Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Singapore Management University (7218)
- China Simulation Federation (3363)
- TÜBİTAK (3020)
- Selected Works (2644)
- Wright State University (2602)
-
- Purdue University (2057)
- Old Dominion University (1449)
- Missouri University of Science and Technology (1360)
- Edith Cowan University (1172)
- Air Force Institute of Technology (1108)
- University of Texas at El Paso (1094)
- Dartmouth College (1017)
- San Jose State University (995)
- University of Nebraska - Lincoln (979)
- Embry-Riddle Aeronautical University (853)
- City University of New York (CUNY) (818)
- Technological University Dublin (792)
- Washington University in St. Louis (785)
- Brigham Young University (759)
- California Polytechnic State University, San Luis Obispo (719)
- Kennesaw State University (712)
- University for Business and Technology in Kosovo (626)
- University of Texas at Arlington (614)
- Nova Southeastern University (535)
- Portland State University (529)
- Western University (524)
- SelectedWorks (522)
- New Jersey Institute of Technology (511)
- Syracuse University (501)
- University of Nebraska at Omaha (484)
- Keyword
-
- Machine learning (1329)
- Deep learning (797)
- Artificial intelligence (650)
- Machine Learning (648)
- Computer Science (638)
-
- Security (620)
- Computer science (435)
- Cybersecurity (408)
- Privacy (408)
- Simulation (377)
- Classification (367)
- Technical Reports (358)
- UTEP Computer Science Department (356)
- Data mining (349)
- Deep Learning (344)
- Algorithms (336)
- Optimization (333)
- Neural networks (307)
- Artificial Intelligence (296)
- Computer vision (290)
- College for Professional Studies (253)
- Software engineering (253)
- Education (252)
- Clustering (251)
- Cloud computing (244)
- Department of Computer Science and Engineering (243)
- Applied sciences (236)
- School of Computer & Information Science (236)
- Visualization (236)
- Social media (230)
- Publication Year
- Publication
-
- Research Collection School Of Computing and Information Systems (6871)
- Journal of System Simulation (3363)
- Turkish Journal of Electrical Engineering and Computer Sciences (3020)
- Theses and Dissertations (2498)
- Department of Computer Science Technical Reports (1721)
-
- Computer Science & Engineering Syllabi (1312)
- Departmental Technical Reports (CS) (881)
- Master's Projects (845)
- Electronic Theses and Dissertations (735)
- Computer Science Faculty Publications (724)
- All Computer Science and Engineering Research (683)
- Computer Science Technical Reports (673)
- Computer Science Faculty Research & Creative Works (595)
- Faculty Publications (585)
- Kno.e.sis Publications (543)
- Journal of Digital Forensics, Security and Law (536)
- Computer Science Faculty Publications and Presentations (507)
- Dissertations (500)
- CCE Theses and Dissertations (488)
- All Works (478)
- Walden Dissertations and Doctoral Studies (467)
- Chulalongkorn University Theses and Dissertations (Chula ETD) (463)
- Masters Theses (402)
- Computer Science and Engineering Theses (356)
- Theses (334)
- Electronic Thesis and Dissertation Repository (333)
- Computer Science and Software Engineering (332)
- USF Tampa Graduate Theses and Dissertations (320)
- Computer Science: Faculty Publications (316)
- Mathematics, Statistics and Computer Science Faculty Research and Publications (315)
- Publication Type
Articles 1 - 30 of 57896
Full-Text Articles in Physical Sciences and Mathematics
A Comprehensive Survey On Relation Extraction: Recent Advances And New Frontiers, Xiaoyan Zhao, Yang Deng, Min Yang, Lingzhi Wang, Rui Zhang, Hong Cheng, Wai Lam, Ying Shen, Ruifeng Xu
A Comprehensive Survey On Relation Extraction: Recent Advances And New Frontiers, Xiaoyan Zhao, Yang Deng, Min Yang, Lingzhi Wang, Rui Zhang, Hong Cheng, Wai Lam, Ying Shen, Ruifeng Xu
Research Collection School Of Computing and Information Systems
