The Locals Casino As A Social Network – Can An Interconnected Community Of Players Detect Differences In Hold?,
2023
nQube Data Science Inc.
The Locals Casino As A Social Network – Can An Interconnected Community Of Players Detect Differences In Hold?, Jason D. Fiege, Anastasia (Stasi) D. Baran
International Conference on Gambling & Risk Taking
Abstract
It is difficult for individual players to detect differences in theoretical hold between slot machines without playing an unrealistically large number of games. This difficulty occurs because the fractional loss incurred by a player converges only slowly to the theoretical hold in the presence of volatility designed into slot pay tables. Nevertheless, many operators believe that players can detect changes in hold or differences compared to competition, especially in a locals casino market, and therefore resist increasing holds. Instead of investigating whether individual players can detect differences in hold, we ask whether a population of casino regulars who share …
Completeness Of Nominal Props,
2023
Runtime Verication Inc.
Completeness Of Nominal Props, Samuel Balco, Alexander Kurz
Engineering Faculty Articles and Research
We introduce nominal string diagrams as string diagrams internal in the category of nominal sets. This leads us to define nominal PROPs and nominal monoidal theories. We show that the categories of ordinary PROPs and nominal PROPs are equivalent. This equivalence is then extended to symmetric monoidal theories and nominal monoidal theories, which allows us to transfer completeness results between ordinary and nominal calculi for string diagrams.
Crosshair Optimizer,
2023
Central Washington University
Crosshair Optimizer, Jason Torrence
All Master's Theses
Metaheuristic optimization algorithms are heuristics that are capable of creating a "good enough'' solution to a computationally complex problem. Algorithms in this area of study are focused on the process of exploration and exploitation: exploration of the solution space and exploitation of the results that have been found during that exploration, with most resources going toward the former half of the process. The novel Crosshair optimizer developed in this thesis seeks to take advantage of the latter, exploiting the best possible result as much as possible by directly searching the area around that best result with a stochastic approach. This …
Scalable Quantum Edge Detection Method For D-Nisq Imaging Simulations: Use Cases From Nuclear Physics And Medical Image Computing,
2023
Old Dominion University
Scalable Quantum Edge Detection Method For D-Nisq Imaging Simulations: Use Cases From Nuclear Physics And Medical Image Computing, Emmanuel Billias, Nikos Chrisochoides
The Graduate School Posters
Edge Detection is one of the computationally intensive modules in image analysis. It is used to find important landmarks by identifying a significant change (or “edge”) between pixels and voxels. We present a hybrid Quantum Edge Detection method by improving three aspects of an existing widely referenced implementation, which for our use cases generates incomprehensible results for the type and size of images we are required to process. Our contributions are in the pre- and post-processing (i.e., classical phase) and a quantum edge detection circuit: (1) we use space- filling curves to eliminate image artifacts introduced by the image decomposition, …
Metaenhance: Metadata Quality Improvement For Electronic Theses And Dissertations,
2023
Old Dominion University
Metaenhance: Metadata Quality Improvement For Electronic Theses And Dissertations, Muntabir H. Choudhury, Lamia Salsabil, Himarsha R. Jayanetti, Jian Wu
College of Sciences Posters
Metadata quality is crucial for digital objects to be discovered through digital library interfaces. Although DL systems have adopted Dublin Core to standardize metadata formats (e.g., ETD-MS v1.11), the metadata of digital objects may contain incomplete, inconsistent, and incorrect values [1]. Most existing frameworks to improve metadata quality rely on crowdsourced correction approaches, e.g., [2]. Such methods are usually slow and biased toward documents that are more discoverable by users. Artificial intelligence (AI) based methods can be adopted to overcome this limit by automatically detecting, correcting, and canonicalizing the metadata, featuring quick and unbiased responses to document metadata. …
X-Disetrac: Distributed Eye-Tracking With Extended Realities,
2023
Old Dominion University
X-Disetrac: Distributed Eye-Tracking With Extended Realities, Bhanuka Mahanama, Sampath Jayarathna
