Detection And Classification Of Diabetic Retinopathy Using Deep Learning Models,
2024
East Tennessee State University
Detection And Classification Of Diabetic Retinopathy Using Deep Learning Models, Aishat Olatunji
Electronic Theses and Dissertations
Healthcare analytics leverages extensive patient data for data-driven decision-making, enhancing patient care and results. Diabetic Retinopathy (DR), a complication of diabetes, stems from damage to the retina’s blood vessels. It can affect both type 1 and type 2 diabetes patients. Ophthalmologists employ retinal images for accurate DR diagnosis and severity assessment. Early detection is crucial for preserving vision and minimizing risks. In this context, we utilized a Kaggle dataset containing patient retinal images, employing Python’s versatile tools. Our research focuses on DR detection using deep learning techniques. We used a publicly available dataset to apply our proposed neural network and …
Decentralized Unknown Building Exploration By Frontier Incentivization And Voronoi Segmentation In A Communication Restricted Domain,
2024
Utah State University
Decentralized Unknown Building Exploration By Frontier Incentivization And Voronoi Segmentation In A Communication Restricted Domain, Huzeyfe M. Kocabas
All Graduate Theses and Dissertations, Fall 2023 to Present
Exploring unknown environments using multiple robots poses a complex challenge, particularly in situations where communication between robots is either impossible or limited. Existing exploration techniques exhibit research gaps due to unrealistic communication assumptions or the computational complexities associated with exploration strategies in unfamiliar domains. In our investigation of multi-robot exploration in unknown areas, we employed various exploration and coordination techniques, evaluating their performance in terms of robustness and efficiency across different levels of environmental complexity.
Our research is centered on optimizing the exploration process through strategic agent distribution. We initially address the challenge of city roadway coverage, aiming to minimize …
Exploring Practical Measures As An Approach For Measuring Elementary Students’ Attitudes Towards Computer Science,
2024
Utah State University
Exploring Practical Measures As An Approach For Measuring Elementary Students’ Attitudes Towards Computer Science, Umar Shehzad, Mimi M. Recker, Jody E. Clarke-Midura
Publications
This paper presents a novel approach for predicting the outcomes of elementary students’ participation in computer science (CS) instruction by using exit tickets, a type of practical measure, where students provide rapid feedback on their instructional experiences. Such feedback can help teachers to inform ongoing teaching and instructional practices. We fit a Structural Equation Model to examine whether students' perceptions of enjoyment, ease, and connections between mathematics and CS in an integrated lesson predicted their affective outcomes in self-efficacy, interest, and CS identity, collected in a pre- post- survey. We found that practical measures can validly measure student experiences.
Transiam: Aggregating Multi-Modal Visual Features With Locality For Medical Image Segmentation,
2024
Central South University
Transiam: Aggregating Multi-Modal Visual Features With Locality For Medical Image Segmentation, Xuejian Li, Shiqiang Ma, Junhai Xu, Jijun Tang, Shengfeng He, Fei Guo
Research Collection School Of Computing and Information Systems
Automatic segmentation of medical images plays an important role in the diagnosis of diseases. On single-modal data, convolutional neural networks have demonstrated satisfactory performance. However, multi-modal data encompasses a greater amount of information rather than single-modal data. Multi-modal data can be effectively used to improve the segmentation accuracy of regions of interest by analyzing both spatial and temporal information. In this study, we propose a dual-path segmentation model for multi-modal medical images, named TranSiam. Taking into account that there is a significant diversity between the different modalities, TranSiam employs two parallel CNNs to extract the features which are specific to …
Simulated Annealing With Reinforcement Learning For The Set Team Orienteering Problem With Time Windows,
2024
Singapore Management University
Simulated Annealing With Reinforcement Learning For The Set Team Orienteering Problem With Time Windows, Vincent F. Yu, Nabila Y. Salsabila, Shih-W Lin, Aldy Gunawan
Research Collection School Of Computing and Information Systems
