Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- App (1)
- Big data (1)
- Boolean algebra (1)
- Canonical relational table (1)
- Chemical Reaction (1)
-
- Coalgebraic logic (1)
- Coalgebras (1)
- Computer Vision (1)
- Concentration (1)
- Data mining (1)
- Distributed computing (1)
- Distributive lattice (1)
- Eigenfaces (1)
- Enriched category theory (1)
- Enzyme (1)
- Exact Pos-category (1)
- Facial Recognition (1)
- Fish Recognition (1)
- Fisherfaces (1)
- Hadoop (1)
- Header cross-product (1)
- Header factoring (1)
- Header-paths (1)
- IOS (1)
- Iota Pi (1)
- Kinetic (1)
- Knowledge discovery (1)
- Local Binary Pattern Histogram (1)
- Meeting (1)
- MetaMap (1)
- Publication
-
- CSE Conference and Workshop Papers (6)
- Engineering Faculty Articles and Research (4)
- Annual ADFSL Conference on Digital Forensics, Security and Law (1)
- Chancellor’s Honors Program Projects (1)
- Computer Engineering (1)
-
- Computer Science ETDs (1)
- Computer Science Publications (1)
- Computer Science and Software Engineering (1)
- Department of Computer Science Faculty Scholarship and Creative Works (1)
- Department of Computer Science and Engineering: Dissertations, Theses, and Student Research (1)
- Electronic Theses, Projects, and Dissertations (1)
- Maritime Safety & Environment Management Dissertations (Dalian) (1)
- Publication Type
Articles 1 - 20 of 20
Full-Text Articles in Other Computer Sciences
Design And Implementation Of A Stand-Alone Tool For Metabolic Simulations, Milad Ghiasi Rad
Design And Implementation Of A Stand-Alone Tool For Metabolic Simulations, Milad Ghiasi Rad
Department of Computer Science and Engineering: Dissertations, Theses, and Student Research
In this thesis, we present the design and implementation of a stand-alone tool for metabolic simulations. This system is able to integrate custom-built SBML models along with external user’s input information and produces the estimation of any reactants participating in the chain of the reactions in the provided model, e.g., ATP, Glucose, Insulin, for the given duration using numerical analysis and simulations. This tool offers the food intake arguments in the calculations to consider the personalized metabolic characteristics in the simulations. The tool has also been generalized to take into consideration of temporal genomic information and be flexible for simulation …
Comparing And Improving Facial Recognition Method, Brandon Luis Sierra
Comparing And Improving Facial Recognition Method, Brandon Luis Sierra
Electronic Theses, Projects, and Dissertations
Facial recognition is the process in which a sample face can be correctly identified by a machine amongst a group of different faces. With the never-ending need for improvement in the fields of security, surveillance, and identification, facial recognition is becoming increasingly important. Considering this importance, it is imperative that the correct faces are recognized and the error rate is as minimal as possible. Despite the wide variety of current methods for facial recognition, there is no clear cut best method. This project reviews and examines three different methods for facial recognition: Eigenfaces, Fisherfaces, and Local Binary Patterns to determine …
Research On Improving Navigation Safety Based On Big Data And Cloud Computing Technology For Qiongzhou Strait, Rui Wang
Maritime Safety & Environment Management Dissertations (Dalian)
No abstract provided.