Relation extraction (RE) involves identifying the relations between entities from underlying content. RE serves as the foundation for many natural language processing (NLP) and information retrieval applications, such as knowledge graph completion and question answering. In recent years, deep neural networks have dominated the field of RE and made noticeable progress. Subsequently, the large pre-trained language models (PLMs) have taken the state-of-the-art RE to a new level. This survey provides a comprehensive review of existing deep learning techniques for RE. First, we introduce RE resources, including datasets and evaluation metrics. Second, we propose a new taxonomy to categorize existing works …
Quantitative Bounds On Resource Usage Of Probabilistic Programs, Krishnendu Chatterjee, Amir Kafshdar Goharshady, Tobias Meggendorfer, Dorde Zikelic
Quantitative Bounds On Resource Usage Of Probabilistic Programs, Krishnendu Chatterjee, Amir Kafshdar Goharshady, Tobias Meggendorfer, Dorde Zikelic
Research Collection School Of Computing and Information Systems
Cost analysis, also known as resource usage analysis, is the task of finding bounds on the total cost of a program and is a well-studied problem in static analysis. In this work, we consider two classical quantitative problems in cost analysis for probabilistic programs. The first problem is to find a bound on the expected total cost of the program. This is a natural measure for the resource usage of the program and can also be directly applied to average-case runtime analysis. The second problem asks for a tail bound, i.e. given a threshold t the goal is to find …
Equivalence And Similarity Refutation For Probabilistic Programs, Krishnendu Chatterjee, Ehsan Kafshdar Goharshady, Petr Novotný, Dorde Zikelic
Equivalence And Similarity Refutation For Probabilistic Programs, Krishnendu Chatterjee, Ehsan Kafshdar Goharshady, Petr Novotný, Dorde Zikelic
Research Collection School Of Computing and Information Systems
We consider the problems of statically refuting equivalence and similarity of output distributions defined by a pair of probabilistic programs. Equivalence and similarity are two fundamental relational properties of probabilistic programs that are essential for their correctness both in implementation and in compilation. In this work, we present a new method for static equivalence and similarity refutation. Our method refutes equivalence and similarity by computing a function over program outputs whose expected value with respect to the output distributions of two programs is different. The function is computed simultaneously with an upper expectation supermartingale and a lower expectation submartingale for …
On Lexicographic Proof Rules For Probabilistic Termination, Krishnendu Chatterjee, Ehsan Kafshdar Goharshady, Petr Novotný, Jiří Zárevucký, Dorde Zikelic
On Lexicographic Proof Rules For Probabilistic Termination, Krishnendu Chatterjee, Ehsan Kafshdar Goharshady, Petr Novotný, Jiří Zárevucký, Dorde Zikelic
Research Collection School Of Computing and Information Systems
We consider the almost-sure (a.s.) termination problem for probabilistic programs, which are a stochastic extension of classical imperative programs. Lexicographic ranking functions provide a sound and practical approach for termination of non-probabilistic programs, and their extension to probabilistic programs is achieved via lexicographic ranking supermartingales (LexRSMs). However, LexRSMs introduced in the previous work have a limitation that impedes their automation: all of their components have to be non-negative in all reachable states. This might result in a LexRSM not existing even for simple terminating programs. Our contributions are twofold. First, we introduce a generalization of LexRSMs that allows for some …
Phoneme Recognition For Pronunciation Improvement, Matthew Heywood
Phoneme Recognition For Pronunciation Improvement, Matthew Heywood
Theses/Capstones/Creative Projects
This project aims to improve English pronunciation by investigating speech errors and developing a tool to provide precise feedback. The study focuses on creating a new pronunciation tool that offers localized feedback, identifies specific errors, and suggests corrective measures. By addressing the shortcomings of current methods, this research seeks to enhance pronunciation refinement.
