Open Access. Powered by Scholars. Published by Universities.®
Databases and Information Systems Commons™
Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 5 of 5
Full-Text Articles in Databases and Information Systems
Reducing Uncertainty In Sea-Level Rise Prediction: A Spatial-Variability-Aware Approach, Subhankar Ghosh, Shuai An, Arun Sharma, Jayant Gupta, Shashi Shekhar, Aneesh Subramanian
Reducing Uncertainty In Sea-Level Rise Prediction: A Spatial-Variability-Aware Approach, Subhankar Ghosh, Shuai An, Arun Sharma, Jayant Gupta, Shashi Shekhar, Aneesh Subramanian
I-GUIDE Forum
Given multi-model ensemble climate projections, the goal is to accurately and reliably predict future sea-level rise while lowering the uncertainty. This problem is important because sea-level rise affects millions of people in coastal communities and beyond due to climate change's impacts on polar ice sheets and the ocean. This problem is challenging due to spatial variability and unknowns such as possible tipping points (e.g., collapse of Greenland or West Antarctic ice-shelf), climate feedback loops (e.g., clouds, permafrost thawing), future policy decisions, and human actions. Most existing climate modeling approaches use the same set of weights globally, during either regression or …
Using Graph Theoretical Methods And Traceroute To Visually Represent Hidden Networks, Jordan M. Sahs
Using Graph Theoretical Methods And Traceroute To Visually Represent Hidden Networks, Jordan M. Sahs
UNO Student Research and Creative Activity Fair
Within the scope of a Wide Area Network (WAN), a large geographical communication network in which a collection of networking devices communicate data to each other, an example being the spanning communication network, known as the Internet, around continents. Within WANs exists a collection of Routers that transfer network packets to other devices. An issue pertinent to WANs is their immeasurable size and density, as we are not sure of the amount, or the scope, of all the devices that exists within the network. By tracing the routes and transits of data that traverses within the WAN, we can identify …
Forensics Analysis For Bone Pair Matching Using Bipartite Graphs In Commingled Remains, Ryan Ernst
Forensics Analysis For Bone Pair Matching Using Bipartite Graphs In Commingled Remains, Ryan Ernst
UNO Student Research and Creative Activity Fair
Identification of missing prisoners of war is a complex and time consuming task. There are many missing soldiers whose remains have yet to be returned to their families and loved ones. This nation has a solemn obligation to its soldiers and their families who have made the ultimate sacrifice for their country. There are currently over 82,000 unidentified prisoners of war which are identified at a rate of 100+ per year. At this rate it would take 300+ years to complete the identification process. Previously, anthropologists used excel spreadsheets to sort through skeletal data. This project aims to streamline the …
Predicting Locations Of Pollution Sources Using Convolutional Neural Networks, Yiheng Chi, Nickolas D. Winovich, Guang Lin
Predicting Locations Of Pollution Sources Using Convolutional Neural Networks, Yiheng Chi, Nickolas D. Winovich, Guang Lin
The Summer Undergraduate Research Fellowship (SURF) Symposium
Pollution is a severe problem today, and the main challenge in water and air pollution controls and eliminations is detecting and locating pollution sources. This research project aims to predict the locations of pollution sources given diffusion information of pollution in the form of array or image data. These predictions are done using machine learning. The relations between time, location, and pollution concentration are first formulated as pollution diffusion equations, which are partial differential equations (PDEs), and then deep convolutional neural networks are built and trained to solve these PDEs. The convolutional neural networks consist of convolutional layers, reLU layers …
A Survey On Intrusion Detection Approaches, A Murali M. Rao
A Survey On Intrusion Detection Approaches, A Murali M. Rao
International Conference on Information and Communication Technologies
Intrusion detection plays one of the key roles in computer security techniques and is one of the prime areas of research. Usages of computer network services are tremendously increasing day by day and at the same time intruders are also playing a major role to deny network services, compromising the crucial services for Email, FTP and Web. Realizing the importance of the problem due to intrusions, many researchers have taken up research in this area and have proposed several solutions. It has come to a stage to take a stock of the research results and project a comprehensive view so …