Ancr—An Adaptive Network Coding Routing Scheme For Wsns With Different-Success-Rate Links †, Xiang Ji, Anwen Wang, Chunyu Li, Chun Ma, Yao Peng, Dajin Wang, Qingyi Hua, Feng Chen, Dingyi Fang
Ancr—An Adaptive Network Coding Routing Scheme For Wsns With Different-Success-Rate Links †, Xiang Ji, Anwen Wang, Chunyu Li, Chun Ma, Yao Peng, Dajin Wang, Qingyi Hua, Feng Chen, Dingyi Fang
Department of Computer Science Faculty Scholarship and Creative Works
As the underlying infrastructure of the Internet of Things (IoT), wireless sensor networks (WSNs) have been widely used in many applications. Network coding is a technique in WSNs to combine multiple channels of data in one transmission, wherever possible, to save node’s energy as well as increase the network throughput. So far most works on network coding are based on two assumptions to determine coding opportunities: (1) All the links in the network have the same transmission success rate; (2) Each link is bidirectional, and has the same transmission success rate on both ways. However, these assumptions may not be …
Data Extraction From Web Tables: The Devil Is In The Details, George Nagy, Sharad C. Seth, Dongpu Jin, David W. Embley, Spencer Machado, Mukkai Krishnamoorthy
Data Extraction From Web Tables: The Devil Is In The Details, George Nagy, Sharad C. Seth, Dongpu Jin, David W. Embley, Spencer Machado, Mukkai Krishnamoorthy
CSE Conference and Workshop Papers
We present a method based on header paths for efficient and complete extraction of labeled data from tables meant for humans. Although many table configurations yield to the proposed syntactic analysis, some require access to semantic knowledge. Clicking on one or two critical cells per table, through a simple interface, is sufficient to resolve most of these problem tables. Header paths, a purely syntactic representation of visual tables, can be transformed (“factored”) into existing representations of structured data such as category trees, relational tables, and RDF triples. From a random sample of 200 web tables from ten large statistical web …
End-To-End Conversion Of Html Tables For Populating A Relational Database, George Nagy, David W. Embley, Sharad C. Seth
End-To-End Conversion Of Html Tables For Populating A Relational Database, George Nagy, David W. Embley, Sharad C. Seth
CSE Conference and Workshop Papers
Automating the conversion of human-readable HTML tables into machine-readable relational tables will enable end-user query processing of the millions of data tables found on the web. Theoretically sound and experimentally successful methods for index-based segmentation, extraction of category hierarchies, and construction of a canonical table suitable for direct input to a relational database are demonstrated on 200 heterogeneous web tables. The methods are scalable: the program generates the 198 Access compatible CSV files in ~0.1s per table (two tables could not be indexed).
Distributed Knowledge Discovery For Diverse Data, Hossein Hamooni
Distributed Knowledge Discovery For Diverse Data, Hossein Hamooni
Computer Science ETDs
In the era of new technologies, computer scientists deal with massive data of size hundreds of terabytes. Smart cities, social networks, health care systems, large sensor networks, etc. are constantly generating new data. It is non-trivial to extract knowledge from big datasets because traditional data mining algorithms run impractically on such big datasets. However, distributed systems have come to aid this problem while introducing new challenges in designing scalable algorithms. The transition from traditional algorithms to the ones that can be run on a distributed platform should be done carefully. Researchers should design the modern distributed algorithms based on the …
Underwater Computer Vision - Fish Recognition, Spencer Chang, Austin Otto
Underwater Computer Vision - Fish Recognition, Spencer Chang, Austin Otto
Computer Engineering
The Underwater Computer Vision – Fish Recognition project includes the design and implementation of a device that can withstand staying underwater for a duration of time, take pictures of underwater creatures, such as fish, and be able to identify certain fish. The system is meant to be cheap to create, yet still able to process the images it takes and identify the objects in the pictures with some accuracy. The device can output its results to another device or an end user.
An Accidental Discovery Of Iot Botnets And A Method For Investigating Them With A Custom Lua Dissector, Max Gannon, Gary Warner, Arsh Arora
An Accidental Discovery Of Iot Botnets And A Method For Investigating Them With A Custom Lua Dissector, Max Gannon, Gary Warner, Arsh Arora
Annual ADFSL Conference on Digital Forensics, Security and Law
This paper presents a case study that occurred while observing peer-to-peer network communications on a botnet monitoring station and shares how tools were developed to discover what ultimately was identified as Mirai and many related IoT DDOS Botnets. The paper explains how researchers developed a customized protocol dissector in Wireshark using the Lua coding language, and how this enabled them to quickly identify new DDOS variants over a five month period of study.
