Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Singapore Management University (2961)
- Wright State University (632)
- Walden University (447)
- Selected Works (287)
- New Jersey Institute of Technology (137)
-
- University of Nebraska at Omaha (119)
- California State University, San Bernardino (96)
- Old Dominion University (95)
- San Jose State University (85)
- University of Dayton (82)
- The University of Maine (67)
- City University of New York (CUNY) (65)
- University of Nebraska - Lincoln (54)
- Air Force Institute of Technology (53)
- SelectedWorks (53)
- Technological University Dublin (51)
- University of South Florida (50)
- Kennesaw State University (46)
- Nova Southeastern University (43)
- Claremont Colleges (42)
- University of Wisconsin Milwaukee (42)
- University of Arkansas, Fayetteville (41)
- Western Kentucky University (41)
- Dakota State University (39)
- Institute of Business Administration (38)
- California Polytechnic State University, San Luis Obispo (36)
- Western University (35)
- Ateneo de Manila University (34)
- Governors State University (34)
- Purdue University (34)
- Keyword
-
- Machine learning (101)
- Information technology (93)
- Data mining (89)
- Social media (78)
- Twitter (64)
-
- Machine Learning (57)
- Cybersecurity (54)
- Semantic Web (54)
- Deep learning (52)
- Artificial intelligence (49)
- Online learning (49)
- Information Technology (47)
- Classification (46)
- Cloud computing (45)
- Information retrieval (45)
- Privacy (45)
- Big data (44)
- Database (43)
- Ontology (43)
- Computer science (42)
- Information security (41)
- Algorithms (40)
- Security (40)
- Databases (39)
- Information systems (39)
- Management (37)
- Clustering (36)
- Data Mining (36)
- Northern Ohio Data and Information Service (NODIS) (36)
- Technology (35)
- Publication Year
- Publication
-
- Research Collection School Of Computing and Information Systems (2867)
- Kno.e.sis Publications (541)
- Walden Dissertations and Doctoral Studies (447)
- Theses and Dissertations (116)
- Dissertations (107)
-
- Computer Science Faculty Publications (91)
- Computer Science and Engineering Faculty Publications (91)
- Theses Digitization Project (84)
- Master's Projects (68)
- Information Systems and Quantitative Analysis Faculty Proceedings & Presentations (64)
- Electronic Theses and Dissertations (55)
- Dissertations and Theses Collection (Open Access) (50)
- Theses (46)
- USF Tampa Graduate Theses and Dissertations (46)
- CCE Theses and Dissertations (42)
- Information Systems and Quantitative Analysis Faculty Publications (41)
- Kyriakos MOURATIDIS (40)
- CGU Faculty Publications and Research (37)
- International Conference on Information and Communication Technologies (36)
- Open Educational Resources (34)
- Department of Information Systems & Computer Science Faculty Publications (33)
- All Capstone Projects (32)
- Graduate Theses and Dissertations (32)
- Masters Theses & Doctoral Dissertations (32)
- Articles (29)
- Conference papers (28)
- David LO (28)
- Journal of Spatial Information Science (28)
- All Maxine Goodman Levin School of Urban Affairs Publications (27)
- Saverio Perugini (25)
- Publication Type
Articles 1321 - 1350 of 6720
Full-Text Articles in Physical Sciences and Mathematics
Strategies Project Managers Use That Reduce Information Technology Project Failures In The Insurance Industry, Jamarcus Snipes
Strategies Project Managers Use That Reduce Information Technology Project Failures In The Insurance Industry, Jamarcus Snipes
Walden Dissertations and Doctoral Studies
The worldwide failure rate of information technology (IT) projects is approximately 65%. Insurance project managers who fail to successfully implement IT projects negatively impact organizational performance and profitability. Grounded in the management by objectives theory, the purpose of this qualitative multiple case study was to explore strategies project managers use to reduce IT project failures in the insurance industry. The participants comprised four IT project managers in Alabama who successfully used strategies to reduce IT project failures in the insurance industry. Data were collected from virtual semistructured interviews, company documents, existing literature, and journal notes. Thematic analysis was used to …
Strategies For Implementing Internet Of Things Devices In Manufacturing Environments, Todd Efrain Hernandez
Strategies For Implementing Internet Of Things Devices In Manufacturing Environments, Todd Efrain Hernandez
Walden Dissertations and Doctoral Studies
