Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Singapore Management University (7219)
- China Simulation Federation (3363)
- TÜBİTAK (3020)
- Selected Works (2644)
- Wright State University (2602)
-
- Purdue University (2057)
- Old Dominion University (1452)
- Missouri University of Science and Technology (1360)
- Edith Cowan University (1172)
- Air Force Institute of Technology (1108)
- University of Texas at El Paso (1094)
- Dartmouth College (1017)
- San Jose State University (995)
- University of Nebraska - Lincoln (979)
- Embry-Riddle Aeronautical University (853)
- City University of New York (CUNY) (818)
- Technological University Dublin (792)
- Washington University in St. Louis (785)
- Brigham Young University (759)
- California Polytechnic State University, San Luis Obispo (725)
- Kennesaw State University (712)
- University for Business and Technology in Kosovo (626)
- University of Texas at Arlington (614)
- Nova Southeastern University (535)
- Portland State University (529)
- Western University (524)
- SelectedWorks (522)
- New Jersey Institute of Technology (511)
- Syracuse University (501)
- University of Nebraska at Omaha (484)
- Keyword
-
- Machine learning (1330)
- Deep learning (797)
- Artificial intelligence (652)
- Machine Learning (649)
- Computer Science (638)
-
- Security (620)
- Computer science (435)
- Cybersecurity (408)
- Privacy (408)
- Simulation (377)
- Classification (367)
- Technical Reports (358)
- UTEP Computer Science Department (356)
- Data mining (349)
- Deep Learning (344)
- Algorithms (336)
- Optimization (333)
- Neural networks (307)
- Artificial Intelligence (297)
- Computer vision (290)
- College for Professional Studies (253)
- Software engineering (253)
- Education (252)
- Clustering (251)
- Cloud computing (244)
- Department of Computer Science and Engineering (243)
- Applied sciences (236)
- School of Computer & Information Science (236)
- Visualization (236)
- Social media (230)
- Publication Year
- Publication
-
- Research Collection School Of Computing and Information Systems (6871)
- Journal of System Simulation (3363)
- Turkish Journal of Electrical Engineering and Computer Sciences (3020)
- Theses and Dissertations (2498)
- Department of Computer Science Technical Reports (1721)
-
- Computer Science & Engineering Syllabi (1312)
- Departmental Technical Reports (CS) (881)
- Master's Projects (845)
- Electronic Theses and Dissertations (735)
- Computer Science Faculty Publications (724)
- All Computer Science and Engineering Research (683)
- Computer Science Technical Reports (673)
- Computer Science Faculty Research & Creative Works (595)
- Faculty Publications (585)
- Kno.e.sis Publications (543)
- Journal of Digital Forensics, Security and Law (536)
- Computer Science Faculty Publications and Presentations (507)
- Dissertations (500)
- CCE Theses and Dissertations (488)
- All Works (478)
- Walden Dissertations and Doctoral Studies (467)
- Chulalongkorn University Theses and Dissertations (Chula ETD) (463)
- Masters Theses (402)
- Computer Science and Engineering Theses (356)
- Theses (334)
- Electronic Thesis and Dissertation Repository (333)
- Computer Science and Software Engineering (332)
- USF Tampa Graduate Theses and Dissertations (320)
- Computer Science: Faculty Publications (316)
- Mathematics, Statistics and Computer Science Faculty Research and Publications (315)
- Publication Type
Articles 511 - 540 of 57908
Full-Text Articles in Physical Sciences and Mathematics
Navigating The Complexities Of Ai: The Critical Role Of Interpretability And Explainability In Ensuring Transparency And Trust, Emily Barnes, James Hutson
Navigating The Complexities Of Ai: The Critical Role Of Interpretability And Explainability In Ensuring Transparency And Trust, Emily Barnes, James Hutson
Faculty Scholarship
The interpretability and explainability of deep neural networks (DNNs) are paramount in artificial intelligence (AI), especially when applied to high-stakes fields such as healthcare, finance, and autonomous driving. The need for this study arises from the growing integration of AI into critical areas where transparency, trust, and ethical decision-making are essential. This paper explores the impact of architectural design choices on DNN interpretability, focusing on how different architectural elements like layer types, network depth, connectivity patterns, and attention mechanisms affect model transparency. Methodologically, the study employs a comprehensive review of case studies and experimental results to analyze the balance between …
