Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

53,913 Full-Text Articles 69,332 Authors 20,935,862 Downloads 371 Institutions

All Articles in Computer Sciences

Faceted Search

53,913 full-text articles. Page 1 of 1950.

Detection And Classification Of Diabetic Retinopathy Using Deep Learning Models, Aishat Olatunji 2024 East Tennessee State University

Detection And Classification Of Diabetic Retinopathy Using Deep Learning Models, Aishat Olatunji

Electronic Theses and Dissertations

Healthcare analytics leverages extensive patient data for data-driven decision-making, enhancing patient care and results. Diabetic Retinopathy (DR), a complication of diabetes, stems from damage to the retina’s blood vessels. It can affect both type 1 and type 2 diabetes patients. Ophthalmologists employ retinal images for accurate DR diagnosis and severity assessment. Early detection is crucial for preserving vision and minimizing risks. In this context, we utilized a Kaggle dataset containing patient retinal images, employing Python’s versatile tools. Our research focuses on DR detection using deep learning techniques. We used a publicly available dataset to apply our proposed neural network and …


Decentralized Unknown Building Exploration By Frontier Incentivization And Voronoi Segmentation In A Communication Restricted Domain, Huzeyfe M. Kocabas 2024 Utah State University

Decentralized Unknown Building Exploration By Frontier Incentivization And Voronoi Segmentation In A Communication Restricted Domain, Huzeyfe M. Kocabas

All Graduate Theses and Dissertations, Fall 2023 to Present

Exploring unknown environments using multiple robots poses a complex challenge, particularly in situations where communication between robots is either impossible or limited. Existing exploration techniques exhibit research gaps due to unrealistic communication assumptions or the computational complexities associated with exploration strategies in unfamiliar domains. In our investigation of multi-robot exploration in unknown areas, we employed various exploration and coordination techniques, evaluating their performance in terms of robustness and efficiency across different levels of environmental complexity.

Our research is centered on optimizing the exploration process through strategic agent distribution. We initially address the challenge of city roadway coverage, aiming to minimize …


Exploring Practical Measures As An Approach For Measuring Elementary Students’ Attitudes Towards Computer Science, Umar Shehzad, Mimi M. Recker, Jody E. Clarke-Midura 2024 Utah State University

Exploring Practical Measures As An Approach For Measuring Elementary Students’ Attitudes Towards Computer Science, Umar Shehzad, Mimi M. Recker, Jody E. Clarke-Midura

Publications

This paper presents a novel approach for predicting the outcomes of elementary students’ participation in computer science (CS) instruction by using exit tickets, a type of practical measure, where students provide rapid feedback on their instructional experiences. Such feedback can help teachers to inform ongoing teaching and instructional practices. We fit a Structural Equation Model to examine whether students' perceptions of enjoyment, ease, and connections between mathematics and CS in an integrated lesson predicted their affective outcomes in self-efficacy, interest, and CS identity, collected in a pre- post- survey. We found that practical measures can validly measure student experiences.


Transiam: Aggregating Multi-Modal Visual Features With Locality For Medical Image Segmentation, Xuejian LI, Shiqiang MA, Junhai XU, Jijun TANG, Shengfeng HE, Fei GUO 2024 Central South University

Transiam: Aggregating Multi-Modal Visual Features With Locality For Medical Image Segmentation, Xuejian Li, Shiqiang Ma, Junhai Xu, Jijun Tang, Shengfeng He, Fei Guo

Research Collection School Of Computing and Information Systems

Automatic segmentation of medical images plays an important role in the diagnosis of diseases. On single-modal data, convolutional neural networks have demonstrated satisfactory performance. However, multi-modal data encompasses a greater amount of information rather than single-modal data. Multi-modal data can be effectively used to improve the segmentation accuracy of regions of interest by analyzing both spatial and temporal information. In this study, we propose a dual-path segmentation model for multi-modal medical images, named TranSiam. Taking into account that there is a significant diversity between the different modalities, TranSiam employs two parallel CNNs to extract the features which are specific to …