Utilizing cutting-edge technology, the tool leverages speech-to-phoneme AI models and modified lazy string matching algorithms to compare the user's spoken input with the intended pronunciation. This allows for a detailed analysis of discrepancies, providing users actionable insights into their phonetic errors. The speech-to-phoneme AI models mark a …
Optimizing Mobility On Demand Systems: Multiagent Reinforcement Learning Approaches To Order Assignment And Vehicle Guidance, Jiyao Li
All Graduate Theses and Dissertations, Fall 2023 to Present
This dissertation explores ways to improve Mobility on Demand (MoD) systems, which are services like ride-sharing and autonomous taxi systems. The main goal is to make these services more efficient and reliable, benefiting both passengers and drivers by better matching the number of available vehicles with the number of people needing rides.
For ride-sharing services, a new method called T-Balance helps match riders with drivers and guides empty taxis to areas where more people need rides. This reduces wait times for passengers and increases earnings for drivers. Another method, called GRL-HM, looks at how riders and drivers behave to further …
Sustainable Energysense: A Predictive Machine Learning Framework For Optimizing Residential Electricity Consumption, Murad Al-Rajab, Samia Loucif
Sustainable Energysense: A Predictive Machine Learning Framework For Optimizing Residential Electricity Consumption, Murad Al-Rajab, Samia Loucif
All Works
In a world where electricity is often taken for granted, the surge in consumption poses significant challenges, including elevated CO2 emissions and rising prices. These issues not only impact consumers but also have broader implications for the global environment. This paper endeavors to propose a smart application dedicated to optimizing the electricity consumption of household appliances. It employs Augmented Reality (AR) technology along with YOLO to detect electrical appliances and provide detailed electricity consumption insights, such as displaying the appliance consumption rate and computing the total electricity consumption based on the number of hours the appliance was used. The application …
Triadic Temporal-Semantic Alignment For Weakly-Supervised Video Moment Retrieval, Jin Liu, Jialong Xie, Fengyu Zhou, Shengfeng He
Triadic Temporal-Semantic Alignment For Weakly-Supervised Video Moment Retrieval, Jin Liu, Jialong Xie, Fengyu Zhou, Shengfeng He
Research Collection School Of Computing and Information Systems
Video Moment Retrieval (VMR) aims to identify specific event moments within untrimmed videos based on natural language queries. Existing VMR methods have been criticized for relying heavily on moment annotation bias rather than true multi-modal alignment reasoning. Weakly supervised VMR approaches inherently overcome this issue by training without precise temporal location information. However, they struggle with fine-grained semantic alignment and often yield multiple speculative predictions with prolonged video spans. In this paper, we take a step forward in the context of weakly supervised VMR by proposing a triadic temporalsemantic alignment model. Our proposed approach augments weak supervision by comprehensively addressing …
Asthma Prevalence Among United States Population Insights From Nhanes Data Analysis, Sarya Swed, Bisher Sawaf, Feras Al-Obeidat, Wael Hafez, Amine Rakab, Hidar Alibrahim, Mohamad Nour Nasif, Baraa Alghalyini, Abdul Rehman Zia Zaidi, Lamees Alshareef, Fadel Alqatati, Fathima Zamrath Zahir, Ashraf I. Ahmed, Mulham Alom, Anas Sultan, Abdullah Almahmoud, Agyad Bakkour, Ivan Cherrez-Ojeda
Asthma Prevalence Among United States Population Insights From Nhanes Data Analysis, Sarya Swed, Bisher Sawaf, Feras Al-Obeidat, Wael Hafez, Amine Rakab, Hidar Alibrahim, Mohamad Nour Nasif, Baraa Alghalyini, Abdul Rehman Zia Zaidi, Lamees Alshareef, Fadel Alqatati, Fathima Zamrath Zahir, Ashraf I. Ahmed, Mulham Alom, Anas Sultan, Abdullah Almahmoud, Agyad Bakkour, Ivan Cherrez-Ojeda
All Works
Asthma is a prevalent respiratory condition that poses a substantial burden on public health in the United States. Understanding its prevalence and associated risk factors is vital for informed policymaking and public health interventions. This study aims to examine asthma prevalence and identify major risk factors in the U.S. population. Our study utilized NHANES data between 1999 and 2020 to investigate asthma prevalence and associated risk factors within the U.S. population. We analyzed a dataset of 64,222 participants, excluding those under 20 years old. We performed binary regression analysis to examine the relationship of demographic and health related covariates with …
