Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 9 of 9

Full-Text Articles in Physical Sciences and Mathematics

Sense -Based Text Classification By Semantic Hierarchy Representation, Xiaogang Peng Oct 2004

Sense -Based Text Classification By Semantic Hierarchy Representation, Xiaogang Peng

Doctoral Dissertations

Automatic classification of web pages is an effective way to facilitate the process of retrieving information from the Internet. Currently, two major classification methods are used in this area: keyword-based classification and sense-based classification. For keyword-based classification, keywords often have different semantic meanings, and the correct keyword matching is largely based on using exactly the same keywords. Thus, the classification results of keyword-based classification are not always satisfying. Many sense-based classification algorithms and systems have been presented, but they pay little attention to the relationship between senses. In this dissertation, we present a method to automatically classify documents based on …


Some Statistical Contributions To The Analysis Of Human Genome Diversity And Evolution., Analabha Basu Dr. Aug 2004

Some Statistical Contributions To The Analysis Of Human Genome Diversity And Evolution., Analabha Basu Dr.

Doctoral Theses

The work embodied in this thesis pertains to human population genetics. In particular, the overarching goals of this thesis are to contribute to the understanding of genomic diversity of human populations and to the development of statistical methods for making inferences in genome diversity studies. With these two goals in mind, we have carried out a detailed statistical analysis of genomic data on a large number of ethnic populations of India, generated in the laboratory of the Anthropology & Human Genetics Unit, Indian Statistical Institute, Kolkata. Additionally, wherever relevant, we have compared our data with those collated from the published …


Query Rewriting For Extracting Data Behind Html Forms, Xueqi Chen Apr 2004

Query Rewriting For Extracting Data Behind Html Forms, Xueqi Chen

Theses and Dissertations

Much of the information on the Web is stored in specialized searchable databases and can only be accessed by interacting with a form or a series of forms. As a result, enabling automated agents and Web crawlers to interact with form-based interfaces designed primarily for humans is of great value. This thesis describes a system that can fill out Web forms automatically according to a given user query against a global schema for an application domain and, to the extent possible, extract just the relevant data behind these Web forms. Experimental results on two application domains show that the approach …


Natural Xml For Data Binding, Processing, And Persistence, George K. Thiruvathukal, Konstantin Läufer Mar 2004

Natural Xml For Data Binding, Processing, And Persistence, George K. Thiruvathukal, Konstantin Läufer

Computer Science: Faculty Publications and Other Works

The article explains what you need to do to incorporate XML directly into your computational science application. The exploration involves the use of a standard parser to automatically build object trees entirely from application-specific classes. This discussion very much focuses on object-oriented programming languages such as Java and Python, but it can work for non-object-oriented languages as well. The ideas in the article provide a glimpse into the Natural XML research project.


A Key Management Scheme For Wireless Sensor Networks Using Deployment Knowledge, Wenliang Du, Jing Deng, Yunghsiang S. Han, Shigang Chen Jan 2004

A Key Management Scheme For Wireless Sensor Networks Using Deployment Knowledge, Wenliang Du, Jing Deng, Yunghsiang S. Han, Shigang Chen

Electrical Engineering and Computer Science - All Scholarship

To achieve security in wireless sensor networks, it is important to be able to encrypt messages sent among sensor nodes. Keys for encryption purposes must be agreed upon by communicating nodes. Due to resource constraints, achieving such key agreement in wireless sensor networks is non-trivial. Many key agreement schemes used in general networks, such as Diffie-Hellman and public-key based schemes, are not suitable for wireless sensor networks. Pre-distribution of secret keys for all pairs of nodes is not viable due to the large amount of memory used when the network size is large. Recently, a random key predistribution scheme and …


Xml In Computational Science, George K. Thiruvathukal Jan 2004

Xml In Computational Science, George K. Thiruvathukal

Computer Science: Faculty Publications and Other Works

In this first article in a series about XML in computational science, I present some background and lightweight examples of XML usage, describe some XML component frameworksalong with their purpose and applicability to computational science, and discuss some technical obstacles to overcome for the language to be taken seriously in computational science.


Move To Component Based Architectures: Introducing Microsoft's .Net Platform Into The College Classroom, Meg C. Murray Jan 2004

Move To Component Based Architectures: Introducing Microsoft's .Net Platform Into The College Classroom, Meg C. Murray

Faculty and Research Publications

A transformation has been occurring in the architectural model for computer-based application intense software systems. This new model, software-as-a-service, will have a profound impact on the design and development of software for many years to come and as such college level computing curriculums will need to incorporate the concepts and methodologies associated with this new architecture. The platform is built upon a view of interrelated, distributed peer-level software modules and components that work in tandem to achieve specified functional goals. From Microsoft's viewpoint, migration to the new platform requires a radical shift in the software development lifecycle. It is becoming …


A Generalised Feedforward Neural Network Architecture And Its Applications To Classification And Regression, Ganesh Arulampalam Jan 2004

A Generalised Feedforward Neural Network Architecture And Its Applications To Classification And Regression, Ganesh Arulampalam

Theses: Doctorates and Masters

Shunting inhibition is a powerful computational mechanism that plays an important role in sensory neural information processing systems. It has been extensively used to model some important visual and cognitive functions. It equips neurons with a gain control mechanism that allows them to operate as adaptive non-linear filters. Shunting Inhibitory Artificial Neural Networks (SIANNs) are biologically inspired networks where the basic synaptic computations are based on shunting inhibition. SIANNs were designed to solve difficult machine learning problems by exploiting the inherent non-linearity mediated by shunting inhibition. The aim was to develop powerful, trainable networks, with non-linear decision surfaces, for classification …


Contrast Enhancement Of Ultrasound Images Using Shunting Inhibitory Cellular Neural Networks, Murali M. Gogineni Jan 2004

Contrast Enhancement Of Ultrasound Images Using Shunting Inhibitory Cellular Neural Networks, Murali M. Gogineni

Theses: Doctorates and Masters

Evolving from neuro-biological insights, neural network technology gives a computer system an amazing capacity to actually generate decisions dynamically. However, as the amount of data to be processed increases, there is a demand for developing new types of networks such as Cellular Neural Networks (CNN), to ease the computational burden without compromising the outcomes. The objective of this thesis is to research the capability of Shunting Inhibitory Cellular Neural Networks (SICNN) to solve the clarity problems in ultrasound imaging. In this thesis, we begin by reviewing a number of traditional enhancement techniques and measures. Since the entire work of this …