Performance Interference Detection For Cloud-Native Applications Using Unsupervised Machine Learning Models, Eli Bakshi
Performance Interference Detection For Cloud-Native Applications Using Unsupervised Machine Learning Models, Eli Bakshi
Master's Theses
Contemporary cloud-native applications frequently adopt the microservice architecture, where applications are deployed within multiple containers that run on cloud virtual machines (VMs). These applications are typically hosted on public cloud platforms, where VMs from multiple cloud subscribers compete for the same physical resources on a cloud server. When a cloud subscriber application running on a VM competes for shared physical resources from other applications running on the same VM or from other VMs co-located on the same cloud server, performance interference may occur when the performance of an application degrades due to shared resource contention. Detecting such interference is crucial …
Morp: Monocular Orientation Regression Pipeline, Jacob Gunderson
Morp: Monocular Orientation Regression Pipeline, Jacob Gunderson
Master's Theses
Orientation estimation of objects plays a pivotal role in robotics, self-driving cars, and augmented reality. Beyond mere position, accurately determining the orientation of objects is essential for constructing precise models of the physical world. While 2D object detection has made significant strides, the field of orientation estimation still faces several challenges. Our research addresses these hurdles by proposing an efficient pipeline which facilitates rapid creation of labeled training data and enables direct regression of object orientation from a single image. We start by creating a digital twin of a physical object using an iPhone, followed by generating synthetic images using …
Interpretable Learning In Multivariate Big Data Analysis For Network Monitoring, José Camacho, Katarzyna Wasielewska, Rasmus Bro, David Kotz
Interpretable Learning In Multivariate Big Data Analysis For Network Monitoring, José Camacho, Katarzyna Wasielewska, Rasmus Bro, David Kotz
Dartmouth Scholarship
There is an increasing interest in the development of new data-driven models useful to assess the performance of communication networks. For many applications, like network monitoring and troubleshooting, a data model is of little use if it cannot be interpreted by a human operator. In this paper, we present an extension of the Multivariate Big Data Analysis (MBDA) methodology, a recently proposed interpretable data analysis tool. In this extension, we propose a solution to the automatic derivation of features, a cornerstone step for the application of MBDA when the amount of data is massive. The resulting network monitoring approach allows …
Automated Sensor Node Malicious Activity Detection With Explainability Analysis, Md Zubair, Helge Janicke, Ahmad Mohsin, Leandros Maglaras, Iqbal H. Sarker
Automated Sensor Node Malicious Activity Detection With Explainability Analysis, Md Zubair, Helge Janicke, Ahmad Mohsin, Leandros Maglaras, Iqbal H. Sarker
Research outputs 2022 to 2026
Cybersecurity has become a major concern in the modern world due to our heavy reliance on cyber systems. Advanced automated systems utilize many sensors for intelligent decision-making, and any malicious activity of these sensors could potentially lead to a system-wide collapse. To ensure safety and security, it is essential to have a reliable system that can automatically detect and prevent any malicious activity, and modern detection systems are created based on machine learning (ML) models. Most often, the dataset generated from the sensor node for detecting malicious activity is highly imbalanced because the Malicious class is significantly fewer than the …
Context In Computer Vision: A Taxonomy, Multi-Stage Integration, And A General Framework, Xuan Wang
Context In Computer Vision: A Taxonomy, Multi-Stage Integration, And A General Framework, Xuan Wang
Dissertations, Theses, and Capstone Projects
Contextual information has been widely used in many computer vision tasks, such as object detection, video action detection, image classification, etc. Recognizing a single object or action out of context could be sometimes very challenging, and context information may help improve the understanding of a scene or an event greatly. However, existing approaches design specific contextual information mechanisms for different detection tasks.
