that the contribution …
Causal Intervention For Weakly-Supervised Semantic Segmentation, Zhang Dong, Hanwang Zhang, Jinhui Tang, Xian-Sheng Hua, Qianru Sun
Causal Intervention For Weakly-Supervised Semantic Segmentation, Zhang Dong, Hanwang Zhang, Jinhui Tang, Xian-Sheng Hua, Qianru Sun
Research Collection School Of Computing and Information Systems
We present a causal inference framework to improve Weakly-Supervised Semantic Segmentation (WSSS). Specifically, we aim to generate better pixel-level pseudo-masks by using only image-level labels --- the most crucial step in WSSS. We attribute the cause of the ambiguous boundaries of pseudo-masks to the confounding context, e.g., the correct image-level classification of "horse'' and "person'' may be not only due to the recognition of each instance, but also their co-occurrence context, making the model inspection (e.g., CAM) hard to distinguish between the boundaries. Inspired by this, we propose a structural causal model to analyze the causalities among images, contexts, and …
Social Media Analytics: A Case Study Of Singapore General Election 2020, Sebastian Zhi Tao Khoo, Leong Hock Ho, Ee Hong Lee, Danston Kheng Boon Goh, Zehao Zhang, Swee Hong Ng, Haodi Qi, Kyong Jin Shim
Social Media Analytics: A Case Study Of Singapore General Election 2020, Sebastian Zhi Tao Khoo, Leong Hock Ho, Ee Hong Lee, Danston Kheng Boon Goh, Zehao Zhang, Swee Hong Ng, Haodi Qi, Kyong Jin Shim
Research Collection School Of Computing and Information Systems
The 2020 Singaporean General Election (GE2020) was a general election held in Singapore on July 10, 2020. In this study, we present an analysis on social conversations about GE2020 during the election period. We analyzed social conversations from popular platforms such as Twitter, HardwareZone, and TR Emeritus.
Co-Embedding Attributed Networks With External Knowledge, Pei-Chi Lo, Ee Peng Lim
Co-Embedding Attributed Networks With External Knowledge, Pei-Chi Lo, Ee Peng Lim
Research Collection School Of Computing and Information Systems
Attributed network embedding aims to learn representations of nodes and their attributes in a low-dimensional space that preserves their semantics. The existing embedding models, however, consider node connectivity and node attributes only while ignoring external knowledge that can enhance node representations for downstream applications. In this paper, we propose a set of new VAE-based embedding models called External Knowledge-Aware Co-Embedding Attributed Network (ECAN) Embeddings to incorporate associations among attributes from relevant external knowledge. Such external knowledge can be extracted from text corpus and knowledge graphs. We use multi-VAE structures to model the attribute associations. To cope with joint encoding of …
Ppmexplorer: Using Information Retrieval, Computer Vision And Transfer Learning Methods To Index And Explore Images Of Pompeii, Cindy Roullet
Ppmexplorer: Using Information Retrieval, Computer Vision And Transfer Learning Methods To Index And Explore Images Of Pompeii, Cindy Roullet
Graduate Theses and Dissertations
In this dissertation, we present and analyze the technology used in the making of PPMExplorer: Search, Find, and Explore Pompeii. PPMExplorer is a software tool made with data extracted from the Pompei: Pitture e Mosaic (PPM) volumes. PPM is a valuable set of volumes containing 20,000 historical annotated images of the archaeological site of Pompeii, Italy accompanied by extensive captions. We transformed the volumes from paper, to digital, to searchable. PPMExplorer enables archaeologist researchers to conduct and check hypotheses on historical findings. We present a theory that such a concept is possible by leveraging computer generated correlations between artifacts using …
Blockchain-Based Public Auditing And Secure Deduplication With Fair Arbitration, Haoran Yuan, Xiaofeng Chen, Jianfeng Wang, Jiaming Yuan, Hongyang Yan, Willy Susilo
Blockchain-Based Public Auditing And Secure Deduplication With Fair Arbitration, Haoran Yuan, Xiaofeng Chen, Jianfeng Wang, Jiaming Yuan, Hongyang Yan, Willy Susilo
Research Collection School Of Computing and Information Systems
Data auditing enables data owners to verify the integrity of their sensitive data stored at an untrusted cloud without retrieving them. This feature has been widely adopted by commercial cloud storage. However, the existing approaches still have some drawbacks. On the one hand, the existing schemes have a defect of fair arbitration, i.e., existing auditing schemes lack an effective method to punish the malicious cloud service provider (CSP) and compensate users whose data integrity is destroyed. On the other hand, a CSP may store redundant and repetitive data. These redundant data inevitably increase management overhead and computational cost during the …
Deep Multi-Task Learning For Depression Detection And Prediction In Longitudinal Data, Guansong Pang, Ngoc Thien Anh Pham, Emma Baker, Rebecca Bentley, Anton Van Den Hengel
Deep Multi-Task Learning For Depression Detection And Prediction In Longitudinal Data, Guansong Pang, Ngoc Thien Anh Pham, Emma Baker, Rebecca Bentley, Anton Van Den Hengel
Research Collection School Of Computing and Information Systems
Depression is among the most prevalent mental disorders, affecting millions of people of all ages globally. Machine learning techniques have shown effective in enabling automated detection and prediction of depression for early intervention and treatment. However, they are challenged by the relative scarcity of instances of depression in the data. In this work we introduce a novel deep multi-task recurrent neural network to tackle this challenge, in which depression classification is jointly optimized with two auxiliary tasks, namely one-class metric learning and anomaly ranking. The auxiliary tasks introduce an inductive bias that improves the classification model's generalizability on small depression …
Security Analysis Of Permission Re-Delegation Vulnerabilities In Android Apps, Biniam Fisseha Demissie, Mariano Ceccato, Lwin Khin Shar
Security Analysis Of Permission Re-Delegation Vulnerabilities In Android Apps, Biniam Fisseha Demissie, Mariano Ceccato, Lwin Khin Shar
Research Collection School Of Computing and Information Systems
The Android platform facilitates reuse of app functionalities by allowing an app to request an action from another app through inter-process communication mechanism. This feature is one of the reasons for the popularity of Android, but it also poses security risks to the end users because malicious, unprivileged apps could exploit this feature to make privileged apps perform privileged actions on behalf of them. In this paper, we investigate the hybrid use of program analysis, genetic algorithm based test generation, natural language processing, machine learning techniques for precise detection of permission re-delegation vulnerabilities in Android apps. Our approach first groups …
Nearest Centroid: A Bridge Between Statistics And Machine Learning, Manoj Thulasidas
Nearest Centroid: A Bridge Between Statistics And Machine Learning, Manoj Thulasidas
Research Collection School Of Computing and Information Systems
In order to guide our students of machine learning in their statistical thinking, we need conceptually simple and mathematically defensible algorithms. In this paper, we present the Nearest Centroid algorithm (NC) algorithm as a pedagogical tool, combining the key concepts behind two foundational algorithms: K-Means clustering and K Nearest Neighbors (k- NN). In NC, we use the centroid (as defined in the K-Means algorithm) of the observations belonging to each class in our training data set and its distance from a new observation (similar to k-NN) for class prediction. Using this obvious extension, we will illustrate how the concepts of …