College of Sciences Posters
Humans use heterogeneous collaboration mediums such as in-person, online, and extended realities for day-to-day activities. Identifying patterns in viewpoints and pupillary responses (a.k.a eye-tracking data) provide informative cues on individual and collective behavior during collaborative tasks. Despite the increasing ubiquity of these different mediums, the aggregation and analysis of eye-tracking data in heterogeneous collaborative environments remain unexplored. Our study proposes X-DisETrac: Extended Distributed Eye Tracking, a versatile framework for eye tracking in heterogeneous environments. Our approach tackles the complexity by establishing a platform-agnostic communication protocol encompassing three data streams to simplify data aggregation and …
A Novel Parking Management In Smart City Vehicular Datacenters,
2023
Old Dominion University
A Novel Parking Management In Smart City Vehicular Datacenters, Syed Rizvi, Susan Zehra, Steven Olariu
College of Sciences Posters
Researchers have shown that most vehicles spend the majority of their time parked in parking garages, lots, or driveways. During this time, their computing resources are unused and untapped. This has led to substantial interest in Vehicular Cloud, an area of research in which each vehicle acts as a computation node. The main difference between traditional cloud computing and vehicular cloud computing is the availability of nodes. In traditional clouds, nodes are available 24/7, while in vehicular clouds, nodes (vehicles) are only available while parked in parking lots. This creates a dynamic environment as vehicles enter and exit parking garages …
Adhd Prediction Through Analysis Of Eye Movements With Graph Convolution Network,
2023
Old Dominion University
Adhd Prediction Through Analysis Of Eye Movements With Graph Convolution Network, Gavindya Jayawardena, Sampath Jayarathna, Yi He
College of Sciences Posters
Processing speech with background noise requires appropriate parsing of the distorted auditory signal, fundamental language abilities as well as higher signal-to-noise ratio. Adolescents with ADHD have difficulty processing speech with background noise due to reduced inhibitory control and working memory capacity. In this study we utilize Audiovisual Speech-In-Noise performance and eye-tracking measures of young adults with ADHD compared to age-matched controls, and generate graphs for ADHD evaluation using the eye-tracking data. We form graphs utilizing the eight eye-tracking features (fixation count, average, total, and standard deviation of fixation duration, max and min saccade peak velocity, min, average, and standard deviation …
Robots Still Outnumber Humans In Web Archives In 2019, But Less Than In 2012,
2023
Old Dominion University
Robots Still Outnumber Humans In Web Archives In 2019, But Less Than In 2012, Himarsha R. Jayanetti, Kritika Garg, Sawood Alam, Michael L. Nelson, Michele C. Weigle
College of Sciences Posters
To identify robots and human users in web archives, we conducted a study using the access logs from the Internet Archive’s (IA) Wayback Machine in 2012 (IA2012), 2015 (IA2015), and 2019 (IA2019), and the Portuguese Web Archive (PT) in 2019 (PT2019). We identified user sessions in the access logs and classified them as human or robot based on their browsing behavior. In 2013, AlNoamany et al. [1] studied the user access patterns using IA access logs from 2012. They established four web archive user access patterns: single-page access (Dip), access to the same page at multiple archive times (Dive), access …
Murder On The Vr Express: Studying The Impact Of Thought Experiments At A Distance In Virtual Reality,
2023
Old Dominion University
Murder On The Vr Express: Studying The Impact Of Thought Experiments At A Distance In Virtual Reality, Andrew Kissel, Krzysztof J. Rechowicz, John B. Shull
Philosophy Faculty Publications
Hypothetical thought experiments allow researchers to gain insights into widespread moral intuitions and provide opportunities for individuals to explore their moral commitments. Previous thought experiment studies in virtual reality (VR) required participants to come to an on-site laboratory, which possibly restricted the study population, introduced an observer effect, and made internal reflection on the participants’ part more difficult. These shortcomings are particularly crucial today, as results from such studies are increasingly impacting the development of artificial intelligence systems, self-driving cars, and other technologies. This paper explores the viability of deploying thought experiments in commercially available in-home VR headsets. We conducted …
