Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 1 - 30 of 57896

Full-Text Articles in Physical Sciences and Mathematics

A Comprehensive Survey On Relation Extraction: Recent Advances And New Frontiers, Xiaoyan Zhao, Yang Deng, Min Yang, Lingzhi Wang, Rui Zhang, Hong Cheng, Wai Lam, Ying Shen, Ruifeng Xu Jun 2026

A Comprehensive Survey On Relation Extraction: Recent Advances And New Frontiers, Xiaoyan Zhao, Yang Deng, Min Yang, Lingzhi Wang, Rui Zhang, Hong Cheng, Wai Lam, Ying Shen, Ruifeng Xu

Research Collection School Of Computing and Information Systems

Relation extraction (RE) involves identifying the relations between entities from underlying content. RE serves as the foundation for many natural language processing (NLP) and information retrieval applications, such as knowledge graph completion and question answering. In recent years, deep neural networks have dominated the field of RE and made noticeable progress. Subsequently, the large pre-trained language models (PLMs) have taken the state-of-the-art RE to a new level. This survey provides a comprehensive review of existing deep learning techniques for RE. First, we introduce RE resources, including datasets and evaluation metrics. Second, we propose a new taxonomy to categorize existing works …


Quantitative Bounds On Resource Usage Of Probabilistic Programs, Krishnendu Chatterjee, Amir Kafshdar Goharshady, Tobias Meggendorfer, Dorde Zikelic May 2026

Quantitative Bounds On Resource Usage Of Probabilistic Programs, Krishnendu Chatterjee, Amir Kafshdar Goharshady, Tobias Meggendorfer, Dorde Zikelic

Research Collection School Of Computing and Information Systems

Cost analysis, also known as resource usage analysis, is the task of finding bounds on the total cost of a program and is a well-studied problem in static analysis. In this work, we consider two classical quantitative problems in cost analysis for probabilistic programs. The first problem is to find a bound on the expected total cost of the program. This is a natural measure for the resource usage of the program and can also be directly applied to average-case runtime analysis. The second problem asks for a tail bound, i.e. ‍given a threshold t the goal is to find …


Equivalence And Similarity Refutation For Probabilistic Programs, Krishnendu Chatterjee, Ehsan Kafshdar Goharshady, Petr Novotný, Dorde Zikelic Aug 2025

Equivalence And Similarity Refutation For Probabilistic Programs, Krishnendu Chatterjee, Ehsan Kafshdar Goharshady, Petr Novotný, Dorde Zikelic

Research Collection School Of Computing and Information Systems

We consider the problems of statically refuting equivalence and similarity of output distributions defined by a pair of probabilistic programs. Equivalence and similarity are two fundamental relational properties of probabilistic programs that are essential for their correctness both in implementation and in compilation. In this work, we present a new method for static equivalence and similarity refutation. Our method refutes equivalence and similarity by computing a function over program outputs whose expected value with respect to the output distributions of two programs is different. The function is computed simultaneously with an upper expectation supermartingale and a lower expectation submartingale for …


On Lexicographic Proof Rules For Probabilistic Termination, Krishnendu Chatterjee, Ehsan Kafshdar Goharshady, Petr Novotný, Jiří Zárevucký, Dorde Zikelic Jun 2025

On Lexicographic Proof Rules For Probabilistic Termination, Krishnendu Chatterjee, Ehsan Kafshdar Goharshady, Petr Novotný, Jiří Zárevucký, Dorde Zikelic

Research Collection School Of Computing and Information Systems

We consider the almost-sure (a.s.) termination problem for probabilistic programs, which are a stochastic extension of classical imperative programs. Lexicographic ranking functions provide a sound and practical approach for termination of non-probabilistic programs, and their extension to probabilistic programs is achieved via lexicographic ranking supermartingales (LexRSMs). However, LexRSMs introduced in the previous work have a limitation that impedes their automation: all of their components have to be non-negative in all reachable states. This might result in a LexRSM not existing even for simple terminating programs. Our contributions are twofold. First, we introduce a generalization of LexRSMs that allows for some …


Phoneme Recognition For Pronunciation Improvement, Matthew Heywood May 2025

Phoneme Recognition For Pronunciation Improvement, Matthew Heywood

Theses/Capstones/Creative Projects

This project aims to improve English pronunciation by investigating speech errors and developing a tool to provide precise feedback. The study focuses on creating a new pronunciation tool that offers localized feedback, identifies specific errors, and suggests corrective measures. By addressing the shortcomings of current methods, this research seeks to enhance pronunciation refinement.