The Internet of Things (IoT) has been exploited as a threat vector for cyberattacks in manufacturing environments. Manufacturing industry leaders are concerned with cyberattacks because of the associated costs of damages and lost production for their organizations. Grounded in the general systems theory, the purpose of this multiple case study was to explore strategies electrical controls engineers use to implement secure IoT devices in manufacturing environments. The study participants were eight electrical controls engineers working in three separate manufacturing facilities located in the Midwest region of the United States. The data were collected by semistructured interviews and 15 organizational documents. …
Impact Of Information Breaches On Health Care Records, Anton Antony Arockiasamy
Impact Of Information Breaches On Health Care Records, Anton Antony Arockiasamy
Walden Dissertations and Doctoral Studies
Although there were almost 3.5 million reported information breaches of health care data in the first quarter of 2019, health care providers do not know the extent of digital and nondigital breaches of patient medical records. The purpose of this quantitative, comparative study was to identify the difference between the individual patient records affected by digital versus nondigital breaches for three types of health care entities in the United States, health care providers, health care plans, and health care clearinghouses. Allman’s privacy regulation theory, the National Institute of Standards and Technology Privacy Framework, and ecological systems theory comprised the theoretical …
Characteristics Of Authentic Entrepreneurial Leadership Within Information Technology Startups In Kenya, Christine Mukhwana
Characteristics Of Authentic Entrepreneurial Leadership Within Information Technology Startups In Kenya, Christine Mukhwana
Walden Dissertations and Doctoral Studies
In Kenya, over 60% of nascent entrepreneurs start businesses with minimal leadership experience, engendering founder-CEOs who cannot sustain a business beyond its formative years. The problem is the nascent entrepreneurs’ lack of understanding of effective leadership. The purpose of this qualitative, phenomenological study was to develop a more nuanced understanding of authentic leadership behavior from the perspective of nascent entrepreneurs. Authentic leadership theory and the three-factor model were used to conceptualize the study. The research question focused on nascent entrepreneurs’ lived experiences and understanding of authentic leadership. The participants in the study were entrepreneurs from the information technology industry in …
Mobile Network Infrastructure Security In Developing Countries – A Kenya Case Study, James M. Omanwa
Mobile Network Infrastructure Security In Developing Countries – A Kenya Case Study, James M. Omanwa
Walden Dissertations and Doctoral Studies
The usage of mobile network infrastructure to access internet resources for organizations is getting higher year by year in sub-Saharan Africa. However, there was an increase in malicious attacks on mobile networks and devices accessing mobile network infrastructure, targeting organizations’ private information. Grounded in Bandura’s social cognitive theory, the purpose of this multiple case study was to explore strategies security managers used to secure mobile network infrastructures from cyberattacks. Participants comprised four security managers in Kenya in two major cities who successfully implemented strategies to mitigate cyberattacks on the mobile network infrastructures. Data were gathered from video conference, face-to-face, semi-structured …
The Introduction Of Big Data In Cloud Computing, Austin Gruenberg
The Introduction Of Big Data In Cloud Computing, Austin Gruenberg
Student Academic Conference
One of the fastest-growing technologies that many people are unaware of is the world of cloud computing. Having started in 2006, it is a relatively new technological advancement in the computer industry. The major branch of cloud computing that I decided to focus on was big data. I decided to research this topic to better understand what its current uses are, to see what the future holds for Big Data and cloud computing and because it is a growing, significant piece of technology being used in our society today. Big data and cloud computing are very important industries and have …
Successful Strategies For Adopting Open-Source Software, Balla Barro
Successful Strategies For Adopting Open-Source Software, Balla Barro
Walden Dissertations and Doctoral Studies
