Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

55,200 Full-Text Articles 71,976 Authors 23,175,806 Downloads 376 Institutions

All Articles in Computer Sciences

Faceted Search

55,200 full-text articles. Page 10 of 2009.

Wang Tilings In Arbitrary Dimensions, Ian Tassin 2024 Oregon State University

Wang Tilings In Arbitrary Dimensions, Ian Tassin

Rose-Hulman Undergraduate Mathematics Journal

This paper makes a new observation about arbitrary dimensional Wang Tilings,
demonstrating that any d -dimensional tile set that can tile periodically along d − 1 axes must be able to tile periodically along all axes.
This work also summarizes work on Wang Tiles up to the present day, including
definitions for various aspects of Wang Tilings such as periodicity and the validity of a tiling. Additionally, we extend the familiar 2D definitions for Wang Tiles and associated properties into arbitrary dimensional spaces. While there has been previous discussion of arbitrary dimensional Wang Tiles in other works, it has been …


A Machine Learning Model Of Perturb-Seq Data For Use In Space Flight Gene Expression Profile Analysis, Liam F. Johnson, James Casaletto, Lauren Sanders, Sylvain Costes 2024 Purdue University

A Machine Learning Model Of Perturb-Seq Data For Use In Space Flight Gene Expression Profile Analysis, Liam F. Johnson, James Casaletto, Lauren Sanders, Sylvain Costes

Graduate Industrial Research Symposium

The genetic perturbations caused by spaceflight on biological systems tend to have a system-wide effect which is often difficult to deconvolute it into individual signals with specific points of origin. Single cell multi-omic data can provide a profile of the perturbational effects, but does not necessarily indicate the initial point of interference within the network. The objective of this project is to take advantage of large scale and genome-wide perturbational datasets by using them to train a tuned machine learning model that is capable of predicting the effects of unseen perturbations in new data. Perturb-Seq datasets are large libraries of …


Sepsis Treatment: Reinforced Sequential Decision-Making For Saving Lives, Dipesh Tamboli, Jiayu Chen, Kiran Pranesh Jotheeswaran, Denny Yu, Vaneet Aggarwal 2024 Purdue University

Sepsis Treatment: Reinforced Sequential Decision-Making For Saving Lives, Dipesh Tamboli, Jiayu Chen, Kiran Pranesh Jotheeswaran, Denny Yu, Vaneet Aggarwal

Graduate Industrial Research Symposium

Sepsis, a life-threatening condition triggered by the body's exaggerated response to infection, demands urgent intervention to prevent severe complications. Existing machine learning methods for managing sepsis struggle in offline scenarios, exhibiting suboptimal performance with survival rates below 50%. Our project introduces the "PosNegDM: Reinforcement Learning with Positive and Negative Demonstrations for Sequential Decision-Making" framework utilizing an innovative transformer-based model and a feedback reinforcer to replicate expert actions while considering individual patient characteristics. A mortality classifier with 96.7% accuracy guides treatment decisions towards positive outcomes. The PosNegDM framework significantly improves patient survival, saving 97.39% of patients and outperforming established machine learning …


Online Class-Incremental Learning For Real-World Food Image Classification, Siddeshwar Raghavan, Jiangpeng He, Fengqing Zhu 2024 Purdue University

Online Class-Incremental Learning For Real-World Food Image Classification, Siddeshwar Raghavan, Jiangpeng He, Fengqing Zhu

Graduate Industrial Research Symposium

Food image classification is essential for monitoring health and tracking dietary in image-based dietary assessment methods. However, conventional systems often rely on static datasets with fixed classes and uniform distribution. In contrast, real-world food consumption patterns, shaped by cultural, economic, and personal influences, involve dynamic and evolving data. Thus, it requires the classification system to cope with continuously evolving data. Online Class Incremental Learning (OCIL) addresses the challenge of learning continuously from a single-pass data stream while adapting to the new knowledge and reducing catastrophic forgetting. Experience Replay (ER) based OCIL methods store a small portion of previous data and …


Exploring The Design Of Low-End Technology To Increase Patient Connectivity To Electronic Health Records, Rens Kievit, Abdullahi Abubakar Kawu, Mirjam van Reisen, Dympna O'Sullivan, Lucy Hederman 2024 Leiden University

Exploring The Design Of Low-End Technology To Increase Patient Connectivity To Electronic Health Records, Rens Kievit, Abdullahi Abubakar Kawu, Mirjam Van Reisen, Dympna O'Sullivan, Lucy Hederman