Target Detection With Neural Network Hardware, Hollis Bui, Garrett Massman, Nikolas Spangler, Jalen Tarvin, Luke Bechtel, Kevin Dunn, Shawn Bradford
Target Detection With Neural Network Hardware, Hollis Bui, Garrett Massman, Nikolas Spangler, Jalen Tarvin, Luke Bechtel, Kevin Dunn, Shawn Bradford
Chancellor’s Honors Program Projects
No abstract provided.
Iota Pi Application For Ios, Deborah Newberry
Iota Pi Application For Ios, Deborah Newberry
Computer Science and Software Engineering
Kappa Kappa Psi is a national honorary fraternity for college band members. They meet every Sunday night, and during these meetings they plan events (both internal and external) that aim to meet our goal of making sure that the Cal Poly band programs have their social, financial, material, and educational needs satisfied. This paper details the steps I took to create an application for them to use internally to help ease organizational processes.
Wireless Underground Channel Diversity Reception With Multiple Antennas For Internet Of Underground Things, Abdul Salam, Mehmet C. Vuran
Wireless Underground Channel Diversity Reception With Multiple Antennas For Internet Of Underground Things, Abdul Salam, Mehmet C. Vuran
CSE Conference and Workshop Papers
Internet of underground things (IOUT) is an emerging paradigm which consists of sensors and communication devices, partly or completely buried underground for real-time soil sensing and monitoring. In this paper, the performance of different modulation schemes in IOUT communications is studied through simulations and experiments. The spatial modularity of direct, lateral, and reflected components of the UG channel is exploited by using multiple antennas. First, it has been shown that bit error rates of $10^{-3}$ can be achieved with normalized delay spreads ($\tau_d$) lower than $0.05$. Evaluations are conducted through the first software-defined radio-based field experiments for UG channel. Moreover, …
Towards Internet Of Underground Things In Smart Lighting: A Statistical Model Of Wireless Underground Channel, Abdul Salam, Mehmet C. Vuran, Suat Irmak
Towards Internet Of Underground Things In Smart Lighting: A Statistical Model Of Wireless Underground Channel, Abdul Salam, Mehmet C. Vuran, Suat Irmak
CSE Conference and Workshop Papers
The Internet of Underground Things (IOUT) has many applications in the area of smart lighting. IOUT enables communications in smart lighting through underground (UG) and aboveground (AG) communication channels. In IOUT communications, an in-depth analysis of the wireless underground channel is important to design smart lighting solutions. In this paper, based on the empirical and the statistical analysis, a statistical channel model for the UG channel has been developed. The parameters for the statistical tapped-delay-line model are extracted from the measured power delay profiles (PDP). The PDP of the UG channel is represented by the exponential decay of the lateral, …
Parsing Metamap Files In Hadoop, Amy Olex, Alberto Cano, Bridget T. Mcinnes
Parsing Metamap Files In Hadoop, Amy Olex, Alberto Cano, Bridget T. Mcinnes
Computer Science Publications
The UMLS::Association CUICollector module identifies UMLS Concept Unique Identifier bigrams and their frequencies in a biomedical text corpus. CUICollector was re-implemented in Hadoop MapReduce to improve algorithm speed, flexibility, and scalability. Evaluation of the Hadoop implementation compared to the serial module produced equivalent results and achieved a 28x speedup on a single-node Hadoop system.