Harnessing Collective Structure Knowledge In Data Augmentation For Graph Neural Networks, Rongrong Ma, Guansong Pang, Ling Chen
Harnessing Collective Structure Knowledge In Data Augmentation For Graph Neural Networks, Rongrong Ma, Guansong Pang, Ling Chen
Research Collection School Of Computing and Information Systems
Graph neural networks (GNNs) have achieved state-of-the-art performance in graph representation learning. Message passing neural networks, which learn representations through recursively aggregating information from each node and its neighbors, are among the most commonly-used GNNs. However, a wealth of structural information of individual nodes and full graphs is often ignored in such process, which restricts the expressive power of GNNs. Various graph data augmentation methods that enable the message passing with richer structure knowledge have been introduced as one main way to tackle this issue, but they are often focused on individual structure features and difficult to scale up with …
Interpreting Neural Networks For Particle Tracing In Fluid Simulation Ensembles: An Interactive Visualization Framework, Maanav Choubey
Interpreting Neural Networks For Particle Tracing In Fluid Simulation Ensembles: An Interactive Visualization Framework, Maanav Choubey
All Graduate Theses and Dissertations, Fall 2023 to Present
Understanding the internal mechanisms of neural networks, particularly Multi-Layer Perceptrons (MLP), is essential for their effective application in a variety of scientific domains. In particular, in the scientific visualization domain their adoption has recently shown to be a promising tool to predict particle trajectories in fluid dynamics simulation and aid the interactive visualization of flows. This research addresses the critical challenge of interpretability of such models.
While interpretability has been extensively explored in fields like computer vision and natural language processing, its application to time series data, particularly for particle tracing (or prediction of trajectories), has not garnered sufficient attention. …
Exploring Post-Covid-19 Health Effects And Features With Advanced Machine Learning Techniques, Muhammad N. Islam, Md S. Islam, Nahid H. Shourav, Iftiaqur Rahman, Faiz A. Faisal, Md M. Islam, Iqbal H. Sarker
Exploring Post-Covid-19 Health Effects And Features With Advanced Machine Learning Techniques, Muhammad N. Islam, Md S. Islam, Nahid H. Shourav, Iftiaqur Rahman, Faiz A. Faisal, Md M. Islam, Iqbal H. Sarker
Research outputs 2022 to 2026
COVID-19 is an infectious respiratory disease that has had a significant impact, resulting in a range of outcomes including recovery, continued health issues, and the loss of life. Among those who have recovered, many experience negative health effects, particularly influenced by demographic factors such as gender and age, as well as physiological and neurological factors like sleep patterns, emotional states, anxiety, and memory. This research aims to explore various health factors affecting different demographic profiles and establish significant correlations among physiological and neurological factors in the post-COVID-19 state. To achieve these objectives, we have identified the post-COVID-19 health factors and …
Jamming Precoding In Af Relay-Aided Plc Systems With Multiple Eavessdroppers, Zhengmin Kong, Jiaxing Cui, Li Ding, Tao Huang, Shihao Yan
Jamming Precoding In Af Relay-Aided Plc Systems With Multiple Eavessdroppers, Zhengmin Kong, Jiaxing Cui, Li Ding, Tao Huang, Shihao Yan
Research outputs 2022 to 2026
Enhancing information security has become increasingly significant in the digital age. This paper investigates the concept of physical layer security (PLS) within a relay-aided power line communication (PLC) system operating over a multiple-input multiple-output (MIMO) channel based on MK model. Specifically, we examine the transmission of confidential signals between a source and a distant destination while accounting for the presence of multiple eavesdroppers, both colluding and non-colluding. We propose a two-phase jamming scheme that leverages a full-duplex (FD) amplify-and-forward (AF) relay to address this challenge. Our primary objective is to maximize the secrecy rate, which necessitates the optimization of the …
Llm Potentiality And Awareness: A Position Paper From The Perspective Of Trustworthy And Responsible Ai Modeling, Iqbal H. Sarker