Conference papers

The tracking of the vitals of patients with long term health problems is essential for clinicians to determine proper care. Using Patient Generated Health Data (PGHD) communicated remotely allows patients to be monitored without requiring frequent hospital visits. Issues might arise when the communication of data digitally is difficult or impossible due to a lack of access to internet or a low level of digital literacy as is the case in many African countries. The VODAN-Africa project (van Reisen et al., 2021) started in 2020 and has greatly increased the capabilities of clinics in different countries in both Africa and …


Relative Vectoring Using Dual Object Detection For Autonomous Aerial Refueling, Derek B. Worth, Jeffrey L. Choate, James Lynch, Scott L. Nykl, Clark N. Taylor 2024 Air Force Institute of Technology

Relative Vectoring Using Dual Object Detection For Autonomous Aerial Refueling, Derek B. Worth, Jeffrey L. Choate, James Lynch, Scott L. Nykl, Clark N. Taylor

Faculty Publications

Once realized, autonomous aerial refueling will revolutionize unmanned aviation by removing current range and endurance limitations. Previous attempts at establishing vision-based solutions have come close but rely heavily on near perfect extrinsic camera calibrations that often change midflight. In this paper, we propose dual object detection, a technique that overcomes such requirement by transforming aerial refueling imagery directly into receiver aircraft reference frame probe-to-drogue vectors regardless of camera position and orientation. These vectors are precisely what autonomous agents need to successfully maneuver the tanker and receiver aircraft in synchronous flight during refueling operations. Our method follows a common 4-stage process …


Why Pavement Cracks Are Mostly Longitudinal, Sometimes Transversal, And Rarely Of Other Directions: A Geometric Explanation, Edgar Daniel Rodriguez Velasquez, Olga Kosheleva, Vladik Kreinovich 2024 Universidad de Piura in Peru (UDEP)

Why Pavement Cracks Are Mostly Longitudinal, Sometimes Transversal, And Rarely Of Other Directions: A Geometric Explanation, Edgar Daniel Rodriguez Velasquez, Olga Kosheleva, Vladik Kreinovich

Departmental Technical Reports (CS)

In time, pavements deteriorate, and need maintenance. One of the most typical pavement faults are cracks. Empirically, the most frequent cracks are longitudinal, i.e., following the direction of the road; less frequent are transversal cracks, which are orthogonal to the direction of the road. Sometimes, there are cracks in different directions, but such cracks are much rarer. In this paper, we show that simple geometric analysis and fundamental physical ideas can explain these observed relative frequencies.


Why Linear And Sigmoid Last Layers Work Better In Classification, Lehel Dénes-Fazakas, Lásló Szilágyi, Vladik Kreinovich 2024 Óbuda University

Why Linear And Sigmoid Last Layers Work Better In Classification, Lehel Dénes-Fazakas, Lásló Szilágyi, Vladik Kreinovich

Departmental Technical Reports (CS)

Usually, when a deep neural network is used to classify objects, its last layer computes the softmax. Our empirical results show we can improve the classification results if instead, we have linear or sigmoid last layer. In this paper, we provide an explanation for this empirical phenomenon.


Analyzing Biomedical Datasets With Symbolic Tree Adaptive Resonance Theory, Sasha Petrenko, Daniel B. Hier, Mary A. Bone, Tayo Obafemi-Ajayi, Erik J. Timpson, William E. Marsh, Michael Speight, Donald C. Wunsch 2024 Missouri University of Science and Technology

Analyzing Biomedical Datasets With Symbolic Tree Adaptive Resonance Theory, Sasha Petrenko, Daniel B. Hier, Mary A. Bone, Tayo Obafemi-Ajayi, Erik J. Timpson, William E. Marsh, Michael Speight, Donald C. Wunsch

Chemistry Faculty Research & Creative Works

Biomedical Datasets Distill Many Mechanisms Of Human Diseases, Linking Diseases To Genes And Phenotypes (Signs And Symptoms Of Disease), Genetic Mutations To Altered Protein Structures, And Altered Proteins To Changes In Molecular Functions And Biological Processes. It Is Desirable To Gain New Insights From These Data, Especially With Regard To The Uncovering Of Hierarchical Structures Relating Disease Variants. However, Analysis To This End Has Proven Difficult Due To The Complexity Of The Connections Between Multi-Categorical Symbolic Data. This Article Proposes Symbolic Tree Adaptive Resonance Theory (START), With Additional Supervised, Dual-Vigilance (DV-START), And Distributed Dual-Vigilance (DDV-START) Formulations, For The Clustering Of …