Simulated Annealing With Reinforcement Learning For The Set Team Orienteering Problem With Time Windows, Vincent F. YU, Nabila Y. SALSABILA, Shih-W LIN, Aldy GUNAWAN 2024 Singapore Management University

Simulated Annealing With Reinforcement Learning For The Set Team Orienteering Problem With Time Windows, Vincent F. Yu, Nabila Y. Salsabila, Shih-W Lin, Aldy Gunawan

Research Collection School Of Computing and Information Systems

This research investigates the Set Team Orienteering Problem with Time Windows (STOPTW), a new variant of the well-known Team Orienteering Problem with Time Windows and Set Orienteering Problem. In the STOPTW, customers are grouped into clusters. Each cluster is associated with a profit attainable when a customer in the cluster is visited within the customer's time window. A Mixed Integer Linear Programming model is formulated for STOPTW to maximizing total profit while adhering to time window constraints. Since STOPTW is an NP-hard problem, a Simulated Annealing with Reinforcement Learning (SARL) algorithm is developed. The proposed SARL incorporates the core concepts …


Stopguess: A Framework For Public-Key Authenticated Encryption With Keyword Search, Tao XIANG, Zhongming WANG, Biwen CHEN, Xiaoguo LI, Peng WANG, Fei CHEN 2024 Singapore Management University

Stopguess: A Framework For Public-Key Authenticated Encryption With Keyword Search, Tao Xiang, Zhongming Wang, Biwen Chen, Xiaoguo Li, Peng Wang, Fei Chen

Research Collection School Of Computing and Information Systems

Public key encryption with keyword search (PEKS) allows users to search on encrypted data without leaking the keyword information from the ciphertexts. But it does not preserve keyword privacy within the trapdoors, because an adversary (e.g., untrusted server) might launch inside keyword-guessing attacks (IKGA) to guess keywords from the trapdoors. In recent years, public key authenticated encryption with keyword search (PAEKS) has become a promising primitive to counter the IKGA. However, existing PAEKS schemes focus on the concrete construction of PAEKS, making them unable to support modular construction, intuitive proof, or flexible extension. In this paper, our proposal called “StopGuess” …


Screening Through A Broad Pool: Towards Better Diversity For Lexically Constrained Text Generation, Changsen YUAN, Heyan HUANG, Yixin CAO, Qianwen CAO 2024 Singapore Management University

Screening Through A Broad Pool: Towards Better Diversity For Lexically Constrained Text Generation, Changsen Yuan, Heyan Huang, Yixin Cao, Qianwen Cao

Research Collection School Of Computing and Information Systems

Lexically constrained text generation (CTG) is to generate text that contains given constrained keywords. However, the text diversity of existing models is still unsatisfactory. In this paper, we propose a lightweight dynamic refinement strategy that aims at increasing the randomness of inference to improve generation richness and diversity while maintaining a high level of fluidity and integrity. Our basic idea is to enlarge the number and length of candidate sentences in each iteration, and choose the best for subsequent refinement. On the one hand, different from previous works, which carefully insert one token between two words per action, we insert …


Dataset Of Arabic Spam And Ham Tweets, Sanaa Kaddoura, Safaa Henno 2024 Zayed University

Dataset Of Arabic Spam And Ham Tweets, Sanaa Kaddoura, Safaa Henno

All Works

This data article provides a dataset of 132421 posts and their corresponding information collected from Twitter social media. The data has two classes, ham or spam, where ham indicates non-spam clean tweets. The main target of this dataset is to study a way to classify whether a post is a spam or not automatically. The data is in Arabic language only, which makes the data essential to the researchers in Arabic natural language processing (NLP) due to the lack of resources in this language. The data is made publicly available to allow researchers to use it as a benchmark for …


Recommendations With Minimum Exposure Guarantees: A Post-Processing Framework, Ramon LOPES, Rodrigo ALVES, Antoine LEDENT, Rodrygo L. T. SANTOS, Marius KLOFT 2024 Singapore Management University

