Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Engineering (363)
- Databases and Information Systems (291)
- Graphics and Human Computer Interfaces (257)
- Social and Behavioral Sciences (253)
- Artificial Intelligence and Robotics (235)
-
- Theory and Algorithms (212)
- OS and Networks (206)
- Computer Engineering (189)
- Information Security (187)
- Software Engineering (169)
- Numerical Analysis and Scientific Computing (143)
- Mathematics (126)
- Systems Architecture (113)
- Business (112)
- Electrical and Computer Engineering (99)
- Public Affairs, Public Policy and Public Administration (97)
- Other Computer Engineering (94)
- Law (92)
- Defense and Security Studies (90)
- Sociology (89)
- Education (84)
- Legal Studies (84)
- Computer Law (80)
- Forensic Science and Technology (79)
- Data Science (78)
- Programming Languages and Compilers (75)
- Arts and Humanities (74)
- Institution
-
- Selected Works (185)
- Chapman University (124)
- University of Dayton (120)
- San Jose State University (115)
- Embry-Riddle Aeronautical University (84)
-
- Western University (75)
- California Polytechnic State University, San Luis Obispo (66)
- University of Nebraska - Lincoln (60)
- SelectedWorks (47)
- City University of New York (CUNY) (44)
- Technological University Dublin (28)
- University of Pennsylvania (28)
- Dakota State University (27)
- Rochester Institute of Technology (26)
- Edith Cowan University (23)
- University of Tennessee, Knoxville (21)
- Smith College (20)
- Western Kentucky University (20)
- Florida International University (19)
- University of Massachusetts Amherst (19)
- University of Alabama in Huntsville (18)
- University of Arkansas, Fayetteville (18)
- University of New Orleans (18)
- University of Denver (17)
- Bard College (15)
- Boise State University (15)
- Kennesaw State University (15)
- Portland State University (15)
- The University of Akron (15)
- Southern Methodist University (14)
- Keyword
-
- Machine learning (54)
- Machine Learning (42)
- Computer Science (37)
- Computer science (22)
- Classification (21)
-
- Deep learning (21)
- Natural language processing (19)
- Software (19)
- Simulation (18)
- Small Spacecraft (18)
- Computer vision (17)
- Android (16)
- Education (16)
- Technology (16)
- Open Orbiter Project (15)
- Bioinformatics (14)
- Clustering (14)
- Coalgebra (13)
- Data mining (13)
- Deep Learning (13)
- Internet (13)
- Programming (13)
- Collaboration (12)
- Graph theory (12)
- Social networks (12)
- Visualization (12)
- CubeSat (11)
- Natural Language Processing (11)
- Security (11)
- Algorithms (10)
- Publication Year
- Publication
-
- Master's Projects (105)
- Computer Science Faculty Publications (94)
- Annual ADFSL Conference on Digital Forensics, Security and Law (77)
- Engineering Faculty Articles and Research (63)
- Electronic Thesis and Dissertation Repository (59)
-
- CSE Conference and Workshop Papers (44)
- Saverio Perugini (42)
- Doctoral Dissertations (33)
- Master's Theses (32)
- Mathematics, Physics, and Computer Science Faculty Articles and Research (30)
- Electronic Theses and Dissertations (26)
- Jeremy Straub (25)
- Masters Theses & Doctoral Dissertations (24)
- Theses and Dissertations (23)
- Open Educational Resources (20)
- Statistical and Data Sciences: Faculty Publications (20)
- MIS/OM/DS Faculty Publications (18)
- University of New Orleans Theses and Dissertations (18)
- Articles (17)
- FIU Electronic Theses and Dissertations (16)
- Operations, Information and Decisions Papers (16)
- Dissertations, Theses, and Capstone Projects (15)
- Williams Honors College, Honors Research Projects (15)
- Computer Science and Software Engineering (14)
- Jan Kallberg (14)
- Presentations and other scholarship (14)
- Boise State University Theses and Dissertations (12)
- Computer Engineering (12)
- Conference papers (12)
- Davide Andrea Mauro (12)
- Publication Type
Articles 1 - 30 of 1772
Full-Text Articles in Other Computer Sciences
A Novel Parking Management In Smart City Vehicular Datacenters, Syed Rizvi, Susan Zehra, Steven Olariu
A Novel Parking Management In Smart City Vehicular Datacenters, Syed Rizvi, Susan Zehra, Steven Olariu
College of Sciences Posters
Researchers have shown that most vehicles spend the majority of their time parked in parking garages, lots, or driveways. During this time, their computing resources are unused and untapped. This has led to substantial interest in Vehicular Cloud, an area of research in which each vehicle acts as a computation node. The main difference between traditional cloud computing and vehicular cloud computing is the availability of nodes. In traditional clouds, nodes are available 24/7, while in vehicular clouds, nodes (vehicles) are only available while parked in parking lots. This creates a dynamic environment as vehicles enter and exit parking garages …