Utilizing cutting-edge technology, the tool leverages speech-to-phoneme AI models and modified lazy string matching algorithms to compare the user's spoken input with the intended pronunciation. This allows for a detailed analysis of discrepancies, providing users actionable insights into their phonetic errors. The speech-to-phoneme AI models mark a …


Optimizing Mobility On Demand Systems: Multiagent Reinforcement Learning Approaches To Order Assignment And Vehicle Guidance, Jiyao Li Dec 2024

Optimizing Mobility On Demand Systems: Multiagent Reinforcement Learning Approaches To Order Assignment And Vehicle Guidance, Jiyao Li

All Graduate Theses and Dissertations, Fall 2023 to Present

This dissertation explores ways to improve Mobility on Demand (MoD) systems, which are services like ride-sharing and autonomous taxi systems. The main goal is to make these services more efficient and reliable, benefiting both passengers and drivers by better matching the number of available vehicles with the number of people needing rides.

For ride-sharing services, a new method called T-Balance helps match riders with drivers and guides empty taxis to areas where more people need rides. This reduces wait times for passengers and increases earnings for drivers. Another method, called GRL-HM, looks at how riders and drivers behave to further …


Sustainable Energysense: A Predictive Machine Learning Framework For Optimizing Residential Electricity Consumption, Murad Al-Rajab, Samia Loucif Dec 2024

Sustainable Energysense: A Predictive Machine Learning Framework For Optimizing Residential Electricity Consumption, Murad Al-Rajab, Samia Loucif

All Works

In a world where electricity is often taken for granted, the surge in consumption poses significant challenges, including elevated CO2 emissions and rising prices. These issues not only impact consumers but also have broader implications for the global environment. This paper endeavors to propose a smart application dedicated to optimizing the electricity consumption of household appliances. It employs Augmented Reality (AR) technology along with YOLO to detect electrical appliances and provide detailed electricity consumption insights, such as displaying the appliance consumption rate and computing the total electricity consumption based on the number of hours the appliance was used. The application …


Triadic Temporal-Semantic Alignment For Weakly-Supervised Video Moment Retrieval, Jin Liu, Jialong Xie, Fengyu Zhou, Shengfeng He Dec 2024

Triadic Temporal-Semantic Alignment For Weakly-Supervised Video Moment Retrieval, Jin Liu, Jialong Xie, Fengyu Zhou, Shengfeng He

Research Collection School Of Computing and Information Systems

Video Moment Retrieval (VMR) aims to identify specific event moments within untrimmed videos based on natural language queries. Existing VMR methods have been criticized for relying heavily on moment annotation bias rather than true multi-modal alignment reasoning. Weakly supervised VMR approaches inherently overcome this issue by training without precise temporal location information. However, they struggle with fine-grained semantic alignment and often yield multiple speculative predictions with prolonged video spans. In this paper, we take a step forward in the context of weakly supervised VMR by proposing a triadic temporalsemantic alignment model. Our proposed approach augments weak supervision by comprehensively addressing …


Asthma Prevalence Among United States Population Insights From Nhanes Data Analysis, Sarya Swed, Bisher Sawaf, Feras Al-Obeidat, Wael Hafez, Amine Rakab, Hidar Alibrahim, Mohamad Nour Nasif, Baraa Alghalyini, Abdul Rehman Zia Zaidi, Lamees Alshareef, Fadel Alqatati, Fathima Zamrath Zahir, Ashraf I. Ahmed, Mulham Alom, Anas Sultan, Abdullah Almahmoud, Agyad Bakkour, Ivan Cherrez-Ojeda Dec 2024

Asthma Prevalence Among United States Population Insights From Nhanes Data Analysis, Sarya Swed, Bisher Sawaf, Feras Al-Obeidat, Wael Hafez, Amine Rakab, Hidar Alibrahim, Mohamad Nour Nasif, Baraa Alghalyini, Abdul Rehman Zia Zaidi, Lamees Alshareef, Fadel Alqatati, Fathima Zamrath Zahir, Ashraf I. Ahmed, Mulham Alom, Anas Sultan, Abdullah Almahmoud, Agyad Bakkour, Ivan Cherrez-Ojeda