Middle-level information systems managers (ISMs) in small-scale organizations often have challenges in determining the most appropriate strategy for adopting open-source software (OSS) in their organizations. The ISMs need to determine the right strategy for adopting OSS to protect the organizations’ information technology infrastructure. Grounded in the diffusion of innovation theory, the objective of this multiple case study was to explore strategies middle-level ISMs used to adopt OSS in their small-scale organizations. Six middle-level ISMs from three small-scale organizations with experience of not less than six years in OSS adoption strategy in the city of Frederick, Maryland, shared their strategies during …
Reliable Data Collection: A Tool For Data Integrity In Nigeria, Stella Tonye Whyte
Reliable Data Collection: A Tool For Data Integrity In Nigeria, Stella Tonye Whyte
Walden Dissertations and Doctoral Studies
Unreliable and poor-quality data is a significant threat to governmental institutions because of its devastating impact on nations' social and economic well-being. Managers in government organizations require reliable data to inform economic planning and decision-making. Grounded in the theory of total quality management, the purpose of this qualitative multiple case study was to explore strategies information technology (IT) managers in sub-Saharan African countries use to ensure the reliability of data. The participants were 12 IT managers in three government establishments in Port Harcourt, Rivers State, Nigeria, responsible for ensuring the data reliability for economic planning and decision-making. The data collection …
Predictive Modeling Of Critical Temperatures In Superconducting Materials, Markus Hofmann, Natalia Sizochenko
Predictive Modeling Of Critical Temperatures In Superconducting Materials, Markus Hofmann, Natalia Sizochenko
Articles
n this study, we have investigated quantitative relationships between critical temperaturesof superconductive inorganic materials and the basic physicochemical attributes of these materials(also called quantitative structure-property relationships). We demonstrated that one of the mostrecent studies (titled "A data-driven statistical model for predicting the critical temperature of asuperconductor” and published in Computational Materials Science by K. Hamidieh in 2018) reportson models that were based on the dataset that contains 27% of duplicate entries. We aimed todeliver stable models for a properly cleaned dataset using the same modeling techniques (multiplelinear regression, MLR, and gradient boosting decision trees, XGBoost). The predictive ability ofour best …
Information Architecture For A Chemical Modeling Knowledge Graph, Adam R. Luxon
Information Architecture For A Chemical Modeling Knowledge Graph, Adam R. Luxon
Theses and Dissertations
Machine learning models for chemical property predictions are high dimension design challenges spanning multiple disciplines. Free and open-source software libraries have streamlined the model implementation process, but the design complexity remains. In order better navigate and understand the machine learning design space, model information needs to be organized and contextualized. In this work, instances of chemical property models and their associated parameters were stored in a Neo4j property graph database. Machine learning model instances were created with permutations of dataset, learning algorithm, molecular featurization, data scaling, data splitting, hyperparameters, and hyperparameter optimization techniques. The resulting graph contains over 83,000 nodes …
Proposed Data Governance Framework For Small And Medium Scale Enterprises (Smes), Rejoice Okoro
Proposed Data Governance Framework For Small And Medium Scale Enterprises (Smes), Rejoice Okoro
All Graduate Theses, Dissertations, and Other Capstone Projects
Data governance is not a one size fits all, instead, it should be an evolutionary process that can be started small and measurable along the way. This research aims at proposing a data governance framework by ensuring data management processes, data security and control are compliant with laws and policies. This article also presents the first results of a comparative analysis between three data privacy laws and outlines five components which together form a data governance framework for SMEs. The data governance model documents data quality roles and their type of interaction with data quality management activities exploring how data …
Accelerating Aggregation Efficiency: Using Postgres As A Cache With Mongodb, Mason Q. Porter-Brown
Accelerating Aggregation Efficiency: Using Postgres As A Cache With Mongodb, Mason Q. Porter-Brown