Recommendations With Minimum Exposure Guarantees: A Post-Processing Framework, Ramon Lopes, Rodrigo Alves, Antoine Ledent, Rodrygo L. T. Santos, Marius Kloft

Research Collection School Of Computing and Information Systems

Relevance-based ranking is a popular ingredient in recommenders, but it frequently struggles to meet fairness criteria because social and cultural norms may favor some item groups over others. For instance, some items might receive lower ratings due to some sort of bias (e.g. gender bias). A fair ranking should balance the exposure of items from advantaged and disadvantaged groups. To this end, we propose a novel post-processing framework to produce fair, exposure-aware recommendations. Our approach is based on an integer linear programming model maximizing the expected utility while satisfying a minimum exposure constraint. The model has fewer variables than previous …


Foodmask: Real-Time Food Instance Counting, Segmentation And Recognition, Huu-Thanh NGUYEN, Yu CAO, Chong-wah NGO, Wing-Kwong CHAN 2024 Singapore Management University

Foodmask: Real-Time Food Instance Counting, Segmentation And Recognition, Huu-Thanh Nguyen, Yu Cao, Chong-Wah Ngo, Wing-Kwong Chan

Research Collection School Of Computing and Information Systems

Food computing has long been studied and deployed to several applications. Understanding a food image at the instance level, including recognition, counting and segmentation, is essential to quantifying nutrition and calorie consumption. Nevertheless, existing techniques are limited to either category-specific instance detection, which does not reflect precisely the instance size at the pixel level, or category-agnostic instance segmentation, which is insufficient for dish recognition. This paper presents a compact and fast multi-task network, namely FoodMask, for clustering-based food instance counting, segmentation and recognition. The network learns a semantic space simultaneously encoding food category distribution and instance height at pixel basis. …


Genome-Wide Profiling Of Novel Conserved Zea Mays Micrornas Along With Their Key Biological, Molecular And Cellular Targets And Validation Using An Rt-Pcr Platform, Abdul Baqi, Samiullah Samiullah, Muhammad Ayub, Muhammad Zafar Saleem, Ghulam Mustafa Khan, Asad Ullah 2024 Colleges, Higher and Technical Education Department, Balochistan, Quetta-Pakistan

Genome-Wide Profiling Of Novel Conserved Zea Mays Micrornas Along With Their Key Biological, Molecular And Cellular Targets And Validation Using An Rt-Pcr Platform, Abdul Baqi, Samiullah Samiullah, Muhammad Ayub, Muhammad Zafar Saleem, Ghulam Mustafa Khan, Asad Ullah

Karbala International Journal of Modern Science

MicroRNAs (miRNAs), which are typically non-coding RNAs that start off as endogenous molecules and regulate post-transcriptional levels of gene expression by mRNA degradation or translational repression. They are 18–26 nucleotides long, evolutionarily conserved and essential for predicting novel miRNAs in a variety of plants. Maize (Zea mays) is a significant food and forage crop in the globe today. In the present study, many maize miRNAs have been found to be associated with both plant development and responses to stress. In this study, 66 unique conserved maize miRNAs from 65 different miRNA families were predicted using several genomics-based methods …


The Role Of Cu (0-0.03) And Zn (0.02) Substitution On The Structural, Optical And Magnetic Properties Of Mgo Nanoparticles, S. Naseem Shah, Atif Dawar, Yasmeen Bibi, Abid Ali, M. Asif Siddiqui 2024 Department of Physics, Federal Urdu University of Arts, Science and Technology, Karachi, Pakistan,

The Role Of Cu (0-0.03) And Zn (0.02) Substitution On The Structural, Optical And Magnetic Properties Of Mgo Nanoparticles, S. Naseem Shah, Atif Dawar, Yasmeen Bibi, Abid Ali, M. Asif Siddiqui