Scalable Quantum Edge Detection Method For D-Nisq Imaging Simulations: Use Cases From Nuclear Physics And Medical Image Computing, Emmanuel Billias, Nikos Chrisochoides
Scalable Quantum Edge Detection Method For D-Nisq Imaging Simulations: Use Cases From Nuclear Physics And Medical Image Computing, Emmanuel Billias, Nikos Chrisochoides
The Graduate School Posters
Edge Detection is one of the computationally intensive modules in image analysis. It is used to find important landmarks by identifying a significant change (or “edge”) between pixels and voxels. We present a hybrid Quantum Edge Detection method by improving three aspects of an existing widely referenced implementation, which for our use cases generates incomprehensible results for the type and size of images we are required to process. Our contributions are in the pre- and post-processing (i.e., classical phase) and a quantum edge detection circuit: (1) we use space- filling curves to eliminate image artifacts introduced by the image decomposition, …
Robots Still Outnumber Humans In Web Archives In 2019, But Less Than In 2012, Himarsha R. Jayanetti, Kritika Garg, Sawood Alam, Michael L. Nelson, Michele C. Weigle
Robots Still Outnumber Humans In Web Archives In 2019, But Less Than In 2012, Himarsha R. Jayanetti, Kritika Garg, Sawood Alam, Michael L. Nelson, Michele C. Weigle
College of Sciences Posters
To identify robots and human users in web archives, we conducted a study using the access logs from the Internet Archive’s (IA) Wayback Machine in 2012 (IA2012), 2015 (IA2015), and 2019 (IA2019), and the Portuguese Web Archive (PT) in 2019 (PT2019). We identified user sessions in the access logs and classified them as human or robot based on their browsing behavior. In 2013, AlNoamany et al. [1] studied the user access patterns using IA access logs from 2012. They established four web archive user access patterns: single-page access (Dip), access to the same page at multiple archive times (Dive), access …
Metaenhance: Metadata Quality Improvement For Electronic Theses And Dissertations, Muntabir H. Choudhury, Lamia Salsabil, Himarsha R. Jayanetti, Jian Wu
Metaenhance: Metadata Quality Improvement For Electronic Theses And Dissertations, Muntabir H. Choudhury, Lamia Salsabil, Himarsha R. Jayanetti, Jian Wu
College of Sciences Posters
Metadata quality is crucial for digital objects to be discovered through digital library interfaces. Although DL systems have adopted Dublin Core to standardize metadata formats (e.g., ETD-MS v1.11), the metadata of digital objects may contain incomplete, inconsistent, and incorrect values [1]. Most existing frameworks to improve metadata quality rely on crowdsourced correction approaches, e.g., [2]. Such methods are usually slow and biased toward documents that are more discoverable by users. Artificial intelligence (AI) based methods can be adopted to overcome this limit by automatically detecting, correcting, and canonicalizing the metadata, featuring quick and unbiased responses to document metadata. …
Adhd Prediction Through Analysis Of Eye Movements With Graph Convolution Network, Gavindya Jayawardena, Sampath Jayarathna, Yi He
Adhd Prediction Through Analysis Of Eye Movements With Graph Convolution Network, Gavindya Jayawardena, Sampath Jayarathna, Yi He
College of Sciences Posters
Processing speech with background noise requires appropriate parsing of the distorted auditory signal, fundamental language abilities as well as higher signal-to-noise ratio. Adolescents with ADHD have difficulty processing speech with background noise due to reduced inhibitory control and working memory capacity. In this study we utilize Audiovisual Speech-In-Noise performance and eye-tracking measures of young adults with ADHD compared to age-matched controls, and generate graphs for ADHD evaluation using the eye-tracking data. We form graphs utilizing the eight eye-tracking features (fixation count, average, total, and standard deviation of fixation duration, max and min saccade peak velocity, min, average, and standard deviation …
Completeness Of Nominal Props, Samuel Balco, Alexander Kurz
Completeness Of Nominal Props, Samuel Balco, Alexander Kurz
Engineering Faculty Articles and Research