All Works

Asthma is a prevalent respiratory condition that poses a substantial burden on public health in the United States. Understanding its prevalence and associated risk factors is vital for informed policymaking and public health interventions. This study aims to examine asthma prevalence and identify major risk factors in the U.S. population. Our study utilized NHANES data between 1999 and 2020 to investigate asthma prevalence and associated risk factors within the U.S. population. We analyzed a dataset of 64,222 participants, excluding those under 20 years old. We performed binary regression analysis to examine the relationship of demographic and health related covariates with …


Harnessing Collective Structure Knowledge In Data Augmentation For Graph Neural Networks, Rongrong Ma, Guansong Pang, Ling Chen Dec 2024

Harnessing Collective Structure Knowledge In Data Augmentation For Graph Neural Networks, Rongrong Ma, Guansong Pang, Ling Chen

Research Collection School Of Computing and Information Systems

Graph neural networks (GNNs) have achieved state-of-the-art performance in graph representation learning. Message passing neural networks, which learn representations through recursively aggregating information from each node and its neighbors, are among the most commonly-used GNNs. However, a wealth of structural information of individual nodes and full graphs is often ignored in such process, which restricts the expressive power of GNNs. Various graph data augmentation methods that enable the message passing with richer structure knowledge have been introduced as one main way to tackle this issue, but they are often focused on individual structure features and difficult to scale up with …


Interpreting Neural Networks For Particle Tracing In Fluid Simulation Ensembles: An Interactive Visualization Framework, Maanav Choubey Dec 2024

Interpreting Neural Networks For Particle Tracing In Fluid Simulation Ensembles: An Interactive Visualization Framework, Maanav Choubey

All Graduate Theses and Dissertations, Fall 2023 to Present

Understanding the internal mechanisms of neural networks, particularly Multi-Layer Perceptrons (MLP), is essential for their effective application in a variety of scientific domains. In particular, in the scientific visualization domain their adoption has recently shown to be a promising tool to predict particle trajectories in fluid dynamics simulation and aid the interactive visualization of flows. This research addresses the critical challenge of interpretability of such models.

While interpretability has been extensively explored in fields like computer vision and natural language processing, its application to time series data, particularly for particle tracing (or prediction of trajectories), has not garnered sufficient attention. …


Exploring Post-Covid-19 Health Effects And Features With Advanced Machine Learning Techniques, Muhammad N. Islam, Md S. Islam, Nahid H. Shourav, Iftiaqur Rahman, Faiz A. Faisal, Md M. Islam, Iqbal H. Sarker Dec 2024

Exploring Post-Covid-19 Health Effects And Features With Advanced Machine Learning Techniques, Muhammad N. Islam, Md S. Islam, Nahid H. Shourav, Iftiaqur Rahman, Faiz A. Faisal, Md M. Islam, Iqbal H. Sarker

Research outputs 2022 to 2026

COVID-19 is an infectious respiratory disease that has had a significant impact, resulting in a range of outcomes including recovery, continued health issues, and the loss of life. Among those who have recovered, many experience negative health effects, particularly influenced by demographic factors such as gender and age, as well as physiological and neurological factors like sleep patterns, emotional states, anxiety, and memory. This research aims to explore various health factors affecting different demographic profiles and establish significant correlations among physiological and neurological factors in the post-COVID-19 state. To achieve these objectives, we have identified the post-COVID-19 health factors and …


Jamming Precoding In Af Relay-Aided Plc Systems With Multiple Eavessdroppers, Zhengmin Kong, Jiaxing Cui, Li Ding, Tao Huang, Shihao Yan Dec 2024

Jamming Precoding In Af Relay-Aided Plc Systems With Multiple Eavessdroppers, Zhengmin Kong, Jiaxing Cui, Li Ding, Tao Huang, Shihao Yan