In this research, we first present a comprehensive survey of context understanding in computer vision, with a taxonomy to describe context in different types and levels. Then we proposed MultiCLU, a new multi-stage context learning and utilization framework, …
D-Hacking, Emily Black, Talia B. Gillis, Zara Hall
D-Hacking, Emily Black, Talia B. Gillis, Zara Hall
Faculty Scholarship
Recent regulatory efforts, including Executive Order 14110 and the AI Bill of Rights, have focused on mitigating discrimination in AI systems through novel and traditional application of anti-discrimination laws. While these initiatives rightly emphasize fairness testing and mitigation, we argue that they pay insufficient attention to robust bias measurement and mitigation — and that without doing so, the frameworks cannot effectively achieve the goal of reducing discrimination in deployed AI models. This oversight is particularly concerning given the instability and brittleness of current algorithmic bias mitigation and fairness optimization methods, as highlighted by growing evidence in the algorithmic fairness literature. …
Synthesis Of Dyes Sulfamidazole: Characterization, Evaluation, Molecular Docking And Global Descriptors By Density Functional Theory (Dft)., Athra G. Sager, Jawad Kadhim Abaies, Zeena R. Katoof
Synthesis Of Dyes Sulfamidazole: Characterization, Evaluation, Molecular Docking And Global Descriptors By Density Functional Theory (Dft)., Athra G. Sager, Jawad Kadhim Abaies, Zeena R. Katoof
Karbala International Journal of Modern Science
In the present work, novel azo compounds of sulfamidazole were created via the reaction of diazonium salt of sulfamidazole with several aromatic molecules including (resorcinol, 2-nitro phenol, 3-nitro phenol, and 4-nitro phenol)) (Z1–Z4). The new compounds (Z1-Z4) were identified using FTIR, 1HNMR techniques, in addition to melting point measurements. The biological activity of compounds (Z1-Z4) was studied against four kinds of bacteria including E. coli, Klebsiella pneumonia, Salmonella, and Staphylococcus aureus. The findings showed that all compounds (Z1-Z4) were active against the examined bacteria. Theoretical studies of the antibacterial ability of the prepared compound against DNA gyrase enzyme …
Nonlinear Classifiers For Wet-Neuromorphic Computing Using Gene Regulatory Neural Network, Adrian Ratwatte, Samitha Somathilaka, Sasitharan Balasubramaniam, Assaf A. Gilad
Nonlinear Classifiers For Wet-Neuromorphic Computing Using Gene Regulatory Neural Network, Adrian Ratwatte, Samitha Somathilaka, Sasitharan Balasubramaniam, Assaf A. Gilad
School of Computing: Faculty Publications
The gene regulatory network (GRN) of biological cells governs a number of key functionalities that enable them to adapt and survive through different environmental conditions. Close observation of the GRN shows that the structure and operational principles resemble an artificial neural network (ANN), which can pave the way for the development of wet-neuromorphic computing systems. Genes are integrated into gene-perceptrons with transcription factors (TFs) as input, where the TF concentration relative to half-maximal RNA concentration and gene product copy number influences transcription and translation via weighted multiplication before undergoing a nonlinear activation function. This process yields protein concentration as the …
A Survey Of Practical Haskell: Parsing, Interpreting, And Testing, Parker Landon
A Survey Of Practical Haskell: Parsing, Interpreting, And Testing, Parker Landon
Honors Projects
Strongly typed pure functional programming languages like Haskell have historically been confined to academia as vehicles for programming language research. While features of functional programming have greatly influenced mainstream programming languages, the imperative programming style remains pervasive in practical software development. This paper illustrates the practical utility of Haskell and pure functional programming by exploring “hson,” a scripting language for processing JSON developed in Haskell. After introducing the relevant features of Haskell to the unfamiliar reader, this paper reveals how hson leverages functional programming to implement parsing, interpreting, and testing. By showcasing how Haskell’s language features enable the creation of …
Empirical Exploration Of Software Testing, Samia Alblwi
Empirical Exploration Of Software Testing, Samia Alblwi
Dissertations
Despite several advances in software engineering research and development, the quality of software products remains a considerable challenge. For all its theoretical limitations, software testing remains the main method used in practice to control, enhance, and certify software quality. This doctoral work comprises several empirical studies aimed at analyzing and assessing common software testing approaches, methods, and assumptions. In particular, the concept of mutant subsumption is generalized by taking into account the possibility for a base program and its mutants to diverge for some inputs, demonstrating the impact of this generalization on how subsumption is defined. The problem of mutant …
Network Slicing And Noma Enabled Mobile Edge Computing For Next-Generation Networks, Mohammad Arif Hossain
Network Slicing And Noma Enabled Mobile Edge Computing For Next-Generation Networks, Mohammad Arif Hossain
Dissertations