A Graphical User Interface Using Spatiotemporal Interpolation To Determine Fine Particulate Matter Values In The United States,
2023
Georgia Southern University
A Graphical User Interface Using Spatiotemporal Interpolation To Determine Fine Particulate Matter Values In The United States, Kelly M. Entrekin
Honors College Theses
Fine particulate matter or PM2.5 can be described as a pollution particle that has a diameter of 2.5 micrometers or smaller. These pollution particle values are measured by monitoring sites installed across the United States throughout the year. While these values are helpful, a lot of areas are not accounted for as scientists are not able to measure all of the United States. Some of these unmeasured regions could be reaching high PM2.5 values over time without being aware of it. These high values can be dangerous by causing or worsening health conditions, such as cardiovascular and lung diseases. Within …
Gender Classification Via Human Joints Using Convolutional Neural Network,
2023
San Jose State University
Gender Classification Via Human Joints Using Convolutional Neural Network, Cheng-En Sung
Master's Projects
With the growing demand for gender-related data on diverse applications, including security systems for ascertaining an individual’s identity for border crossing, as well as marketing purposes of digging the potential customer and tailoring special discounts for them, gender classification has become an essential task within the field of computer vision and deep learning. There has been extensive research conducted on classifying human gender using facial expression, exterior appearance (e.g., hair, clothes), or gait movement. However, within the scope of our research, none have specifically focused gender classification on two-dimensional body joints. Knowing this, we believe that a new prediction pipeline …
Famaid: A Tool For Aiding People With Disability,
2022
Department of Mathematics and Computer Science, Beirut Arab University
Famaid: A Tool For Aiding People With Disability, Mohamad Maad, Ahmad Owaydate, Mohammad Kojok, Firas Aboudaher, Layal Abu Daher, May Itani
BAU Journal - Science and Technology
People with disabilities suffer from discrimination and obstacles that restrict them from participating in society on an equal basis with others every day. They are deprived of their rights to be included in ordinary school systems and even in the work market. In the process of raising awareness, facilitating dailyroutines, and developing guidance, the idea of assisting such people with handy tools/software arose and was implemented in the FamAid tool. FamAid offers people with hearing disability the opportunity to be engaged in the society through many facilities. In this work, we implemented a web application that serves as a community …
Explainable Ai Helps Bridge The Ai Skills Gap: Evidence From A Large Bank,
2022
Carnegie Mellon University
Explainable Ai Helps Bridge The Ai Skills Gap: Evidence From A Large Bank, Selina Carter, Jonathan Hersh
Economics Faculty Articles and Research
Advances in machine learning have created an “AI skills gap” both across and within firms. As AI becomes embedded in firm processes, it is unknown how this will impact the digital divide between workers with and without AI skills. In this paper we ask whether managers trust AI to predict consequential events, what manager characteristics are associated with increasing trust in AI predictions, and whether explainable AI (XAI) affects users’ trust in AI predictions. Partnering with a large bank, we generated AI predictions for whether a loan will be late in its final disbursement. We embedded these predictions into a …
Analyzing Business-Focused Social Networks In Hiring: The Influence Of A Job Candidate's Network On A Recruiter's Hiring Recommendation,
2022
University of South Alabama
Analyzing Business-Focused Social Networks In Hiring: The Influence Of A Job Candidate's Network On A Recruiter's Hiring Recommendation, Hannah V. Kibby
Theses and Dissertations
Social media has altered the ways in which people interact. Business-focused social media profiles, such as those on LinkedIn, can act as a proxy for a traditional resume. However, these websites differ from a traditional resume in that information presented is sometimes informal, personal, and irrelevant to the member’s career. Furthermore, HR employees are able to view a job candidate’s social network. This research investigates the influence of a recruiter’s knowledge of an applicant’s professional network on the recruiter’s perception of the applicant’s trustworthiness and hence their willingness to take risk in the hiring relationship. A review of the literature …