Fuzzy Software Reliability And Optimal Release Policy With Log-Logistic Testing Effort: An Analysis, Seema Rani, Jitendra Kumar, N. Ahmad 2024 T. M. Bhagalpur University, Bhagalpur

Fuzzy Software Reliability And Optimal Release Policy With Log-Logistic Testing Effort: An Analysis, Seema Rani, Jitendra Kumar, N. Ahmad

Applications and Applied Mathematics: An International Journal (AAM)

We will discuss a Software Reliability Growth Model (SRGM) using fuzzy and imperfect debugging environments; we integrate Log-Logistic (LL) Testing Effort Function (TEF) into fuzzy SRGMs. Estimation methods, such as Least Square and Maximum Likelihood, are used to obtain the value of Testing-Effort and SRGMs parameters. It is not always possible and is constantly required to quantify the exact value of parameters. Due to human conduct, the value of Testing-Effort and SRGM parameters cannot be exactly quantified. In this scenario, parameters are supposed to be vague or fuzzy. To make the software consistent, the developer needs to propose some quantity …


Some Generalizations Of Corona Product Of Two Graphs, Aparajita Borah, Gajendra Pratap Singh 2024 National Institute of Technology, Sikkim, India

Some Generalizations Of Corona Product Of Two Graphs, Aparajita Borah, Gajendra Pratap Singh

Applications and Applied Mathematics: An International Journal (AAM)

In this paper we are seeking to conceptualize the notion of corona product of two graphs to contrive some special types of graphs. That is, here our attempt is to regenerate a familiar graph as a product graph. We are considering seven familiar graphs here to reconstruct them with the help of corona product of two graphs. Such types of families of the graphs and operations can be used to study biological pathways as well as to find the optimal order and size for the special types of graphs.


A Study On Ethical Hacking In Cybersecurity Education Within The United States, Jordan Chew 2024 California Polytechnic State University, San Luis Obispo

A Study On Ethical Hacking In Cybersecurity Education Within The United States, Jordan Chew

Master's Theses

As the field of computer security continues to grow, it becomes increasingly important to educate the next generation of security professionals. However, much of the current education landscape primarily focuses on teaching defensive skills. Teaching offensive security, otherwise known as ethical hacking, is an important component in the education of all students who hope to contribute to the field of cybersecurity. Doing so requires a careful consideration of what ethical, legal, and practical issues arise from teaching students skills that can be used to cause harm. In this thesis, we first examine the current state of cybersecurity education in the …


Maximizing The Ai Revolution In Southeast Asia, Shoeb KAGDA 2024 Singapore Management University

Maximizing The Ai Revolution In Southeast Asia, Shoeb Kagda

Asian Management Insights

For that, the region must narrow the digital divide.


Superminds At Work: The Promise Of Human-Ai Collaboration, Thomas W. MALONE 2024 Singapore Management University

Superminds At Work: The Promise Of Human-Ai Collaboration, Thomas W. Malone

Asian Management Insights

Massachusetts Institute of Technology (MIT) Center for Collective Intelligence Director Professor Thomas W. Malone’s scholarship offers deep insights into the promise afforded by the synergies between human intelligence and technology. According to Professor Malone, the boundaries between human intellect and technological prowess are becoming increasingly blurred, but this may not be a bad thing for humankind. In Asian Management Insights’ inaugural Pulse Point interview, we get to learn more about the concept of ‘collective intelligence’, which explores how a partnership between humans and Artificial Intelligence (AI) can be catalysed to make ground-breaking advancements in addressing the wicked problems of our …


Stability Of Predator-Prey Model For Worm Attack In Wireless Sensor Networks, Rajeev Kishore, Padam Singh 2024 Galgotias College of Engineering and Technology

Stability Of Predator-Prey Model For Worm Attack In Wireless Sensor Networks, Rajeev Kishore, Padam Singh

Applications and Applied Mathematics: An International Journal (AAM)

In this paper, we propose a predator-prey mathematical model for analyzing the dynamical behaviors of the system. This system is an epidemic model, and it is capable of ascertaining the worm's spreading at the initial stage and improving the security of wireless sensor networks. We investigate different fixed points and examine the stability of the projected model.


Navigating Through Chaos, Hoong Chuin LAU 2024 Singapore Management University

Navigating Through Chaos, Hoong Chuin Lau

Asian Management Insights

How AI and optimisation models can strengthen supply chain resilience.