The advent of next-generation wireless networks ushers in a new era of potential, harnessing cutting-edge technologies like mobile edge computing (MEC), non-orthogonal multiple access (NOMA), and network slicing as pivotal drivers of transformation. Within this landscape, an innovative approach is proposed by introducing a NOMA-enabled network slicing technique within MEC networks. This approach aims to achieve multiple objectives: meeting stringent quality of service requirements, minimizing service latency, and enhancing spectral efficiency. By seamlessly integrating NOMA with network slicing in edge computing environments, significant reductions in overall latency are achieved, alongside ensuring optimal resource allocation for NOMA users. To address these …
Information Theoretic Bounds For Capacity And Bayesian Risk, Ian Zieder
Information Theoretic Bounds For Capacity And Bayesian Risk, Ian Zieder
Dissertations
In this dissertation, the problem of finding lower error bounds on the minimum mean-squared error (MMSE) and the maximum capacity achieving distribution for a specific channel is addressed. Presented are two parts, a new lower bound on the MMSE and upper and lower bounds on the capacity achieving distribution for a Binomial noise channel. The new lower bound on the MMSE is achieved via use of the Poincare inequality. It is compared to the performance of the well known Ziv-Zakai error bound. The second part considers a binomial noise channel and is concerned with the properties of the capacity-achieving distribution. …
Sensing With Integrity: Responsible Sensor Systems In An Era Of Ai, David Eisenberg
Sensing With Integrity: Responsible Sensor Systems In An Era Of Ai, David Eisenberg
Dissertations
Deep and machine learning now offer immense benefits for consumer choice, decision-making, medicine, mental health and education, smart cities, and intelligent transportation and driver safety. However, as communication and Internet technology further advances, these benefits have the potential to be outweighed by compromises to privacy, personal freedom, consumer trust, and discrimination. While ethical consequences for personal freedom and equity rise from these technological advances, the issue may not be the technology itself but a lack of regulation and policy that allow abuses to occur. A first study examines how emerging sensor-based technologies, limited to only accelerometer and gyroscope data from …
Charting A Path To The Quintuple Aim: Harnessing Ai To Address Social Determinants Of Health, Yash Shah, Zachary Goldberg, Erika Harness, David Nash
Charting A Path To The Quintuple Aim: Harnessing Ai To Address Social Determinants Of Health, Yash Shah, Zachary Goldberg, Erika Harness, David Nash
College of Population Health Faculty Papers
The Quintuple Aim seeks to improve healthcare by addressing social determinants of health (SDOHs), which are responsible for 70-80% of medical outcomes. SDOH-related concerns have traditionally been addressed through referrals to social workers and community-based organizations (CBOs), but these pathways have had limited success in connecting patients with resources. Given that health inequity is expected to cost the United States nearly USD 300 billion by 2050, new artificial intelligence (AI) technology may aid providers in addressing SDOH. In this commentary, we present our experience with using ChatGPT to obtain SDOH management recommendations for archetypal patients in Philadelphia, PA. ChatGPT identified …
The Next Strike: Pioneering Forward-Thinking Attack Techniques With Rowhammer In Dram Technologies, Nakul Kochar
The Next Strike: Pioneering Forward-Thinking Attack Techniques With Rowhammer In Dram Technologies, Nakul Kochar
Theses
In the realm of DRAM technologies this study investigates RowHammer vulnerabilities in DDR4 DRAM memory across various manufacturers, employing advanced multi-sided fault injection techniques to impose attack strategies directly on physical memory rows. Our novel approach, diverging from traditional victim-focused methods, involves strategically allocating virtual memory rows to their physical counterparts for more potent attacks. These attacks, exploiting the inherent weaknesses in DRAM design, are capable of inducing bit flips in a controlled manner to undermine system integrity. We employed a strategy that compromised system integrity through a nuanced approach of targeting rows situated at a distance of two rows …
Size-Constrained Weighted Ancestors With Applications, Philip Bille, Yakov Nekrich, Solon P. Pissis
Size-Constrained Weighted Ancestors With Applications, Philip Bille, Yakov Nekrich, Solon P. Pissis
Michigan Tech Publications, Part 2
The weighted ancestor problem on a rooted node-weighted tree T is a generalization of the classic predecessor problem: construct a data structure for a set of integers that supports fast predecessor queries. Both problems are known to require Ω(log log n) time for queries provided O(n poly log n) space is available, where n is the input size. The weighted ancestor problem has attracted a lot of attention by the combinatorial pattern matching community due to its direct application to suffix trees. In this formulation of the problem, the nodes are weighted by string depth. This research has culminated in …
Try It Together - Qualitative Coding With Atlas.Ti, Danping Dong, Bryan Leow
Try It Together - Qualitative Coding With Atlas.Ti, Danping Dong, Bryan Leow
2024 AI for Research Week
This hands-on session introduces Atlas.ti, a well-established qualitative data analysis tool for analyzing your transcripts and textual data. The session will cover coding data, extracting insights, creating visualizations, and exploring the tool's latest AI features.