Llm Potentiality And Awareness: A Position Paper From The Perspective Of Trustworthy And Responsible Ai Modeling, Iqbal H. Sarker
Research outputs 2022 to 2026
Large language models (LLMs) are an exciting breakthrough in the rapidly growing field of artificial intelligence (AI), offering unparalleled potential in a variety of application domains such as finance, business, healthcare, cybersecurity, and so on. However, concerns regarding their trustworthiness and ethical implications have become increasingly prominent as these models are considered black-box and continue to progress. This position paper explores the potentiality of LLM from diverse perspectives as well as the associated risk factors with awareness. Towards this, we highlight not only the technical challenges but also the ethical implications and societal impacts associated with LLM deployment emphasizing fairness, …
Toward A Globally Lunar Calendar: A Machine Learning-Driven Approach For Crescent Moon Visibility Prediction, Samia Loucif, Murad Al-Rajab, Raed Abu Zitar, Mahmoud Rezk
Toward A Globally Lunar Calendar: A Machine Learning-Driven Approach For Crescent Moon Visibility Prediction, Samia Loucif, Murad Al-Rajab, Raed Abu Zitar, Mahmoud Rezk
All Works
This paper presents a comprehensive approach to harmonizing lunar calendars across different global regions, addressing the long-standing challenge of variations in new crescent Moon sightings that mark the beginning of lunar months. We propose a machine learning (ML)-based framework to predict the visibility of the new crescent Moon, representing a significant advancement toward a globally unified lunar calendar. Our study utilized a dataset covering various countries globally, making it the first to analyze all 12 lunar months over a span of 13 years. We applied a wide array of ML algorithms and techniques. These techniques included feature selection, hyperparameter tuning, …
Development Of A Web-Based Information System For Student Leave Permission At Dar Al-Raudhah Islamic Boarding School: Iso Quality Standards Analysis, Bonita Destiana, Priyanto Priyanto, Rahmatul Irfan, Muhammad Gus Khamim, Muhammad Yusuf Ridlo, Muhammad Iqbal
Development Of A Web-Based Information System For Student Leave Permission At Dar Al-Raudhah Islamic Boarding School: Iso Quality Standards Analysis, Bonita Destiana, Priyanto Priyanto, Rahmatul Irfan, Muhammad Gus Khamim, Muhammad Yusuf Ridlo, Muhammad Iqbal
Elinvo (Electronics, Informatics, and Vocational Education)
Dar Al-Raudhah Entrepreneur, Islamic Boarding School, has adopted digital technology by upgrading hardware and software also investing in reliable internet infrastructure. However, this school still faces issues with students’ leave permission process due to reliance on manual bookkeeping and Excel, which leads to potential errors. Based on those problems, this research aims to create a web-based student leave permission system called SIPERSAN. The SIPERSAN system was developed with a Waterfall development model, which includes requirements analysis, design, implementation, testing, and deployment. The database is managed with MySQL, and the system is developed using PHP with the Laravel framework. Based on …
Uncovering Merchants’ Willingness To Wait In On-Demand Food Delivery Markets, Jian Liang, Ya Zhao, Hai Wang, Zuopeng Xiao, Jintao Ke
Uncovering Merchants’ Willingness To Wait In On-Demand Food Delivery Markets, Jian Liang, Ya Zhao, Hai Wang, Zuopeng Xiao, Jintao Ke
Research Collection School Of Computing and Information Systems
While traditional on-demand food delivery services help restaurants reach more customers and enable doorstep deliveries, they also come with drawbacks, such as high commission fees and limited control over the delivery process. White-label food delivery services have emerged as an alternative, ready-to-use platform for restaurants to arrange delivery for customer orders received through their applications or websites, without the constraints imposed by traditional on-demand food delivery platforms or the need to develop an in-house delivery operation. Although several studies have investigated consumer behavior when using traditional on-demand food delivery services, there is limited research on merchants’ behavior when adopting white-label …
Efficient Multiplicative-To-Additive Function From Joye-Libert Cryptosystem And Its Application To Threshold Ecdsa, Haiyang Xue, Ho Man Au, Mengling Liu, Yin Kwan Chan, Handong Cui, Xiang Xie, Hon Tsz Yuen, Chengru Zhang
