Open Access. Powered by Scholars. Published by Universities.®
Databases and Information Systems Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Computer Engineering (2)
- Engineering (2)
- Theory and Algorithms (2)
- Aerospace Engineering (1)
- Applied Mathematics (1)
-
- Artificial Intelligence and Robotics (1)
- Computational Engineering (1)
- Data Science (1)
- Data Storage Systems (1)
- Earth Sciences (1)
- Geology (1)
- Geometry and Topology (1)
- Geophysics and Seismology (1)
- Health Information Technology (1)
- Health and Medical Administration (1)
- Information Security (1)
- Mathematics (1)
- Medicine and Health Sciences (1)
- Multi-Vehicle Systems and Air Traffic Control (1)
- Numerical Analysis and Computation (1)
- Other Computer Engineering (1)
- Space Vehicles (1)
Articles 1 - 4 of 4
Full-Text Articles in Databases and Information Systems
Multilateration Index., Chip Lynch
Multilateration Index., Chip Lynch
Electronic Theses and Dissertations
We present an alternative method for pre-processing and storing point data, particularly for Geospatial points, by storing multilateration distances to fixed points rather than coordinates such as Latitude and Longitude. We explore the use of this data to improve query performance for some distance related queries such as nearest neighbor and query-within-radius (i.e. “find all points in a set P within distance d of query point q”). Further, we discuss the problem of “Network Adequacy” common to medical and communications businesses, to analyze questions such as “are at least 90% of patients living within 50 miles of a covered emergency …
A Gis-Based Method For Archival And Visualization Of Microstructural Data From Drill Core Samples., Elliott Holmes
A Gis-Based Method For Archival And Visualization Of Microstructural Data From Drill Core Samples., Elliott Holmes
Electronic Theses and Dissertations
Core samples obtained from scientific drilling could provide large volumes of direct microstructural and compositional data, but generating results via the traditional treatment of such data is often time-consuming and inefficient. Unifying microstructural data within a spatially referenced Geographic Information System (GIS) environment provides an opportunity to readily locate, visualize, correlate, and explore the available microstructural data. Using 26 core billet samples from the San Andreas Fault Observatory at Depth (SAFOD), this study developed procedures for: 1. A GIS-based approach for spatially referenced visualization and storage of microstructural data from drill core billet samples; and 2. Producing 3D models of …
Studying And Handling Iterated Algorithmic Biases In Human And Machine Learning Interaction., Wenlong Sun
Studying And Handling Iterated Algorithmic Biases In Human And Machine Learning Interaction., Wenlong Sun
Electronic Theses and Dissertations
Algorithmic bias consists of biased predictions born from ingesting unchecked information, such as biased samples and biased labels. Furthermore, the interaction between people and algorithms can exacerbate bias such that neither the human nor the algorithms receive unbiased data. Thus, algorithmic bias can be introduced not only before and after the machine learning process but sometimes also in the middle of the learning process. With a handful of exceptions, only a few categories of bias have been studied in Machine Learning, and there are few, if any, studies of the impact of bias on both human behavior and algorithm performance. …
Dynamic Adversarial Mining - Effectively Applying Machine Learning In Adversarial Non-Stationary Environments., Tegjyot Singh Sethi
Dynamic Adversarial Mining - Effectively Applying Machine Learning In Adversarial Non-Stationary Environments., Tegjyot Singh Sethi
Electronic Theses and Dissertations
While understanding of machine learning and data mining is still in its budding stages, the engineering applications of the same has found immense acceptance and success. Cybersecurity applications such as intrusion detection systems, spam filtering, and CAPTCHA authentication, have all begun adopting machine learning as a viable technique to deal with large scale adversarial activity. However, the naive usage of machine learning in an adversarial setting is prone to reverse engineering and evasion attacks, as most of these techniques were designed primarily for a static setting. The security domain is a dynamic landscape, with an ongoing never ending arms race …