Karbala International Journal of Modern Science

The co-precipitation method was employed to prepared Cu (0-0.03) and Zn (0.02) dual doped MgO nanoparticles. The secondary phases of CuO and Cu2O were observed along with the cubical phase of MgO. The doping induced effect was noticed for the crystallite size variations (14.39-19.89 nm). The morphological transformation from spherical to rice-like shape were observed. The estimated values of optical bandgap (4.66-4.45 eV) were well correlated with the crystallite size and dopant concentrations. The ferromagnetic ordering was observed at room temperature and the enchantment in the coercivity (142.27 Oe) with Zn (0.02) doping was noticed. Such type of …


Towards Assessing Cybersecurity Posture Of Manufacturing Companies: Review And Recommendations, John Del Vecchio, Yair Levy, Ling Wang, Ajoy Kumar 2024 Nova Southeastern University

Towards Assessing Cybersecurity Posture Of Manufacturing Companies: Review And Recommendations, John Del Vecchio, Yair Levy, Ling Wang, Ajoy Kumar

KSU Proceedings on Cybersecurity Education, Research and Practice

With the continued changes in the way businesses work, cyber-attack targets are in a constant state of flux between organizations, individuals, as well as various aspects of the supply chain of interconnected goods and services. As one of the 16 critical infrastructure sectors, the manufacturing sector is known for complex integrated Information Systems (ISs) that are incorporated heavily into production operations. Many of these ISs are procured and supported by third parties, also referred to as interconnected entities in the supply chain. Disruptions to manufacturing companies would not only have significant financial losses but would also have economic and safety …


Quantum Computing: Computing Of The Future Made Reality, Janelle Mathis 2024 University of North Georgia

Quantum Computing: Computing Of The Future Made Reality, Janelle Mathis

KSU Proceedings on Cybersecurity Education, Research and Practice

Abstract—Quantum computing is an emerging new area focused on technology consisting of quantum theory aspects such as electrons, sub-atomic particles, and other materials engineered using quantum mechanics. Through quantum mechanics, these computers can solve problems that classical computers deem too complex. Today the closest computing technology compared to quantum computers are supercomputers, but similarly to classical computers, supercomputers also have faults. With supercomputers, when a problem is deemed too complex, it is due to the classical machinery components within the computer, thus causing a halt in solving the task or problem. In contrast, these problems could be solved with a …


Rfid Key Fobs In Vehicles: Unmasking Vulnerabilities & Strengthening Security, Devon Magda, Bryson R. Payne 2024 University of North Georgia

Rfid Key Fobs In Vehicles: Unmasking Vulnerabilities & Strengthening Security, Devon Magda, Bryson R. Payne

KSU Proceedings on Cybersecurity Education, Research and Practice

No abstract provided.


The Impact Of Individual Techno-Characteristics On Information Privacy Concerns In The Diffusion Of Mobile Contact Tracing, Jiesen Lin, Dapeng Liu, Lemuria Carter 2024 University of New South Wales

The Impact Of Individual Techno-Characteristics On Information Privacy Concerns In The Diffusion Of Mobile Contact Tracing, Jiesen Lin, Dapeng Liu, Lemuria Carter

KSU Proceedings on Cybersecurity Education, Research and Practice

In the wake of the global health crisis, mobile contact tracing applications have emerged as important tools in managing disease spread. However, their effectiveness heavily relies on mass adoption, significantly influenced by the public's information privacy concerns. To date, systematic examination of how these privacy concerns relate to the innovation adopter categories in mobile contact tracing remains sparse. Furthermore, the influence of individual techno-characteristics on these concerns is to be explored. This research seeks to fill these gaps. Drawing on the diffusion of innovation theory, we examine the impact of the key techno-characteristics—adopter category, propensity for identification misrepresentation, and exposure …


Exploring Information Privacy Concerns During The Covid-19 Pandemic: A Juxtaposition Of Three Models, Dapeng Liu, Lemuria Carter, Jiesen Lin 2024 University of Sydney, Australia