Research outputs 2022 to 2026

Enhancing information security has become increasingly significant in the digital age. This paper investigates the concept of physical layer security (PLS) within a relay-aided power line communication (PLC) system operating over a multiple-input multiple-output (MIMO) channel based on MK model. Specifically, we examine the transmission of confidential signals between a source and a distant destination while accounting for the presence of multiple eavesdroppers, both colluding and non-colluding. We propose a two-phase jamming scheme that leverages a full-duplex (FD) amplify-and-forward (AF) relay to address this challenge. Our primary objective is to maximize the secrecy rate, which necessitates the optimization of the …


Llm Potentiality And Awareness: A Position Paper From The Perspective Of Trustworthy And Responsible Ai Modeling, Iqbal H. Sarker Dec 2024

Llm Potentiality And Awareness: A Position Paper From The Perspective Of Trustworthy And Responsible Ai Modeling, Iqbal H. Sarker

Research outputs 2022 to 2026

Large language models (LLMs) are an exciting breakthrough in the rapidly growing field of artificial intelligence (AI), offering unparalleled potential in a variety of application domains such as finance, business, healthcare, cybersecurity, and so on. However, concerns regarding their trustworthiness and ethical implications have become increasingly prominent as these models are considered black-box and continue to progress. This position paper explores the potentiality of LLM from diverse perspectives as well as the associated risk factors with awareness. Towards this, we highlight not only the technical challenges but also the ethical implications and societal impacts associated with LLM deployment emphasizing fairness, …


Toward A Globally Lunar Calendar: A Machine Learning-Driven Approach For Crescent Moon Visibility Prediction, Samia Loucif, Murad Al-Rajab, Raed Abu Zitar, Mahmoud Rezk Dec 2024

Toward A Globally Lunar Calendar: A Machine Learning-Driven Approach For Crescent Moon Visibility Prediction, Samia Loucif, Murad Al-Rajab, Raed Abu Zitar, Mahmoud Rezk

All Works

This paper presents a comprehensive approach to harmonizing lunar calendars across different global regions, addressing the long-standing challenge of variations in new crescent Moon sightings that mark the beginning of lunar months. We propose a machine learning (ML)-based framework to predict the visibility of the new crescent Moon, representing a significant advancement toward a globally unified lunar calendar. Our study utilized a dataset covering various countries globally, making it the first to analyze all 12 lunar months over a span of 13 years. We applied a wide array of ML algorithms and techniques. These techniques included feature selection, hyperparameter tuning, …


Development Of A Web-Based Information System For Student Leave Permission At Dar Al-Raudhah Islamic Boarding School: Iso Quality Standards Analysis, Bonita Destiana, Priyanto Priyanto, Rahmatul Irfan, Muhammad Gus Khamim, Muhammad Yusuf Ridlo, Muhammad Iqbal Nov 2024

Development Of A Web-Based Information System For Student Leave Permission At Dar Al-Raudhah Islamic Boarding School: Iso Quality Standards Analysis, Bonita Destiana, Priyanto Priyanto, Rahmatul Irfan, Muhammad Gus Khamim, Muhammad Yusuf Ridlo, Muhammad Iqbal

Elinvo (Electronics, Informatics, and Vocational Education)

Dar Al-Raudhah Entrepreneur, Islamic Boarding School, has adopted digital technology by upgrading hardware and software also investing in reliable internet infrastructure. However, this school still faces issues with students’ leave permission process due to reliance on manual bookkeeping and Excel, which leads to potential errors. Based on those problems, this research aims to create a web-based student leave permission system called SIPERSAN. The SIPERSAN system was developed with a Waterfall development model, which includes requirements analysis, design, implementation, testing, and deployment. The database is managed with MySQL, and the system is developed using PHP with the Laravel framework. Based on …


Uncovering Merchants’ Willingness To Wait In On-Demand Food Delivery Markets, Jian Liang, Ya Zhao, Hai Wang, Zuopeng Xiao, Jintao Ke Nov 2024

Uncovering Merchants’ Willingness To Wait In On-Demand Food Delivery Markets, Jian Liang, Ya Zhao, Hai Wang, Zuopeng Xiao, Jintao Ke