Senior Projects Fall 2021
For decades now relational databases, namely SQL, have been the industry standard. However, recently MongoDB and other NoSQL databases have been growing in popularity due to their flexibility and scalability. SQL still has the upper hand in a variety of areas, including data consistency, advanced and established analytics functions, and efficient “JOIN” functions. This project focuses on MongoDB’s shortcomings when it comes to replicating “JOIN” operations using MongoDB’s aggregate functions. “JOIN” operations refer to the action of comparing data from one or more collections of data and joining similar data together in order to analyze and draw statistics from the …
Introducing A Test Framework For Quality Of Service Mechanisms In The Context Of Software-Defined Networking, Josiah Eleazar T. Regencia, William Emmanuel S. Yu
Introducing A Test Framework For Quality Of Service Mechanisms In The Context Of Software-Defined Networking, Josiah Eleazar T. Regencia, William Emmanuel S. Yu
Department of Information Systems & Computer Science Faculty Publications
In traditional non-distributed networking architecture, supporting Quality of Service (QoS) has been challenging due to its centralized nature. Software-Defined Networking (SDN) provides dynamic, flexible and scalable control and management for networks. This study introduces a test framework for testing QoS mechanisms and network topologies inside an SDN environment. Class-Based Queueing QoS mechanisms are tested as an anchor to test the introduced framework. Using a previous study as a benchmark to test the introduced framework, results show that the test framework works accordingly and is capable of producing accurate results. Moreover, results in this study show that the distributed Leaf-enforced QoS …
Cura Personalis: Institutionalizing Compassion During Emergency Remote Teaching, Ma. Monica L. Moreno, Ma. Mercedes T. Rodrigo, Johanna Marion R. Torres, Timothy Jireh Gaspar, Jenilyn L. Agapito
Cura Personalis: Institutionalizing Compassion During Emergency Remote Teaching, Ma. Monica L. Moreno, Ma. Mercedes T. Rodrigo, Johanna Marion R. Torres, Timothy Jireh Gaspar, Jenilyn L. Agapito
Department of Information Systems & Computer Science Faculty Publications
Faced with the fears and anxieties brought on by the COVID-19 crisis, educational institutions had to devise new compassion-based teaching and learning policies and approaches that recognized and provided for the pandemic’s psychological and emotional toll. This paper describes how the Ateneo de Manila University in the Philippines enacted its core value of cura personalis, care for the entire person, in the context of emergency remote teaching. We describe the circumstances that prompted the greater emphasis on compassion and the adjustments to classroom management, course content, class interactions, and assessment. Finally we describe the tradeoffs or costs of this …
Strategies To Monitor And Deter Cyberloafing In Small Businesses: A Case Study, Veronica Pugh Dooly
Strategies To Monitor And Deter Cyberloafing In Small Businesses: A Case Study, Veronica Pugh Dooly
Walden Dissertations and Doctoral Studies
Some information technology (IT) managers working for small businesses are struggling to monitor and deter cyberloafing. Strategies are needed to help IT practitioners to discourage cyberloafing and improve productivity while maintaining employee satisfaction. Grounded in adaptive structuration theory, the purpose of this qualitative multiple-case study was to explore strategies some small business IT managers use to monitor and deter cyberloafing. The participants were nine IT managers who successfully implemented cyberloafing monitoring and deterrence strategies in the United States. Data were collected via semistructured interviews and organization employee policy handbooks (n = 4) provided by the participants. Data were analyzed using …
Football’S Future: An Analytical Interpretation Of The Premier League, Hunter Witeof
Football’S Future: An Analytical Interpretation Of The Premier League, Hunter Witeof
Williams Honors College, Honors Research Projects
This project looks to take the statistics of soccer players and run them through an algorithm to determine how well a player is performing. The system that will be designed in the project will look to accomplish 3 main goals: allow the user to enter new statistics, store the data for all 38 game weeks for all 20 teams, and compute a score for each player’s performance for each game as well as the average of all of the player's scores.