We introduce nominal string diagrams as string diagrams internal in the category of nominal sets. This leads us to define nominal PROPs and nominal monoidal theories. We show that the categories of ordinary PROPs and nominal PROPs are equivalent. This equivalence is then extended to symmetric monoidal theories and nominal monoidal theories, which allows us to transfer completeness results between ordinary and nominal calculi for string diagrams.
Crosshair Optimizer, Jason Torrence
Crosshair Optimizer, Jason Torrence
All Master's Theses
Metaheuristic optimization algorithms are heuristics that are capable of creating a "good enough'' solution to a computationally complex problem. Algorithms in this area of study are focused on the process of exploration and exploitation: exploration of the solution space and exploitation of the results that have been found during that exploration, with most resources going toward the former half of the process. The novel Crosshair optimizer developed in this thesis seeks to take advantage of the latter, exploiting the best possible result as much as possible by directly searching the area around that best result with a stochastic approach. This …
X-Disetrac: Distributed Eye-Tracking With Extended Realities, Bhanuka Mahanama, Sampath Jayarathna
X-Disetrac: Distributed Eye-Tracking With Extended Realities, Bhanuka Mahanama, Sampath Jayarathna
College of Sciences Posters
Humans use heterogeneous collaboration mediums such as in-person, online, and extended realities for day-to-day activities. Identifying patterns in viewpoints and pupillary responses (a.k.a eye-tracking data) provide informative cues on individual and collective behavior during collaborative tasks. Despite the increasing ubiquity of these different mediums, the aggregation and analysis of eye-tracking data in heterogeneous collaborative environments remain unexplored. Our study proposes X-DisETrac: Extended Distributed Eye Tracking, a versatile framework for eye tracking in heterogeneous environments. Our approach tackles the complexity by establishing a platform-agnostic communication protocol encompassing three data streams to simplify data aggregation and …
Famaid: A Tool For Aiding People With Disability, Mohamad Maad, Ahmad Owaydate, Mohammad Kojok, Firas Aboudaher, Layal Abu Daher, May Itani
Famaid: A Tool For Aiding People With Disability, Mohamad Maad, Ahmad Owaydate, Mohammad Kojok, Firas Aboudaher, Layal Abu Daher, May Itani
BAU Journal - Science and Technology
People with disabilities suffer from discrimination and obstacles that restrict them from participating in society on an equal basis with others every day. They are deprived of their rights to be included in ordinary school systems and even in the work market. In the process of raising awareness, facilitating dailyroutines, and developing guidance, the idea of assisting such people with handy tools/software arose and was implemented in the FamAid tool. FamAid offers people with hearing disability the opportunity to be engaged in the society through many facilities. In this work, we implemented a web application that serves as a community …
Explainable Ai Helps Bridge The Ai Skills Gap: Evidence From A Large Bank, Selina Carter, Jonathan Hersh
Explainable Ai Helps Bridge The Ai Skills Gap: Evidence From A Large Bank, Selina Carter, Jonathan Hersh
Economics Faculty Articles and Research
Advances in machine learning have created an “AI skills gap” both across and within firms. As AI becomes embedded in firm processes, it is unknown how this will impact the digital divide between workers with and without AI skills. In this paper we ask whether managers trust AI to predict consequential events, what manager characteristics are associated with increasing trust in AI predictions, and whether explainable AI (XAI) affects users’ trust in AI predictions. Partnering with a large bank, we generated AI predictions for whether a loan will be late in its final disbursement. We embedded these predictions into a …
Analyzing Business-Focused Social Networks In Hiring: The Influence Of A Job Candidate's Network On A Recruiter's Hiring Recommendation, Hannah V. Kibby
Analyzing Business-Focused Social Networks In Hiring: The Influence Of A Job Candidate's Network On A Recruiter's Hiring Recommendation, Hannah V. Kibby
Theses and Dissertations