Efficient Multiplicative-To-Additive Function From Joye-Libert Cryptosystem And Its Application To Threshold Ecdsa, Haiyang Xue, Ho Man Au, Mengling Liu, Yin Kwan Chan, Handong Cui, Xiang Xie, Hon Tsz Yuen, Chengru Zhang
Research Collection School Of Computing and Information Systems
Threshold ECDSA receives interest lately due to its widespread adoption in blockchain applications. A common building block of all leading constructions involves a secure conversion of multiplicative shares into additive ones, which is called the multiplicative-to-additive (MtA) function. MtA dominates the overall complexity of all existing threshold ECDSA constructions. Specifically, O(n2) invocations of MtA are required in the case of n active signers. Hence, improvement of MtA leads directly to significant improvements for all state-of-the-art threshold ECDSA schemes.In this paper, we design a novel MtA by revisiting the Joye-Libert (JL) cryptosystem. Specifically, we revisit JL encryption and propose a JL-based …
2024 Gateway Magazine, College Of Computing, Michigan Technological University
2024 Gateway Magazine, College Of Computing, Michigan Technological University
College of Computing Annual Magazines
Table of Contents
- 50 Years of Computer Science at Michigan Tech
- Data Science for a Changing Planet
- Healthcare Transformed
- Mechatronics Matters
- Powered by Michigan Tech Talent
- Esports: Bringing Everything Great about Sports to More People
- The Michigander Scholars Program: Electrifying Careers in Michigan
- College of Computing News
Bibliography For "Ai: The Next Chapter Display", Arianna Tillman, Isabella Piechota
Bibliography For "Ai: The Next Chapter Display", Arianna Tillman, Isabella Piechota
Library Displays and Bibliographies
A bibliography created to support a display about artificial intelligence at the Leatherby Libraries during Fall 2024 at the Leatherby Libraries at Chapman University.
Hisoma: A Hierarchical Multi-Agent Model Integrating Self-Organizing Neural Networks With Multi-Agent Deep Reinforcement Learning, Minghong Geng, Shubham Pateria, Budhitama Subagdja, Ah-Hwee Tan
Hisoma: A Hierarchical Multi-Agent Model Integrating Self-Organizing Neural Networks With Multi-Agent Deep Reinforcement Learning, Minghong Geng, Shubham Pateria, Budhitama Subagdja, Ah-Hwee Tan
Research Collection School Of Computing and Information Systems
Multi-agent deep reinforcement learning (MADRL) has shown remarkable advancements in the past decade. However, most current MADRL models focus on task-specific short-horizon problems involving a small number of agents, limiting their applicability to long-horizon planning in complex environments. Hierarchical multi-agent models offer a promising solution by organizing agents into different levels, effectively addressing tasks with varying planning horizons. However, these models often face constraints related to the number of agents or levels of hierarchies. This paper introduces HiSOMA, a novel hierarchical multi-agent model designed to handle long-horizon, multi-agent, multi-task decision-making problems. The top-level controller, FALCON, is modeled as a class …
Generative Ai In Software Engineering Must Be Human-Centered: The Copenhagen Manifesto, D. Russo, S. Van Berkel Baltes, Christoph Treude
Generative Ai In Software Engineering Must Be Human-Centered: The Copenhagen Manifesto, D. Russo, S. Van Berkel Baltes, Christoph Treude
Research Collection School Of Computing and Information Systems
The advent of Generative Artificial Intelligence—systems that can produce human-like content such as text, music, visual art, or source code—marks not only a significant leap for Artificial Intelligence (AI) but also a pivotal moment for software practitioners and researchers. The role of software engineering researchers and practitioners in adopting the technologies that shape our world is critical. Historically, the human aspects of developing software have been treated as secondary to more technical innovations. However, the emergence of Generative AI will simultaneously enhance human capabilities while surfacing complex ethical, social, legal, and technical challenges.While primarily aimed at software engineering (SE) researchers …
Does Ceo Agreeableness Personality Mitigate Real Earnings Management?, Shan Liu, Xingying Wu, Nan Hu
Does Ceo Agreeableness Personality Mitigate Real Earnings Management?, Shan Liu, Xingying Wu, Nan Hu
Research Collection School Of Computing and Information Systems