Exploring Information Privacy Concerns During The Covid-19 Pandemic: A Juxtaposition Of Three Models, Dapeng Liu, Lemuria Carter, Jiesen Lin

KSU Proceedings on Cybersecurity Education, Research and Practice

Government agencies across the globe utilize mobile applications to interact with constituents. In response to the global pandemic, several nations have employed contact tracing services to manage the spread of COVID-19. Extent literature includes various models that explore information privacy. Several researchers have highlighted the need to compare the effectiveness of diverse information privacy models. To fill this gap, we explore the impact of information privacy concerns on citizens’ willingness to download a federal contact tracing app. In particular, we compare three types of prevalent information privacy concerns: global information privacy concerns (GIPC), concern for information privacy (CFIP), and internet …


Understanding Trust Drivers Of S-Commerce, Mousa Al-kfairy, Ahmed Shuhaiber, Ayman Wael Al-khatib, Saed Alrabaee, Souheil Khaddaj 2024 Zayed University

Understanding Trust Drivers Of S-Commerce, Mousa Al-Kfairy, Ahmed Shuhaiber, Ayman Wael Al-Khatib, Saed Alrabaee, Souheil Khaddaj

All Works

Trust has emerged as a pillar in the acceptance and use of new technologies in the ever-changing digital landscape, notably in the booming field of social commerce. The importance of this study lies in the fact that it explores in-depth the aspects of customer trust in Instashopping using new constructs that have yet to be explored in s-commerce literature. Focusing on Instashopping, the research proposed a multi-dimensional model of trust to examine the dynamics of user trust in social commerce platforms and analyses the effects of various factors, including institution-based trust, disposition to trust, personal inventiveness, perceived page quality, and …


Future Frame Prediction Using Generative Adversarial Networks, Nishtha Jatana, Deekshant Wadhwa, Nitesh Kumar Singh, Oday Ali Hassen, Charu Gupta, Saad Mohammed Darwish, Sundws Mustafa Mohammed, Dhyeauldeen Ahmed Farhan, Ansam Ali Abdulhussein 2024 Department of Computer Science and Engineering, Maharaja Surajmal Institute of Technology, New Delhi, India

Future Frame Prediction Using Generative Adversarial Networks, Nishtha Jatana, Deekshant Wadhwa, Nitesh Kumar Singh, Oday Ali Hassen, Charu Gupta, Saad Mohammed Darwish, Sundws Mustafa Mohammed, Dhyeauldeen Ahmed Farhan, Ansam Ali Abdulhussein

Karbala International Journal of Modern Science

The ability of a human to anticipate what is going to happen in the near future given the current situation helps in making intelligent decisions about how to react in that situation. In this paper, we have developed multiple Deep Neural Network models, intending to generate the next frame in a sequence given previous frames. In recent years, Generative Adversarial Networks (GAN) have shown promising results in the field of image generation. Hence, in this paper, we aim to create and compare two Generative Adversarial Models created for Future Frame Prediction by combining GANs with convolutional neural networks, Long Short-Term …


Piecing Together Performance: Collaborative, Participatory Research-Through-Design For Better Diversity In Games, Daniel L. Gardner, LouAnne Boyd, Reginald T. Gardner 2024 Chapman University

Piecing Together Performance: Collaborative, Participatory Research-Through-Design For Better Diversity In Games, Daniel L. Gardner, Louanne Boyd, Reginald T. Gardner

Engineering Faculty Articles and Research

Digital games are a multi-billion-dollar industry whose production and consumption extend globally. Representation in games is an increasingly important topic. As those who create and consume the medium grow ever more diverse, it is essential that player or user-experience research, usability, and any consideration of how people interface with their technology is exercised through inclusive and intersectional lenses. Previous research has identified how character configuration interfaces preface white-male defaults [39, 40, 67]. This study relies on 1-on-1 play-interviews where diverse participants attempt to create “themselves” in a series of games and on group design activities to explore how participants may …


Digital Commons powered by bepress