Smart Underground Antenna Arrays: A Soil Moisture Adaptive Beamforming Approach, Abdul Salam, Mehmet C. Vuran
Smart Underground Antenna Arrays: A Soil Moisture Adaptive Beamforming Approach, Abdul Salam, Mehmet C. Vuran
CSE Conference and Workshop Papers
Current wireless underground (UG) communication techniques are limited by their achievable distance. In this paper, a novel framework for underground beamforming using adaptive antenna arrays is presented to extend communication distances for practical applications. Based on the analysis of propagation in wireless underground channel, a theoretical model is developed which uses soil moisture information to improve wireless underground communications performance. Array element in soil is analyzed empirically and impacts of soil type and soil moisture on return loss (RL) and resonant frequency are investigated. Accordingly, beam patterns are analyzed to communicate with underground and above ground devices. Depending on the …
Biosimp: Using Software Testing Techniques For Sampling And Inference In Biological Organisms, Mikaela Cashman, Jennie L. Catlett, Myra B. Cohen, Nicole R. Buan, Zahmeeth Sakkaff, Massimiliano Pierobon, Christine A. Kelley
Biosimp: Using Software Testing Techniques For Sampling And Inference In Biological Organisms, Mikaela Cashman, Jennie L. Catlett, Myra B. Cohen, Nicole R. Buan, Zahmeeth Sakkaff, Massimiliano Pierobon, Christine A. Kelley
CSE Conference and Workshop Papers
Years of research in software engineering have given us novel ways to reason about, test, and predict the behavior of complex software systems that contain hundreds of thousands of lines of code. Many of these techniques have been inspired by nature such as genetic algorithms, swarm intelligence, and ant colony optimization. In this paper we reverse the direction and present BioSIMP, a process that models and predicts the behavior of biological organisms to aid in the emerging field of systems biology. It utilizes techniques from testing and modeling of highly-configurable software systems. Using both experimental and simulation data we show …
Foreword: Special Issue On Coalgebraic Logic, Alexander Kurz
Foreword: Special Issue On Coalgebraic Logic, Alexander Kurz
Engineering Faculty Articles and Research
The second Dagstuhl seminar on coalgebraic logics took place from October 7-12, 2012, in the Leibniz Forschungszentrum Schloss Dagstuhl, following a successful earlier one in December 2009. From the 44 researchers who attended and the 30 talks presented, this collection highlights some of the progress that has been made in the field. We are grateful to Giuseppe Longo and his interest in a special issue in Mathematical Structures in Computer Science.
The Positivication Of Coalgebraic Logics, Fredrik Dahlqvist, Alexander Kurz
The Positivication Of Coalgebraic Logics, Fredrik Dahlqvist, Alexander Kurz
Engineering Faculty Articles and Research
We present positive coalgebraic logic in full generality, and show how to obtain a positive coalgebraic logic from a boolean one. On the model side this involves canonically computing a endofunctor T': Pos->Pos from an endofunctor T: Set->Set, in a procedure previously defined by the second author et alii called posetification. On the syntax side, it involves canonically computing a syntax-building functor L': DL->DL from a syntax-building functor L: BA->BA, in a dual procedure which we call positivication. These operations are interesting in their own right and we explicitly compute posetifications and positivications in the case …
Quasivarieties And Varieties Of Ordered Algebras: Regularity And Exactness, Alexander Kurz
Quasivarieties And Varieties Of Ordered Algebras: Regularity And Exactness, Alexander Kurz
Engineering Faculty Articles and Research
We characterise quasivarieties and varieties of ordered algebras categorically in terms of regularity, exactness and the existence of a suitable generator. The notions of regularity and exactness need to be understood in the sense of category theory enriched over posets.
We also prove that finitary varieties of ordered algebras are cocompletions of their theories under sifted colimits (again, in the enriched sense).
Features Of Agent-Based Models, Reiko Heckel, Alexander Kurz, Edmund Chattoe-Brown
Features Of Agent-Based Models, Reiko Heckel, Alexander Kurz, Edmund Chattoe-Brown
Engineering Faculty Articles and Research
The design of agent-based models (ABMs) is often ad-hoc when it comes to defining their scope. In order for the inclusion of features such as network structure, location, or dynamic change to be justified, their role in a model should be systematically analysed. We propose a mechanism to compare and assess the impact of such features. In particular we are using techniques from software engineering and semantics to support the development and assessment of ABMs, such as graph transformations as semantic representations for agent-based models, feature diagrams to identify ingredients under consideration, and extension relations between graph transformation systems to …