Despite efforts to mitigate aggressive financial reporting, earnings management remains challenging to parties interested in inhibiting its dysfunctional effects. Using linguistic algorithms to assess CEO agreeableness personality from their unscripted texts in conference calls, we find that it is a determinant that mitigates a firm's real earnings management. Furthermore, such an effect is more pronounced when firms confront intensive market competition and financial distress and have weaker managerial entrenchment or when CEOs face stronger internal governance. Our findings persist even after we utilize several alternative real earnings management metrics and control other confounding personalities in prior earnings management studies. The …
Ocapo: Fine-Grained Occupancy-Aware, Empirically-Driven Pdc Control In Open-Plan, Shared Workspaces, Ravi Anuradha, Dulaj Sanjaya Weerakoon, Archan Misra
Ocapo: Fine-Grained Occupancy-Aware, Empirically-Driven Pdc Control In Open-Plan, Shared Workspaces, Ravi Anuradha, Dulaj Sanjaya Weerakoon, Archan Misra
Research Collection School Of Computing and Information Systems
Passive Displacement Cooling (PDC) is a relatively recent technology gaining attention as a means of significantly reducing building energy consumption overheads, especially in tropical climates. PDC eliminates the use of mechanical fans, instead using chilled-water heat exchangers to perform convective cooling. In this paper, we identify and characterize the impact of several key parameters affecting occupant comfort in a 1000m2 open-floor area (consisting of multiple zones) of a ZEB (Zero Energy Building) deployed with PDC units and tackle the problem of setting the temperature setpoint of the PDC units to assure occupant thermal comfort and yet conserve energy. We tackle …
On The Lossiness Of 2k-Th Power And The Instantiability Of Rabin-Oaep, Haiyang Xue, Bao Li, Xianhui Lu, Kunpeng Wang, Yamin Liu
On The Lossiness Of 2k-Th Power And The Instantiability Of Rabin-Oaep, Haiyang Xue, Bao Li, Xianhui Lu, Kunpeng Wang, Yamin Liu
Research Collection School Of Computing and Information Systems
Seurin PKC 2014 proposed the 2-ï /4-hiding assumption which asserts the indistinguishability of Blum Numbers from pseudo Blum Numbers. In this paper, we investigate the lossiness of 2 k -th power based on the 2 k -ï /4-hiding assumption, which is an extension of the 2-ï /4-hiding assumption. And we prove that 2 k -th power function is a lossy trapdoor permutation over Quadratic Residuosity group. This new lossy trapdoor function has 2 k -bits lossiness for k -bits exponent, while the RSA lossy trapdoor function given by Kiltz et al. Crypto 2010 has k -bits lossiness for k -bits …
D2sr: Decentralized Detection, De-Synchronization, And Recovery Of Lidar Interference, Darshana Rathnayake, Hemanth Sabbella, Meera Radhakrishnan, Archan Misra
D2sr: Decentralized Detection, De-Synchronization, And Recovery Of Lidar Interference, Darshana Rathnayake, Hemanth Sabbella, Meera Radhakrishnan, Archan Misra
Research Collection School Of Computing and Information Systems
We address the challenge of multi-LiDAR interference, an issue of growing importance as LiDAR sensors are embedded in a growing set of pervasive devices. We introduce a novel approach named D2SR, enabling decentralized interference detection, mitigation, and recovery without explicit coordination among nearby LiDAR devices. D2SR comprises three stages: (a) Detection, which identifies interfered frames, (b) Mitigation, which performs time-shifting of a LiDAR’s active period to reduce interference, and (c) Recovery, which corrects or reconstructs the depth values in interfered regions of a depth frame. Key contributions include a lightweight interference detection algorithm achieving an F1-score of 92%, a simple …
What Do We Know About Hugging Face? A Systematic Literature Review And Quantitative Validation Of Qualitative Claims, Jason Jones, Wenxin Jiang, Nicholas Synovic, George K. Thiruvathukal, James C. Davis
What Do We Know About Hugging Face? A Systematic Literature Review And Quantitative Validation Of Qualitative Claims, Jason Jones, Wenxin Jiang, Nicholas Synovic, George K. Thiruvathukal, James C. Davis
Computer Science: Faculty Publications and Other Works
Background: Collaborative Software Package Registries (SPRs) are an integral part of the software supply chain. Much engineering work synthesizes SPR package into applications. Prior research has examined SPRs for traditional software, such as NPM (JavaScript) and PyPI (Python). Pre-Trained Model (PTM) Registries are an emerging class of SPR of increasing importance, because they support the deep learning supply chain.