Social media has altered the ways in which people interact. Business-focused social media profiles, such as those on LinkedIn, can act as a proxy for a traditional resume. However, these websites differ from a traditional resume in that information presented is sometimes informal, personal, and irrelevant to the member’s career. Furthermore, HR employees are able to view a job candidate’s social network. This research investigates the influence of a recruiter’s knowledge of an applicant’s professional network on the recruiter’s perception of the applicant’s trustworthiness and hence their willingness to take risk in the hiring relationship. A review of the literature …
Detecting Selfish Mining Attacks Against A Blockchain Using Machine Learing, Matthew A. Peterson
Detecting Selfish Mining Attacks Against A Blockchain Using Machine Learing, Matthew A. Peterson
Theses and Dissertations
Selfish mining is an attack against a blockchain where miners hide newly discovered blocks instead of publishing them to the rest of the network. Selfish mining has been a potential issue for blockchains since it was first discovered by Eyal and Sirer. It can be used by malicious miners to earn a disproportionate share of the mining rewards or in conjunction with other attacks to steal money from network users. Several of these attacks were launched in 2018, 2019, and 2020 with the attackers stealing as much as $18 Million. Developers made several different attempts to fix this issue, but …
Computer Engineering Education, Marilyn Wolf
Computer Engineering Education, Marilyn Wolf
CSE Conference and Workshop Papers
Computer engineering is a rapidly evolving discipline. How should we teach it to our students?
This virtual roundtable on computer engineering education was conducted in summer 2022 over a combination of email and virtual meetings. The panel considered what topics are of importance to the computer engineering curriculum, what distinguishes computer engineering from related disciplines, and how computer engineering concepts should be taught.
A Blockchain Based Policy Framework For The Management Of Electronic Health Record (Ehrs), Aysha Ali Mohammed Murad Qambar
A Blockchain Based Policy Framework For The Management Of Electronic Health Record (Ehrs), Aysha Ali Mohammed Murad Qambar
Theses
The rapid development of information technology during the last decade has greatly influenced all aspects of society, including individuals and enterprise organizations. Adopting new technologies by individuals and organizations depends on several factors, such as usability, available resources, support needed for adoption benefits, and return on investment, to mention a few. When it comes to the adoption of new technologies, one of the main challenges faced by organizations is the ability to effectively incorporate such technologies into their enterprise solutions to maximize the expected benefits. For the last several years, Blockchain technology has become a popular trend in a variety …
Communicative Information Visualizations: How To Make Data More Understandable By The General Public, Alyxander Burns
Communicative Information Visualizations: How To Make Data More Understandable By The General Public, Alyxander Burns
Doctoral Dissertations
Although data visualizations have been around for centuries and are encountered frequently by the general public, existing evidence suggests that a significant portion of people have difficulty understanding and interpreting them. It might not seem like a big problem when a reader misreads a weather map and finds themselves without an umbrella in a rainstorm, but for those who lack the means, experience, or ability to make sense of data, misreading a data visualization concerning public health and safety could be a matter of life and death. However, figuring out how to make visualizations truly usable for a diverse audience …
Computing Concept: Genealogy Potential, Power, Arithmetic, Algorithm And Ritual Of Computation, Yuhang Liu, Fei Zhang
Computing Concept: Genealogy Potential, Power, Arithmetic, Algorithm And Ritual Of Computation, Yuhang Liu, Fei Zhang
Bulletin of Chinese Academy of Sciences (Chinese Version)
In the new era, China needs more rational, firm, dialectical, and practical cultural confidence in the field of computational technology. The study conducted rigorous literature research, and established the correspondence between the ancient Chinese ideologies and different focuses of computation. The study proposes the computation concept genealogy (i.e., potential, power, arithmetic, algorithm, and ritual of computation) to deepen the multi-dimensional understanding of the concept of computation, and gives some suggestions for cultivating the computational culture that is facing the world and is of Chinese characteristics.