Continual Online Learning-Based Optimal Tracking Control Of Nonlinear Strict-Feedback Systems: Application To Unmanned Aerial Vehicles, Irfan Ganie, Sarangapani Jagannathan 2024 Missouri University of Science and Technology

Continual Online Learning-Based Optimal Tracking Control Of Nonlinear Strict-Feedback Systems: Application To Unmanned Aerial Vehicles, Irfan Ganie, Sarangapani Jagannathan

Electrical and Computer Engineering Faculty Research & Creative Works

A novel optimal trajectory tracking scheme is introduced for nonlinear continuous-time systems in strict feedback form with uncertain dynamics by using neural networks (NNs). The method employs an actor-critic-based NN back-stepping technique for minimizing a discounted value function along with an identifier to approximate unknown system dynamics that are expressed in augmented form. Novel online weight update laws for the actor and critic NNs are derived by using both the NN identifier and Hamilton-Jacobi-Bellman residual error. A new continual lifelong learning technique utilizing the Fisher Information Matrix via Hamilton-Jacobi-Bellman residual error is introduced to obtain the significance of weights in …


Forging The Future: Strategic Approaches To Quantum Ai Integration For Industry Transformation, Meng Leong HOW, Sin Mei CHEAH 2024 Singapore Management University

Forging The Future: Strategic Approaches To Quantum Ai Integration For Industry Transformation, Meng Leong How, Sin Mei Cheah

CMP Research

The fusion of quantum computing and artificial intelligence (AI) heralds a transformative era for Industry 4.0, offering unprecedented capabilities and challenges. This paper delves into the intricacies of quantum AI, its potential impact on Industry 4.0, and the necessary change management and innovation strategies for seamless integration. Drawing from theoretical insights and real-world case studies, we explore the current landscape of quantum AI, its foreseeable influence, and the implications for organizational strategy. We further expound on traditional change management tactics, emphasizing the importance of continuous learning, ecosystem collaborations, and proactive approaches. By examining successful and failed quantum AI implementations, lessons …


Sigmadiff: Semantics-Aware Deep Graph Matching For Pseudocode Diffing, Lian GAO, Yu QU, Sheng YU, Yue DUAN, Heng YIN 2024 Singapore Management University

Sigmadiff: Semantics-Aware Deep Graph Matching For Pseudocode Diffing, Lian Gao, Yu Qu, Sheng Yu, Yue Duan, Heng Yin

Research Collection School Of Computing and Information Systems

Pseudocode diffing precisely locates similar parts and captures differences between the decompiled pseudocode of two given binaries. It is particularly useful in many security scenarios such as code plagiarism detection, lineage analysis, patch, vulnerability analysis, etc. However, existing pseudocode diffing and binary diffing tools suffer from low accuracy and poor scalability, since they either rely on manually-designed heuristics (e.g., Diaphora) or heavy computations like matrix factorization (e.g., DeepBinDiff). To address the limitations, in this paper, we propose a semantics-aware, deep neural network-based model called SIGMADIFF. SIGMADIFF first constructs IR (Intermediate Representation) level interprocedural program dependency graphs (IPDGs). Then it uses …


Harnessing The Advances Of Meda To Optimize Multi-Puf For Enhancing Ip Security Of Biochips, Chen DONG, Xiaodong GUO, Sihuang LIAN, Yinan YAO, Zhenyi CHEN, Yang YANG, Zhanghui LIU 2024 Singapore Management University

Harnessing The Advances Of Meda To Optimize Multi-Puf For Enhancing Ip Security Of Biochips, Chen Dong, Xiaodong Guo, Sihuang Lian, Yinan Yao, Zhenyi Chen, Yang Yang, Zhanghui Liu

Research Collection School Of Computing and Information Systems

Digital microfluidic biochips (DMFBs) have a significant stride in the applications of medicine and the biochemistry in recent years. DMFBs based on micro-electrode-dot-array (MEDA) architecture, as the next-generation DMFBs, aim to overcome drawbacks of conventional DMFBs, such as droplet size restriction, low accuracy, and poor sensing ability. Since the potential market value of MEDA biochips is vast, it is of paramount importance to explore approaches to protect the intellectual property (IP) of MEDA biochips during the development process. In this paper, an IP authentication strategy based on the multi-PUF applied to MEDA biochips is presented, called bioMPUF, consisting of Delay …


Digital Commons powered by bepress