Aims: Recent empirical research has examined PTM registries in ways such as vulnerabilities, reuse processes, and evolution. However, no existing research synthesizes them to provide a systematic understanding of the current knowledge. Some of the existing research includes qualitative …
Retrofitting A Legacy Cutlery Washing Machine Using Computer Vision, Hua Leong Fwa
Retrofitting A Legacy Cutlery Washing Machine Using Computer Vision, Hua Leong Fwa
Research Collection School Of Computing and Information Systems
Industry 4.0, the digitalization of manufacturing promises to lead to lowered cost, efficient processes and even discovery of new business models. However, many of the enterprises have huge investments in legacy machines which are not 'smart'. In this study, we thus designed a cost-efficient solution to retrofit a legacy conveyor belt-based cutlery washing machine with a commodity web camera. We then applied computer vision (using both traditional image processing and deep learning techniques) to infer the speed and utilization of the machine. We detailed the algorithms that we designed for computing both speed andutilization. With the existing operational constraints of …
Resilient Tcp Variant Enabling Smooth Network Updates For Software-Defined Data Center Networks, Abdul Basit Dogar, Sami Ullah, Yiran Zhang, Hisham Alasmary, Muhammad Waqas, Sheng Chen
Resilient Tcp Variant Enabling Smooth Network Updates For Software-Defined Data Center Networks, Abdul Basit Dogar, Sami Ullah, Yiran Zhang, Hisham Alasmary, Muhammad Waqas, Sheng Chen
Research outputs 2022 to 2026
Network updates have become increasingly prevalent since the broad adoption of software-defined networks (SDNs) in data centers. Modern TCP designs, including cutting-edge TCP variants DCTCP, CUBIC, and BBR, however, are not resilient to network updates that provoke flow rerouting. In this paper, we first demonstrate that popular TCP implementations perform inadequately in the presence of frequent and inconsistent network updates, because inconsistent and frequent network updates result in out-of-order packets and packet drops induced via transitory congestion and lead to serious performance deterioration. We look into the causes and propose a network update-friendly TCP (NUFTCP), which is an extension of …
Privacy Risks And Regulatory Challenges In Smart Grids And Renewable Energy Systems, Mikołaj Rajca
Privacy Risks And Regulatory Challenges In Smart Grids And Renewable Energy Systems, Mikołaj Rajca
internetowy Kwartalnik Antymonopolowy i Regulacyjny (internet Quarterly on Antitrust and Regulation)
Smart grid technologies are central to the global shift towards a more efficient and sustainable energy infrastructure, integrating advanced digital systems with traditional power networks. While these technologies offer significant benefits, including enhanced energy management and the seamless integration of renewable energy sources, they also introduce complex privacy challenges. The extensive data collection and real-time communication capabilities inherent in smart grids raise concerns over consumer privacy, data breaches, and cybersecurity threats. This paper critically examines these privacy risks within the context of evolving regulatory frameworks such as the GDPR, NIS2 Directive, and the forthcoming EU AI Act. The discussion emphasizes …