An Investigation Into Time Gazed At Traffic Objects By Drivers, Kolby R. Sarson
An Investigation Into Time Gazed At Traffic Objects By Drivers, Kolby R. Sarson
Electronic Thesis and Dissertation Repository
Several studies have considered driver’s attention for a multitude of distinct purposes, ranging from the analysis of a driver’s gaze and perception, to possible use in Advanced Driving Assistance Systems (ADAS). These works typically rely on simple definitions of what it means to “see,” considering a driver gazing upon an object for a single frame as being seen. In this work, we bolster this definition by introducing the concept of time. We consider a definition of ”seen” which requires an object to be gazed upon for a set length of time, or frames, before it can be considered as seen …
Agglomerative Hierarchical Clustering With Dynamic Time Warping For Household Load Curve Clustering, Fadi Almahamid, Katarina Grolinger
Agglomerative Hierarchical Clustering With Dynamic Time Warping For Household Load Curve Clustering, Fadi Almahamid, Katarina Grolinger
Electrical and Computer Engineering Publications
Energy companies often implement various demand response (DR) programs to better match electricity demand and supply by offering the consumers incentives to reduce their demand during critical periods. Classifying clients according to their consumption patterns enables targeting specific groups of consumers for DR. Traditional clustering algorithms use standard distance measurement to find the distance between two points. The results produced by clustering algorithms such as K-means, K-medoids, and Gaussian Mixture Models depend on the clustering parameters or initial clusters. In contrast, our methodology uses a shape-based approach that combines Agglomerative Hierarchical Clustering (AHC) with Dynamic Time Warping (DTW) to classify …
Virtual Sensor Middleware: Managing Iot Data For The Fog-Cloud Platform, Fadi Almahamid, Hanan Lutfiyya, Katarina Grolinger
Virtual Sensor Middleware: Managing Iot Data For The Fog-Cloud Platform, Fadi Almahamid, Hanan Lutfiyya, Katarina Grolinger
Electrical and Computer Engineering Publications
This paper introduces the Virtual Sensor Middleware (VSM), which facilitates distributed sensor data processing on multiple fog nodes. VSM uses a Virtual Sensor as the core component of the middleware. The virtual sensor concept is redesigned to support functionality beyond sensor/device virtualization, such as deploying a set of virtual sensors to represent an IoT application and distributed sensor data processing across multiple fog nodes. Furthermore, the virtual sensor deals with the heterogeneous nature of IoT devices and the various communication protocols using different adapters to communicate with the IoT devices and the underlying protocol. VSM uses the publish-subscribe design pattern …
Towards Qos-Based Embedded Machine Learning, Tom Springer, Erik Linstead, Peiyi Zhao, Chelsea Parlett-Pelleriti
Towards Qos-Based Embedded Machine Learning, Tom Springer, Erik Linstead, Peiyi Zhao, Chelsea Parlett-Pelleriti
Engineering Faculty Articles and Research
Due to various breakthroughs and advancements in machine learning and computer architectures, machine learning models are beginning to proliferate through embedded platforms. Some of these machine learning models cover a range of applications including computer vision, speech recognition, healthcare efficiency, industrial IoT, robotics and many more. However, there is a critical limitation in implementing ML algorithms efficiently on embedded platforms: the computational and memory expense of many machine learning models can make them unsuitable in resource-constrained environments. Therefore, to efficiently implement these memory-intensive and computationally expensive algorithms in an embedded computing environment, innovative resource management techniques are required at the …