This research investigates the Set Team Orienteering Problem with Time Windows (STOPTW), a new variant of the well-known Team Orienteering Problem with Time Windows and Set Orienteering Problem. In the STOPTW, customers are grouped into clusters. Each cluster is associated with a profit attainable when a customer in the cluster is visited within the customer's time window. A Mixed Integer Linear Programming model is formulated for STOPTW to maximizing total profit while adhering to time window constraints. Since STOPTW is an NP-hard problem, a Simulated Annealing with Reinforcement Learning (SARL) algorithm is developed. The proposed SARL incorporates the core concepts …
Stopguess: A Framework For Public-Key Authenticated Encryption With Keyword Search,
2024
Singapore Management University
Stopguess: A Framework For Public-Key Authenticated Encryption With Keyword Search, Tao Xiang, Zhongming Wang, Biwen Chen, Xiaoguo Li, Peng Wang, Fei Chen
Research Collection School Of Computing and Information Systems
Public key encryption with keyword search (PEKS) allows users to search on encrypted data without leaking the keyword information from the ciphertexts. But it does not preserve keyword privacy within the trapdoors, because an adversary (e.g., untrusted server) might launch inside keyword-guessing attacks (IKGA) to guess keywords from the trapdoors. In recent years, public key authenticated encryption with keyword search (PAEKS) has become a promising primitive to counter the IKGA. However, existing PAEKS schemes focus on the concrete construction of PAEKS, making them unable to support modular construction, intuitive proof, or flexible extension. In this paper, our proposal called “StopGuess” …
Screening Through A Broad Pool: Towards Better Diversity For Lexically Constrained Text Generation,
2024
Singapore Management University
Screening Through A Broad Pool: Towards Better Diversity For Lexically Constrained Text Generation, Changsen Yuan, Heyan Huang, Yixin Cao, Qianwen Cao
Research Collection School Of Computing and Information Systems
Lexically constrained text generation (CTG) is to generate text that contains given constrained keywords. However, the text diversity of existing models is still unsatisfactory. In this paper, we propose a lightweight dynamic refinement strategy that aims at increasing the randomness of inference to improve generation richness and diversity while maintaining a high level of fluidity and integrity. Our basic idea is to enlarge the number and length of candidate sentences in each iteration, and choose the best for subsequent refinement. On the one hand, different from previous works, which carefully insert one token between two words per action, we insert …
Dataset Of Arabic Spam And Ham Tweets,
2024
Zayed University
Dataset Of Arabic Spam And Ham Tweets, Sanaa Kaddoura, Safaa Henno
All Works
This data article provides a dataset of 132421 posts and their corresponding information collected from Twitter social media. The data has two classes, ham or spam, where ham indicates non-spam clean tweets. The main target of this dataset is to study a way to classify whether a post is a spam or not automatically. The data is in Arabic language only, which makes the data essential to the researchers in Arabic natural language processing (NLP) due to the lack of resources in this language. The data is made publicly available to allow researchers to use it as a benchmark for …
Recommendations With Minimum Exposure Guarantees: A Post-Processing Framework,
2024
Singapore Management University
Recommendations With Minimum Exposure Guarantees: A Post-Processing Framework, Ramon Lopes, Rodrigo Alves, Antoine Ledent, Rodrygo L. T. Santos, Marius Kloft
Research Collection School Of Computing and Information Systems
Relevance-based ranking is a popular ingredient in recommenders, but it frequently struggles to meet fairness criteria because social and cultural norms may favor some item groups over others. For instance, some items might receive lower ratings due to some sort of bias (e.g. gender bias). A fair ranking should balance the exposure of items from advantaged and disadvantaged groups. To this end, we propose a novel post-processing framework to produce fair, exposure-aware recommendations. Our approach is based on an integer linear programming model maximizing the expected utility while satisfying a minimum exposure constraint. The model has fewer variables than previous …
Foodmask: Real-Time Food Instance Counting, Segmentation And Recognition,
2024
Singapore Management University
Foodmask: Real-Time Food Instance Counting, Segmentation And Recognition, Huu-Thanh Nguyen, Yu Cao, Chong-Wah Ngo, Wing-Kwong Chan
Research Collection School Of Computing and Information Systems
Food computing has long been studied and deployed to several applications. Understanding a food image at the instance level, including recognition, counting and segmentation, is essential to quantifying nutrition and calorie consumption. Nevertheless, existing techniques are limited to either category-specific instance detection, which does not reflect precisely the instance size at the pixel level, or category-agnostic instance segmentation, which is insufficient for dish recognition. This paper presents a compact and fast multi-task network, namely FoodMask, for clustering-based food instance counting, segmentation and recognition. The network learns a semantic space simultaneously encoding food category distribution and instance height at pixel basis. …