Research Collection School Of Computing and Information Systems

While traditional on-demand food delivery services help restaurants reach more customers and enable doorstep deliveries, they also come with drawbacks, such as high commission fees and limited control over the delivery process. White-label food delivery services have emerged as an alternative, ready-to-use platform for restaurants to arrange delivery for customer orders received through their applications or websites, without the constraints imposed by traditional on-demand food delivery platforms or the need to develop an in-house delivery operation. Although several studies have investigated consumer behavior when using traditional on-demand food delivery services, there is limited research on merchants’ behavior when adopting white-label …


Efficient Multiplicative-To-Additive Function From Joye-Libert Cryptosystem And Its Application To Threshold Ecdsa, Haiyang Xue, Ho Man Au, Mengling Liu, Yin Kwan Chan, Handong Cui, Xiang Xie, Hon Tsz Yuen, Chengru Zhang Nov 2024

Efficient Multiplicative-To-Additive Function From Joye-Libert Cryptosystem And Its Application To Threshold Ecdsa, Haiyang Xue, Ho Man Au, Mengling Liu, Yin Kwan Chan, Handong Cui, Xiang Xie, Hon Tsz Yuen, Chengru Zhang

Research Collection School Of Computing and Information Systems

Threshold ECDSA receives interest lately due to its widespread adoption in blockchain applications. A common building block of all leading constructions involves a secure conversion of multiplicative shares into additive ones, which is called the multiplicative-to-additive (MtA) function. MtA dominates the overall complexity of all existing threshold ECDSA constructions. Specifically, O(n2) invocations of MtA are required in the case of n active signers. Hence, improvement of MtA leads directly to significant improvements for all state-of-the-art threshold ECDSA schemes.In this paper, we design a novel MtA by revisiting the Joye-Libert (JL) cryptosystem. Specifically, we revisit JL encryption and propose a JL-based …


2024 Gateway Magazine, College Of Computing, Michigan Technological University Oct 2024

2024 Gateway Magazine, College Of Computing, Michigan Technological University

College of Computing Annual Magazines

Table of Contents

  • 50 Years of Computer Science at Michigan Tech
  • Data Science for a Changing Planet
  • Healthcare Transformed
  • Mechatronics Matters
  • Powered by Michigan Tech Talent
  • Esports: Bringing Everything Great about Sports to More People
  • The Michigander Scholars Program: Electrifying Careers in Michigan
  • College of Computing News


Bibliography For "Ai: The Next Chapter Display", Arianna Tillman, Isabella Piechota Oct 2024

Bibliography For "Ai: The Next Chapter Display", Arianna Tillman, Isabella Piechota

Library Displays and Bibliographies

A bibliography created to support a display about artificial intelligence at the Leatherby Libraries during Fall 2024 at the Leatherby Libraries at Chapman University.


Hisoma: A Hierarchical Multi-Agent Model Integrating Self-Organizing Neural Networks With Multi-Agent Deep Reinforcement Learning, Minghong Geng, Shubham Pateria, Budhitama Subagdja, Ah-Hwee Tan Oct 2024

Hisoma: A Hierarchical Multi-Agent Model Integrating Self-Organizing Neural Networks With Multi-Agent Deep Reinforcement Learning, Minghong Geng, Shubham Pateria, Budhitama Subagdja, Ah-Hwee Tan

Research Collection School Of Computing and Information Systems

Multi-agent deep reinforcement learning (MADRL) has shown remarkable advancements in the past decade. However, most current MADRL models focus on task-specific short-horizon problems involving a small number of agents, limiting their applicability to long-horizon planning in complex environments. Hierarchical multi-agent models offer a promising solution by organizing agents into different levels, effectively addressing tasks with varying planning horizons. However, these models often face constraints related to the number of agents or levels of hierarchies. This paper introduces HiSOMA, a novel hierarchical multi-agent model designed to handle long-horizon, multi-agent, multi-task decision-making problems. The top-level controller, FALCON, is modeled as a class …


Generative Ai In Software Engineering Must Be Human-Centered: The Copenhagen Manifesto, D. Russo, S. Van Berkel Baltes, Christoph Treude Oct 2024

Generative Ai In Software Engineering Must Be Human-Centered: The Copenhagen Manifesto, D. Russo, S. Van Berkel Baltes, Christoph Treude