(Si10-124) Inverse Reconstruction Methodologies: A Review, Deepika Saini
(Si10-124) Inverse Reconstruction Methodologies: A Review, Deepika Saini
Applications and Applied Mathematics: An International Journal (AAM)
The three-dimensional reconstruction problem is a longstanding ill-posed problem, which has made enormous progress in the field of computer vision. This field has attracted increasing interest and demonstrated an impressive performance. Due to a long era of increasing evolution, this paper presents an extensive review of the developments made in this field. For the three dimensional visualization, researchers have focused on the developments of three dimensional information and acquisition methodologies from two dimensional scenes or objects. These acquisition methodologies require a complex calibration procedure which is not practical in general. Hence, the requirement of flexibility was much needed in all …
Cov-Inception: Covid-19 Detection Tool Using Chest X-Ray, Aswini Thota, Ololade Awodipe, Rashmi Patel
Cov-Inception: Covid-19 Detection Tool Using Chest X-Ray, Aswini Thota, Ololade Awodipe, Rashmi Patel
SMU Data Science Review
Since the pandemic started, researchers have been trying to find a way to detect COVID-19 which is a cost-effective, fast, and reliable way to keep the economy viable and running. This research details how chest X-ray radiography can be utilized to detect the infection. This can be for implementation in Airports, Schools, and places of business. Currently, Chest imaging is not a first-line test for COVID-19 due to low diagnostic accuracy and confounding with other viral pneumonia. Different pre-trained algorithms were fine-tuned and applied to the images to train the model and the best model obtained was fine-tuned InceptionV3 model …
A Roller Coaster For The Mind: Virtual Reality Sickness Modes, Metrics, And Mitigation, Dalton C. Sparks
A Roller Coaster For The Mind: Virtual Reality Sickness Modes, Metrics, And Mitigation, Dalton C. Sparks
The Cardinal Edge
Understanding and preventing virtual reality sickness(VRS), or cybersickness, is vital in removing barriers for the technology's adoption. Thus, this article aims to synthesize a variety of academic sources to demonstrate the modes by which VRS occurs, the metrics by which it is judged, and the methods to mitigate it. The predominant theories on the biological origins of VRS are discussed, as well as the individual factors which increase the likelihood of a user developing VRS. Moreover, subjective and physiological measurements of VRS are discussed in addition to the development of a predictive model and conceptual framework. Finally, several methodologies of …
Parasol: Efficient Parallel Synthesis Of Large Model Spaces, Clay Stevens, Hamid Bagheri
Parasol: Efficient Parallel Synthesis Of Large Model Spaces, Clay Stevens, Hamid Bagheri
CSE Conference and Workshop Papers
Formal analysis is an invaluable tool for software engineers, yet state-of-the-art formal analysis techniques suffer from well-known limitations in terms of scalability. In particular, some software design domains—such as tradeoff analysis and security analysis—require systematic exploration of potentially huge model spaces, which further exacerbates the problem. Despite this present and urgent challenge, few techniques exist to support the systematic exploration of large model spaces. This paper introduces Parasol, an approach and accompanying tool suite, to improve the scalability of large-scale formal model space exploration. Parasol presents a novel parallel model space synthesis approach, backed with unsupervised learning to automatically derive …
Algorithm-Based Fault Tolerance At Scale, Hayden Estes
Algorithm-Based Fault Tolerance At Scale, Hayden Estes
Summer Community of Scholars Posters (RCEU and HCR Combined Programs)
No abstract provided.