Try It Together: Transcribing Your Audio With Whisper Api, Bella Ratmelia
Try It Together: Transcribing Your Audio With Whisper Api, Bella Ratmelia
2024 AI for Research Week
In this hands-on session, we will explore using the Whisper API to transcribe audio recordings from interviews, focus groups, and speeches. The session will delve into best practices and address common issues that may arise during the transcription process.
Singleadv: Single-Class Target-Specific Attack Against Interpretable Deep Learning Systems, Eldor Abdukhamidov, Mohammed Abuhamad, George K. Thiruvathukal, Hyoungshick Kim, Tamer Abuhmed
Singleadv: Single-Class Target-Specific Attack Against Interpretable Deep Learning Systems, Eldor Abdukhamidov, Mohammed Abuhamad, George K. Thiruvathukal, Hyoungshick Kim, Tamer Abuhmed
Computer Science: Faculty Publications and Other Works
In this paper, we present a novel Single-class target-specific Adversarial attack called SingleADV. The goal of SingleADV is to generate a universal perturbation that deceives the target model into confusing a specific category of objects with a target category while ensuring highly relevant and accurate interpretations. The universal perturbation is stochastically and iteratively optimized by minimizing the adversarial loss that is designed to consider both the classifier and interpreter costs in targeted and non-targeted categories. In this optimization framework, ruled by the first- and second-moment estimations, the desired loss surface promotes high confidence and interpretation score of adversarial samples. By …
Unveiling The Metaverse: A Survey Of User Perceptions And The Impact Of Usability, Social Influence And Interoperability, Mousa Al-Kfairy, Ayham Alomari, Mahmood Al-Bashayreh, Omar Alfandi, Mohammad Tubishat
Unveiling The Metaverse: A Survey Of User Perceptions And The Impact Of Usability, Social Influence And Interoperability, Mousa Al-Kfairy, Ayham Alomari, Mahmood Al-Bashayreh, Omar Alfandi, Mohammad Tubishat
All Works
This review explores the Metaverse, focusing on user perceptions and emphasizing the critical aspects of usability, social influence, and interoperability within this emerging digital ecosystem. By integrating various academic perspectives, this analysis highlights the Metaverse's significant impact across various sectors, emphasizing its potential to reshape digital interaction paradigms. The investigation reveals usability as a cornerstone for user engagement, demonstrating how social dynamics profoundly influence user behaviors and choices within virtual environments. Furthermore, the study outlines interoperability as a paramount challenge, advocating for establishing unified protocols and technologies to facilitate seamless experiences across disparate Metaverse platforms. It advocates for the adoption …
Measuring Confidentiality With Multiple Observables, John J. Utley
Measuring Confidentiality With Multiple Observables, John J. Utley
Computer Science Senior Theses
Measuring the confidentiality of programs that need to interact with the outside world can prevent leakages and is important to protect against dangerous attacks. However, information propagation is difficult to follow through a large program with implicit information flow, tricky loops, and complicated instructions. Previous works have tackled this problem in several ways but often measure leakage a program has on average rather than the leakage produced by a set of particularly compromising interactions. We introduce new methods that target a specific set of observables revealed throughout execution to cut down on the resources needed for analysis. Our implementation examines …
Exploring Applications Of Ai In Developer-Side Web Accessibility Practices, Maria H. Cristoforo
Exploring Applications Of Ai In Developer-Side Web Accessibility Practices, Maria H. Cristoforo
Computer Science Senior Theses
No abstract provided.
Intelligent Solutions For Retroactive Anomaly Detection And Resolution With Log File Systems, Derek G. Rogers, Chanvo Nguyen, Abhay Sharma
Intelligent Solutions For Retroactive Anomaly Detection And Resolution With Log File Systems, Derek G. Rogers, Chanvo Nguyen, Abhay Sharma
SMU Data Science Review
This paper explores the intricate challenges log files pose from data science and machine learning perspectives. Drawing inspiration from existing methods, LAnoBERT, PULL, LLMs, and the breadth of recent research, this paper aims to push the boundaries of machine learning for log file systems. Our study comprehensively examines the unique challenges presented in our problem setup, delineates the limitations of existing methods, and introduces innovative solutions. These contributions are organized to offer valuable insights, predictions, and actionable recommendations tailored for Microsoft's engineers working on log data analysis.