Research Collection School Of Computing and Information Systems

The advent of Generative Artificial Intelligence—systems that can produce human-like content such as text, music, visual art, or source code—marks not only a significant leap for Artificial Intelligence (AI) but also a pivotal moment for software practitioners and researchers. The role of software engineering researchers and practitioners in adopting the technologies that shape our world is critical. Historically, the human aspects of developing software have been treated as secondary to more technical innovations. However, the emergence of Generative AI will simultaneously enhance human capabilities while surfacing complex ethical, social, legal, and technical challenges.While primarily aimed at software engineering (SE) researchers …


Does Ceo Agreeableness Personality Mitigate Real Earnings Management?, Shan Liu, Xingying Wu, Nan Hu Oct 2024

Does Ceo Agreeableness Personality Mitigate Real Earnings Management?, Shan Liu, Xingying Wu, Nan Hu

Research Collection School Of Computing and Information Systems

Despite efforts to mitigate aggressive financial reporting, earnings management remains challenging to parties interested in inhibiting its dysfunctional effects. Using linguistic algorithms to assess CEO agreeableness personality from their unscripted texts in conference calls, we find that it is a determinant that mitigates a firm's real earnings management. Furthermore, such an effect is more pronounced when firms confront intensive market competition and financial distress and have weaker managerial entrenchment or when CEOs face stronger internal governance. Our findings persist even after we utilize several alternative real earnings management metrics and control other confounding personalities in prior earnings management studies. The …


Ocapo: Fine-Grained Occupancy-Aware, Empirically-Driven Pdc Control In Open-Plan, Shared Workspaces, Ravi Anuradha, Dulaj Sanjaya Weerakoon, Archan Misra Oct 2024

Ocapo: Fine-Grained Occupancy-Aware, Empirically-Driven Pdc Control In Open-Plan, Shared Workspaces, Ravi Anuradha, Dulaj Sanjaya Weerakoon, Archan Misra

Research Collection School Of Computing and Information Systems

Passive Displacement Cooling (PDC) is a relatively recent technology gaining attention as a means of significantly reducing building energy consumption overheads, especially in tropical climates. PDC eliminates the use of mechanical fans, instead using chilled-water heat exchangers to perform convective cooling. In this paper, we identify and characterize the impact of several key parameters affecting occupant comfort in a 1000m2 open-floor area (consisting of multiple zones) of a ZEB (Zero Energy Building) deployed with PDC units and tackle the problem of setting the temperature setpoint of the PDC units to assure occupant thermal comfort and yet conserve energy. We tackle …


On The Lossiness Of 2k-Th Power And The Instantiability Of Rabin-Oaep, Haiyang Xue, Bao Li, Xianhui Lu, Kunpeng Wang, Yamin Liu Oct 2024

On The Lossiness Of 2k-Th Power And The Instantiability Of Rabin-Oaep, Haiyang Xue, Bao Li, Xianhui Lu, Kunpeng Wang, Yamin Liu

Research Collection School Of Computing and Information Systems

Seurin PKC 2014 proposed the 2-ï /4-hiding assumption which asserts the indistinguishability of Blum Numbers from pseudo Blum Numbers. In this paper, we investigate the lossiness of 2 k -th power based on the 2 k -ï /4-hiding assumption, which is an extension of the 2-ï /4-hiding assumption. And we prove that 2 k -th power function is a lossy trapdoor permutation over Quadratic Residuosity group. This new lossy trapdoor function has 2 k -bits lossiness for k -bits exponent, while the RSA lossy trapdoor function given by Kiltz et al. Crypto 2010 has k -bits lossiness for k -bits …


D2sr: Decentralized Detection, De-Synchronization, And Recovery Of Lidar Interference, Darshana Rathnayake, Hemanth Sabbella, Meera Radhakrishnan, Archan Misra Oct 2024

D2sr: Decentralized Detection, De-Synchronization, And Recovery Of Lidar Interference, Darshana Rathnayake, Hemanth Sabbella, Meera Radhakrishnan, Archan Misra

Research Collection School Of Computing and Information Systems

We address the challenge of multi-LiDAR interference, an issue of growing importance as LiDAR sensors are embedded in a growing set of pervasive devices. We introduce a novel approach named D2SR, enabling decentralized interference detection, mitigation, and recovery without explicit coordination among nearby LiDAR devices. D2SR comprises three stages: (a) Detection, which identifies interfered frames, (b) Mitigation, which performs time-shifting of a LiDAR’s active period to reduce interference, and (c) Recovery, which corrects or reconstructs the depth values in interfered regions of a depth frame. Key contributions include a lightweight interference detection algorithm achieving an F1-score of 92%, a simple …