Influence Level Prediction On Social Media Through Multi-Task And Sociolinguistic User Characteristics Modeling, Denys Katerenchuk
Influence Level Prediction On Social Media Through Multi-Task And Sociolinguistic User Characteristics Modeling, Denys Katerenchuk
Dissertations, Theses, and Capstone Projects
Prediction of a user’s influence level on social networks has attracted a lot of attention as human interactions move online. Influential users have the ability to influence others’ behavior to achieve their own agenda. As a result, predicting users’ level of influence online can help to understand social networks, forecast trends, prevent misinformation, etc. The research on user influence in social networks has attracted much attention across multiple disciplines, from social sciences to mathematics, yet it is still not well understood. One of the difficulties is that the definition of influence is specific to a particular problem or a domain, …
Towards Explaining Variation In Entrainment, Andreas Weise
Towards Explaining Variation In Entrainment, Andreas Weise
Dissertations, Theses, and Capstone Projects
Entrainment refers to the tendency of human speakers to adapt to their interlocutors to become more similar to them. This affects various dimensions and occurs in many contexts, allowing for rich applications in human-computer interaction. However, it is not exhibited by every speaker in every conversation but varies widely across features, speakers, and contexts, hindering broad application. This variation, whose guiding principles are poorly understood even after decades of entrainment research, is the subject of this thesis. We begin with a comprehensive literature review that serves as the foundation of our own work and provides a reference to guide future …
Finite Gaussian Neurons: Defending Against Adversarial Attacks By Making Neural Networks Say "I Don’T Know", Felix Grezes
Finite Gaussian Neurons: Defending Against Adversarial Attacks By Making Neural Networks Say "I Don’T Know", Felix Grezes
Dissertations, Theses, and Capstone Projects
In this work, I introduce the Finite Gaussian Neuron (FGN), a novel neuron architecture for artificial neural networks aimed at protecting against adversarial attacks.
Since 2014, artificial neural networks have been known to be vulnerable to adversarial attacks, which can fool the network into producing wrong or nonsensical outputs by making humanly imperceptible alterations to inputs. While defenses against adversarial attacks have been proposed, they usually involve retraining a new neural network from scratch, a costly task.
My works aims to:
- easily convert existing models to Finite Gaussian Neuron architecture,
- while preserving the existing model's behavior on real …
How Facial Features Convey Attention In Stationary Environments, Janelle Domantay, Brendan Morris
How Facial Features Convey Attention In Stationary Environments, Janelle Domantay, Brendan Morris
Spectra Undergraduate Research Journal
Awareness detection technologies have been gaining traction in a variety of enterprises; most often used for driver fatigue detection, recent research has shifted towards using computer vision technologies to analyze user attention in environments such as online classrooms. This paper aims to extend previous research on distraction detection by analyzing which visual features contribute most to predicting awareness and fatigue. We utilized the open-source facial analysis toolkit OpenFace in order to analyze visual data of subjects at varying levels of attentiveness. Then, using a Support-Vector Machine (SVM) we created several prediction models for user attention and identified the Histogram of …
Adapting An Online Learning Quality Assurance Framework In A Developing Country Setting: The Case Of A Hei In Malawi, Bennett Kankuzi, Menard Phiri, Robert Chanunkha, Jonathan Makuwira, Paul Makocho
Adapting An Online Learning Quality Assurance Framework In A Developing Country Setting: The Case Of A Hei In Malawi, Bennett Kankuzi, Menard Phiri, Robert Chanunkha, Jonathan Makuwira, Paul Makocho
African Conference on Information Systems and Technology
Covid-19 prompted many higher education institutions (HEIs), even in developing countries like Malawi, to abruptly shift from their traditional face-to-face mode of delivery to online learning. However, quality issues with online learning remain one of the greatest challenges to acceptance of online learning by many students and stakeholders. This paper presents an action research based study at the Malawi University of Science and Technology, in which an online learning quality assurance framework is adapted to a developed country setting. The adapted framework builds on the Online Learning Consortium (OLC) Quality Scorecard for the Administration of Online Programs. The contextualization and …