Detecting Selfish Mining Attacks Against A Blockchain Using Machine Learing,
2022
University of South Alabama
Detecting Selfish Mining Attacks Against A Blockchain Using Machine Learing, Matthew A. Peterson
Theses and Dissertations
Selfish mining is an attack against a blockchain where miners hide newly discovered blocks instead of publishing them to the rest of the network. Selfish mining has been a potential issue for blockchains since it was first discovered by Eyal and Sirer. It can be used by malicious miners to earn a disproportionate share of the mining rewards or in conjunction with other attacks to steal money from network users. Several of these attacks were launched in 2018, 2019, and 2020 with the attackers stealing as much as $18 Million. Developers made several different attempts to fix this issue, but …
Computer Engineering Education,
2022
University of Nebraska-Lincoln
Computer Engineering Education, Marilyn Wolf
CSE Conference and Workshop Papers
Computer engineering is a rapidly evolving discipline. How should we teach it to our students?
This virtual roundtable on computer engineering education was conducted in summer 2022 over a combination of email and virtual meetings. The panel considered what topics are of importance to the computer engineering curriculum, what distinguishes computer engineering from related disciplines, and how computer engineering concepts should be taught.
A Blockchain Based Policy Framework For The Management Of Electronic Health Record (Ehrs),
2022
United Arab Emirates University
A Blockchain Based Policy Framework For The Management Of Electronic Health Record (Ehrs), Aysha Ali Mohammed Murad Qambar
Theses
The rapid development of information technology during the last decade has greatly influenced all aspects of society, including individuals and enterprise organizations. Adopting new technologies by individuals and organizations depends on several factors, such as usability, available resources, support needed for adoption benefits, and return on investment, to mention a few. When it comes to the adoption of new technologies, one of the main challenges faced by organizations is the ability to effectively incorporate such technologies into their enterprise solutions to maximize the expected benefits. For the last several years, Blockchain technology has become a popular trend in a variety …
Communicative Information Visualizations: How To Make Data More Understandable By The General Public,
2022
University of Massachusetts Amherst
Communicative Information Visualizations: How To Make Data More Understandable By The General Public, Alyxander Burns
Doctoral Dissertations
Although data visualizations have been around for centuries and are encountered frequently by the general public, existing evidence suggests that a significant portion of people have difficulty understanding and interpreting them. It might not seem like a big problem when a reader misreads a weather map and finds themselves without an umbrella in a rainstorm, but for those who lack the means, experience, or ability to make sense of data, misreading a data visualization concerning public health and safety could be a matter of life and death. However, figuring out how to make visualizations truly usable for a diverse audience …
Computing Concept: Genealogy Potential, Power, Arithmetic, Algorithm And Ritual Of Computation,
2022
Institute of Computing Technology, Chinese Academy of Sciences, Beijing 100190, China
Computing Concept: Genealogy Potential, Power, Arithmetic, Algorithm And Ritual Of Computation, Yuhang Liu, Fei Zhang
Bulletin of Chinese Academy of Sciences (Chinese Version)
In the new era, China needs more rational, firm, dialectical, and practical cultural confidence in the field of computational technology. The study conducted rigorous literature research, and established the correspondence between the ancient Chinese ideologies and different focuses of computation. The study proposes the computation concept genealogy (i.e., potential, power, arithmetic, algorithm, and ritual of computation) to deepen the multi-dimensional understanding of the concept of computation, and gives some suggestions for cultivating the computational culture that is facing the world and is of Chinese characteristics.