What Do We Know About Hugging Face? A Systematic Literature Review And Quantitative Validation Of Qualitative Claims, Jason Jones, Wenxin Jiang, Nicholas Synovic, George K. Thiruvathukal, James C. Davis Oct 2024

What Do We Know About Hugging Face? A Systematic Literature Review And Quantitative Validation Of Qualitative Claims, Jason Jones, Wenxin Jiang, Nicholas Synovic, George K. Thiruvathukal, James C. Davis

Computer Science: Faculty Publications and Other Works

Background: Collaborative Software Package Registries (SPRs) are an integral part of the software supply chain. Much engineering work synthesizes SPR package into applications. Prior research has examined SPRs for traditional software, such as NPM (JavaScript) and PyPI (Python). Pre-Trained Model (PTM) Registries are an emerging class of SPR of increasing importance, because they support the deep learning supply chain.
Aims: Recent empirical research has examined PTM registries in ways such as vulnerabilities, reuse processes, and evolution. However, no existing research synthesizes them to provide a systematic understanding of the current knowledge. Some of the existing research includes qualitative …


Retrofitting A Legacy Cutlery Washing Machine Using Computer Vision, Hua Leong Fwa Oct 2024

Retrofitting A Legacy Cutlery Washing Machine Using Computer Vision, Hua Leong Fwa

Research Collection School Of Computing and Information Systems

Industry 4.0, the digitalization of manufacturing promises to lead to lowered cost, efficient processes and even discovery of new business models. However, many of the enterprises have huge investments in legacy machines which are not 'smart'. In this study, we thus designed a cost-efficient solution to retrofit a legacy conveyor belt-based cutlery washing machine with a commodity web camera. We then applied computer vision (using both traditional image processing and deep learning techniques) to infer the speed and utilization of the machine. We detailed the algorithms that we designed for computing both speed andutilization. With the existing operational constraints of …


Resilient Tcp Variant Enabling Smooth Network Updates For Software-Defined Data Center Networks, Abdul Basit Dogar, Sami Ullah, Yiran Zhang, Hisham Alasmary, Muhammad Waqas, Sheng Chen Oct 2024

Resilient Tcp Variant Enabling Smooth Network Updates For Software-Defined Data Center Networks, Abdul Basit Dogar, Sami Ullah, Yiran Zhang, Hisham Alasmary, Muhammad Waqas, Sheng Chen

Research outputs 2022 to 2026

Network updates have become increasingly prevalent since the broad adoption of software-defined networks (SDNs) in data centers. Modern TCP designs, including cutting-edge TCP variants DCTCP, CUBIC, and BBR, however, are not resilient to network updates that provoke flow rerouting. In this paper, we first demonstrate that popular TCP implementations perform inadequately in the presence of frequent and inconsistent network updates, because inconsistent and frequent network updates result in out-of-order packets and packet drops induced via transitory congestion and lead to serious performance deterioration. We look into the causes and propose a network update-friendly TCP (NUFTCP), which is an extension of …


Privacy Risks And Regulatory Challenges In Smart Grids And Renewable Energy Systems, Mikołaj Rajca Sep 2024

Privacy Risks And Regulatory Challenges In Smart Grids And Renewable Energy Systems, Mikołaj Rajca

internetowy Kwartalnik Antymonopolowy i Regulacyjny (internet Quarterly on Antitrust and Regulation)

Smart grid technologies are central to the global shift towards a more efficient and sustainable energy infrastructure, integrating advanced digital systems with traditional power networks. While these technologies offer significant benefits, including enhanced energy management and the seamless integration of renewable energy sources, they also introduce complex privacy challenges. The extensive data collection and real-time communication capabilities inherent in smart grids raise concerns over consumer privacy, data breaches, and cybersecurity threats. This paper critically examines these privacy risks within the context of evolving regulatory frameworks such as the GDPR, NIS2 Directive, and the forthcoming EU AI Act. The discussion emphasizes …