Leveraging Transformer Models For Genre Classification, Andreea C. Craus, Ben Berger, Yves Hughes, Hayley Horn
Leveraging Transformer Models For Genre Classification, Andreea C. Craus, Ben Berger, Yves Hughes, Hayley Horn
SMU Data Science Review
As the digital music landscape continues to expand, the need for effective methods to understand and contextualize the diverse genres of lyrical content becomes increasingly critical. This research focuses on the application of transformer models in the domain of music analysis, specifically in the task of lyric genre classification. By leveraging the advanced capabilities of transformer architectures, this project aims to capture intricate linguistic nuances within song lyrics, thereby enhancing the accuracy and efficiency of genre classification. The relevance of this project lies in its potential to contribute to the development of automated systems for music recommendation and genre-based playlist …
Investigating Bias In Mortgage-Rate Machine Learning Models, Will Kalikman
Investigating Bias In Mortgage-Rate Machine Learning Models, Will Kalikman
Computer Science Senior Theses
Banks and fintech lenders increasingly rely on computer-aided models in lending decisions. Traditional models were interpretable: decisions were based on observable factors, such as whether a borrower's credit score was above a threshold value, and explainable in terms of combinations of these factors. In contrast, modern machine learning models are opaque and non-interpretable. Their opaqueness and reliance on historical data that is the artifact of past racial discrimination means these new models risk embedding and exacerbating such discrimination, even if lenders do not intend to discriminate. We calibrate two random forest classifiers using publicly available HMDA loan data and publicly …
Welfare Maximization In The Airplane Problem, Alina Chadwick
Welfare Maximization In The Airplane Problem, Alina Chadwick
Computer Science Senior Theses
Given a set of passengers and a set of airplane seats, the goal of the airplane problem is to sit passengers in seats in a way that maximizes the sum of their total welfare, that is, the total happiness of the passengers in the plane. We aim to maximize their welfare subject to three constraints and how much they care about each constraint being satisfied: a group constraint (where passengers may want to sit together), a constraint on where in a row passengers want to sit (i.e. a window seat, a middle seat, or an aisle seat), and finally a …
Open Source Supply Chain Security: A Cost-Benefit Analysis Of Achieving Various Security Thresholds In Build Environments, Carly Retterer
Open Source Supply Chain Security: A Cost-Benefit Analysis Of Achieving Various Security Thresholds In Build Environments, Carly Retterer
Computer Science Senior Theses
Open source software has become a cornerstone of modern software development, offering unparalleled opportunities for innovation and collaboration. However, its widespread adoption has also introduced a host of security vulnerabilities, particularly in the software supply chain. This paper provides a comprehensive cost-benefit analysis of achieving various security thresholds to harden the build environment, focusing on isolated, hermetic, reproducible, and bootstrappable builds. For each build type, we provide a clear definition and outline the steps required for implementation. We then evaluate the associated costs and benefits of each build, emphasizing their roles in strengthening the build environment and enhancing supply chain …
Detecting Drifts In Data Streams Using Kullback-Leibler (Kl) Divergence Measure For Data Engineering Applications, Jeomoan Francis Kurian, Mohamed Allali
Detecting Drifts In Data Streams Using Kullback-Leibler (Kl) Divergence Measure For Data Engineering Applications, Jeomoan Francis Kurian, Mohamed Allali
Engineering Faculty Articles and Research
The exponential growth of data coupled with the widespread application of artificial intelligence(AI) presents organizations with challenges in upholding data accuracy, especially within data engineering functions. While the Extraction, Transformation, and Loading process addresses error-free data ingestion, validating the content within data streams remains a challenge. Prompt detection and remediation of data issues are crucial, especially in automated analytical environments driven by AI. To address these issues, this study focuses on detecting drifts in data distributions and divergence within data fields processed from different sample populations. Using a hypothetical banking scenario, we illustrate the impact of data drift on automated …
Connection-Saving Gate Assignment: A Computational Approach, Rob Mailley
Connection-Saving Gate Assignment: A Computational Approach, Rob Mailley
Computer Science Senior Theses
The growth of the commercial aviation industry has yielded many interesting problems in the field of Operations Research, many of which are now able to be solved as both technology and mathematical optimization improve. A particularly interesting problem in airport operations re- search is the Aircraft Gate Assignment Problem (AGAP), which seeks to create a feasible match- ing between planes and flights at an airport. This problem is well-suited to modeling with Integer Programming, and has attracted research since the 1970s. Researchers of the AGAP have considered many different objectives, ranging from airline-focused objectives to more passenger-focused objective functions. In …