Genome-Wide Profiling Of Novel Conserved Zea Mays Micrornas Along With Their Key Biological, Molecular And Cellular Targets And Validation Using An Rt-Pcr Platform,
2024
Colleges, Higher and Technical Education Department, Balochistan, Quetta-Pakistan
Genome-Wide Profiling Of Novel Conserved Zea Mays Micrornas Along With Their Key Biological, Molecular And Cellular Targets And Validation Using An Rt-Pcr Platform, Abdul Baqi, Samiullah Samiullah, Muhammad Ayub, Muhammad Zafar Saleem, Ghulam Mustafa Khan, Asad Ullah
Karbala International Journal of Modern Science
MicroRNAs (miRNAs), which are typically non-coding RNAs that start off as endogenous molecules and regulate post-transcriptional levels of gene expression by mRNA degradation or translational repression. They are 18–26 nucleotides long, evolutionarily conserved and essential for predicting novel miRNAs in a variety of plants. Maize (Zea mays) is a significant food and forage crop in the globe today. In the present study, many maize miRNAs have been found to be associated with both plant development and responses to stress. In this study, 66 unique conserved maize miRNAs from 65 different miRNA families were predicted using several genomics-based methods …
The Role Of Cu (0-0.03) And Zn (0.02) Substitution On The Structural, Optical And Magnetic Properties Of Mgo Nanoparticles,
2024
Department of Physics, Federal Urdu University of Arts, Science and Technology, Karachi, Pakistan,
The Role Of Cu (0-0.03) And Zn (0.02) Substitution On The Structural, Optical And Magnetic Properties Of Mgo Nanoparticles, S. Naseem Shah, Atif Dawar, Yasmeen Bibi, Abid Ali, M. Asif Siddiqui
Karbala International Journal of Modern Science
The co-precipitation method was employed to prepared Cu (0-0.03) and Zn (0.02) dual doped MgO nanoparticles. The secondary phases of CuO and Cu2O were observed along with the cubical phase of MgO. The doping induced effect was noticed for the crystallite size variations (14.39-19.89 nm). The morphological transformation from spherical to rice-like shape were observed. The estimated values of optical bandgap (4.66-4.45 eV) were well correlated with the crystallite size and dopant concentrations. The ferromagnetic ordering was observed at room temperature and the enchantment in the coercivity (142.27 Oe) with Zn (0.02) doping was noticed. Such type of …
Towards Assessing Cybersecurity Posture Of Manufacturing Companies: Review And Recommendations,
2024
Nova Southeastern University
Towards Assessing Cybersecurity Posture Of Manufacturing Companies: Review And Recommendations, John Del Vecchio, Yair Levy, Ling Wang, Ajoy Kumar
KSU Proceedings on Cybersecurity Education, Research and Practice
With the continued changes in the way businesses work, cyber-attack targets are in a constant state of flux between organizations, individuals, as well as various aspects of the supply chain of interconnected goods and services. As one of the 16 critical infrastructure sectors, the manufacturing sector is known for complex integrated Information Systems (ISs) that are incorporated heavily into production operations. Many of these ISs are procured and supported by third parties, also referred to as interconnected entities in the supply chain. Disruptions to manufacturing companies would not only have significant financial losses but would also have economic and safety …
Quantum Computing: Computing Of The Future Made Reality,
2024
University of North Georgia
Quantum Computing: Computing Of The Future Made Reality, Janelle Mathis
KSU Proceedings on Cybersecurity Education, Research and Practice
Abstract—Quantum computing is an emerging new area focused on technology consisting of quantum theory aspects such as electrons, sub-atomic particles, and other materials engineered using quantum mechanics. Through quantum mechanics, these computers can solve problems that classical computers deem too complex. Today the closest computing technology compared to quantum computers are supercomputers, but similarly to classical computers, supercomputers also have faults. With supercomputers, when a problem is deemed too complex, it is due to the classical machinery components within the computer, thus causing a halt in solving the task or problem. In contrast, these problems could be solved with a …
Rfid Key Fobs In Vehicles: Unmasking Vulnerabilities & Strengthening Security,
2024
University of North Georgia
Rfid Key Fobs In Vehicles: Unmasking Vulnerabilities & Strengthening Security, Devon Magda, Bryson R. Payne
KSU Proceedings on Cybersecurity Education, Research and Practice
No abstract provided.