See-Trend: Secure Traffic-Related Event Detection In Smart Communities, Stephan Olariu, Dimitrie C. Popescu
See-Trend: Secure Traffic-Related Event Detection In Smart Communities, Stephan Olariu, Dimitrie C. Popescu
Computer Science Faculty Publications
It has been widely recognized that one of the critical services provided by Smart Cities and Smart Communities is Smart Mobility. This paper lays the theoretical foundations of SEE-TREND, a system for Secure Early Traffic-Related EveNt Detection in Smart Cities and Smart Communities. SEE-TREND promotes Smart Mobility by implementing an anonymous, probabilistic collection of traffic-related data from passing vehicles. The collected data are then aggregated and used by its inference engine to build beliefs about the state of the traffic, to detect traffic trends, and to disseminate relevant traffic-related information along the roadway to help the driving public make informed …
Adversarial Specification Mining, Hong Jin Kang, David Lo
Adversarial Specification Mining, Hong Jin Kang, David Lo
Research Collection School Of Computing and Information Systems
There have been numerous studies on mining temporal specifications from execution traces. These approaches learn finite-state automata (FSA) from execution traces when running tests. To learn accurate specifications of a software system, many tests are required. Existing approaches generalize from a limited number of traces or use simple test generation strategies. Unfortunately, these strategies may not exercise uncommon usage patterns of a software system. To address this problem, we propose a new approach, adversarial specification mining, and develop a prototype, DICE (Diversity through Counter-Examples). DICE has two components: DICE-Tester and DICE-Miner. After mining Linear Temporal Logic specifications from an input …
Novel Techniques In Recovering, Embedding, And Enforcing Policies For Control-Flow Integrity, Yan Lin
Novel Techniques In Recovering, Embedding, And Enforcing Policies For Control-Flow Integrity, Yan Lin
Dissertations and Theses Collection (Open Access)
Control-Flow Integrity (CFI) is an attractive security property with which most injected and code-reuse attacks can be defeated, including advanced attacking techniques like Return-Oriented Programming (ROP). CFI extracts a control-flow graph (CFG) for a given program and instruments the program to respect the CFG. Specifically, checks are inserted before indirect branch instructions. Before these instructions are executed during runtime, the checks consult the CFG to ensure that the indirect branch is allowed to reach the intended target. Hence, any sort of controlflow hijacking would be prevented. There are three fundamental components in CFI enforcement. The first component is accurately recovering …
"Who Can Help Me?'': Knowledge Infused Matching Of Support Seekers And Support Providers During Covid-19 On Reddit, Manas Gaur, Kaushik Roy, Aditya Sharma, Biplav Srivastava, Amit Sheth
"Who Can Help Me?'': Knowledge Infused Matching Of Support Seekers And Support Providers During Covid-19 On Reddit, Manas Gaur, Kaushik Roy, Aditya Sharma, Biplav Srivastava, Amit Sheth
Publications
During the ongoing COVID-19 crisis, subreddits on Reddit, such as r/Coronavirus saw a rapid growth in user's requests for help (support seekers - SSs) including individuals with varying professions and experiences with diverse perspectives on care (support providers - SPs). Currently, knowledgeable human moderators match an SS with a user with relevant experience, i.e, an SP on these subreddits. This unscalable process defers timely care. We present a medical knowledge-infused approach to efficient matching of SS and SPs validated by experts for the users affected by anxiety and depression, in the context of with COVID-19. After matching, each SP to …
Context-Aware Retrieval-Based Deep Commit Message Generation, Haoye Wang, Xin Xia, David Lo, Qiang He, Xinyu Wang, John Grundy
Context-Aware Retrieval-Based Deep Commit Message Generation, Haoye Wang, Xin Xia, David Lo, Qiang He, Xinyu Wang, John Grundy
Research Collection School Of Computing and Information Systems
Commit messages recorded in version control systems contain valuable information for software development, maintenance, and comprehension. Unfortunately, developers often commit code with empty or poor quality commit messages. To address this issue, several studies have proposed approaches to generate commit messages from commit diffs. Recent studies make use of neural machine translation algorithms to try and translate git diffs into commit messages and have achieved some promising results. However, these learning-based methods tend to generate high-frequency words but ignore low-frequency ones. In addition, they suffer from exposure bias issues, which leads to a gap between training phase and testing phase. …