The Impact Of Individual Techno-Characteristics On Information Privacy Concerns In The Diffusion Of Mobile Contact Tracing,
2024
University of New South Wales
The Impact Of Individual Techno-Characteristics On Information Privacy Concerns In The Diffusion Of Mobile Contact Tracing, Jiesen Lin, Dapeng Liu, Lemuria Carter
KSU Proceedings on Cybersecurity Education, Research and Practice
In the wake of the global health crisis, mobile contact tracing applications have emerged as important tools in managing disease spread. However, their effectiveness heavily relies on mass adoption, significantly influenced by the public's information privacy concerns. To date, systematic examination of how these privacy concerns relate to the innovation adopter categories in mobile contact tracing remains sparse. Furthermore, the influence of individual techno-characteristics on these concerns is to be explored. This research seeks to fill these gaps. Drawing on the diffusion of innovation theory, we examine the impact of the key techno-characteristics—adopter category, propensity for identification misrepresentation, and exposure …
Exploring Information Privacy Concerns During The Covid-19 Pandemic: A Juxtaposition Of Three Models,
2024
University of Sydney, Australia
Exploring Information Privacy Concerns During The Covid-19 Pandemic: A Juxtaposition Of Three Models, Dapeng Liu, Lemuria Carter, Jiesen Lin
KSU Proceedings on Cybersecurity Education, Research and Practice
Government agencies across the globe utilize mobile applications to interact with constituents. In response to the global pandemic, several nations have employed contact tracing services to manage the spread of COVID-19. Extent literature includes various models that explore information privacy. Several researchers have highlighted the need to compare the effectiveness of diverse information privacy models. To fill this gap, we explore the impact of information privacy concerns on citizens’ willingness to download a federal contact tracing app. In particular, we compare three types of prevalent information privacy concerns: global information privacy concerns (GIPC), concern for information privacy (CFIP), and internet …
Understanding Trust Drivers Of S-Commerce,
2024
Zayed University
Understanding Trust Drivers Of S-Commerce, Mousa Al-Kfairy, Ahmed Shuhaiber, Ayman Wael Al-Khatib, Saed Alrabaee, Souheil Khaddaj
All Works
Trust has emerged as a pillar in the acceptance and use of new technologies in the ever-changing digital landscape, notably in the booming field of social commerce. The importance of this study lies in the fact that it explores in-depth the aspects of customer trust in Instashopping using new constructs that have yet to be explored in s-commerce literature. Focusing on Instashopping, the research proposed a multi-dimensional model of trust to examine the dynamics of user trust in social commerce platforms and analyses the effects of various factors, including institution-based trust, disposition to trust, personal inventiveness, perceived page quality, and …
Future Frame Prediction Using Generative Adversarial Networks,
2024
Department of Computer Science and Engineering, Maharaja Surajmal Institute of Technology, New Delhi, India
Future Frame Prediction Using Generative Adversarial Networks, Nishtha Jatana, Deekshant Wadhwa, Nitesh Kumar Singh, Oday Ali Hassen, Charu Gupta, Saad Mohammed Darwish, Sundws Mustafa Mohammed, Dhyeauldeen Ahmed Farhan, Ansam Ali Abdulhussein
Karbala International Journal of Modern Science
The ability of a human to anticipate what is going to happen in the near future given the current situation helps in making intelligent decisions about how to react in that situation. In this paper, we have developed multiple Deep Neural Network models, intending to generate the next frame in a sequence given previous frames. In recent years, Generative Adversarial Networks (GAN) have shown promising results in the field of image generation. Hence, in this paper, we aim to create and compare two Generative Adversarial Models created for Future Frame Prediction by combining GANs with convolutional neural networks, Long Short-Term …
Piecing Together Performance: Collaborative, Participatory Research-Through-Design For Better Diversity In Games,
2024
Chapman University
Piecing Together Performance: Collaborative, Participatory Research-Through-Design For Better Diversity In Games, Daniel L. Gardner, Louanne Boyd, Reginald T. Gardner
Engineering Faculty Articles and Research
Digital games are a multi-billion-dollar industry whose production and consumption extend globally. Representation in games is an increasingly important topic. As those who create and consume the medium grow ever more diverse, it is essential that player or user-experience research, usability, and any consideration of how people interface with their technology is exercised through inclusive and intersectional lenses. Previous research has identified how character configuration interfaces preface white-male defaults [39, 40, 67]. This study relies on 1-on-1 play-interviews where diverse participants attempt to create “themselves” in a series of games and on group design activities to explore how participants may …