Sustainability Of Rewards-Based Crowdfunding: A Quasi-Experimental Analysis Of Funding Targets And Backer Satisfaction, Michael Wessel, Rob Gleasure, Robert John Kauffman
Sustainability Of Rewards-Based Crowdfunding: A Quasi-Experimental Analysis Of Funding Targets And Backer Satisfaction, Michael Wessel, Rob Gleasure, Robert John Kauffman
Research Collection School Of Computing and Information Systems
Rewards-based crowdfunding presents an information asymmetry for participants due to the funding mechanism used. Campaign-backers trust creators to complete projects and deliver rewards as outlined prior to the fundraising process, but creators may discover better opportunities as they progress with a project. Despite this, the all-or-nothing (AON) mechanism on crowdfunding platforms incentivizes creators to set meager funding-targets that are easier to achieve but may offer limited slack when creators wish to simultaneously pursue emerging opportunities later in the project. We explore the related issues of how funding targets seem to be selected by the creators, and how dissatisfaction with the …
Deep Unsupervised Anomaly Detection, Tangqing Li, Zheng Wang, Siying Liu, Wen-Yan Lin
Deep Unsupervised Anomaly Detection, Tangqing Li, Zheng Wang, Siying Liu, Wen-Yan Lin
Research Collection School Of Computing and Information Systems
This paper proposes a novel method to detect anomalies in large datasets under a fully unsupervised setting. The key idea behind our algorithm is to learn the representation underlying normal data. To this end, we leverage the latest clustering technique suitable for handling high dimensional data. This hypothesis provides a reliable starting point for normal data selection. We train an autoencoder from the normal data subset, and iterate between hypothesizing normal candidate subset based on clustering and representation learning. The reconstruction error from the learned autoencoder serves as a scoring function to assess the normality of the data. Experimental results …
The Value Of Humanization In Customer Service, Yang Gao, Huaxia Rui, Shujing Sun
The Value Of Humanization In Customer Service, Yang Gao, Huaxia Rui, Shujing Sun
Research Collection School Of Computing and Information Systems
As algorithm-based agents become increasingly capable of handling customer service queries, customers are often uncertain whether they are served by humans or algorithms, and managers are left to question the value of human agents once the technology matures. The current paper studies this question by quantifying the impact of customers' enhanced perception of being served by human agents on customer service interactions. Our identification strategy hinges on the abrupt implementation by Southwest Airlines of a signature policy, which requires the inclusion of an agent's first name in responses on Twitter, thereby making the agent more humanized in the eyes of …
Facial Emotion Recognition With Noisy Multi-Task Annotations, S. Zhang, Zhiwu Huang, D.P. Paudel, Gool L. Van
Facial Emotion Recognition With Noisy Multi-Task Annotations, S. Zhang, Zhiwu Huang, D.P. Paudel, Gool L. Van
Research Collection School Of Computing and Information Systems
Human emotions can be inferred from facial expressions. However, the annotations of facial expressions are often highly noisy in common emotion coding models, including categorical and dimensional ones. To reduce human labelling effort on multi-task labels, we introduce a new problem of facial emotion recognition with noisy multitask annotations. For this new problem, we suggest a formulation from the point of joint distribution match view, which aims at learning more reliable correlations among raw facial images and multi-task labels, resulting in the reduction of noise influence. In our formulation, we exploit a new method to enable the emotion prediction and …
Smart Contracts: Will Fintech Be The Catalyst For The Next Global Financial Crisis?, Randall Duran, Paul Griffin
Smart Contracts: Will Fintech Be The Catalyst For The Next Global Financial Crisis?, Randall Duran, Paul Griffin
Research Collection School Of Computing and Information Systems
Purpose: This paper aims to examine the risks associated with smart contracts, a disruptive financial technology (FinTech) innovation, and assesses how in the future they could threaten the integrity of the global financial system. Design/methodology/approach: A qualitative approach is used to identify risk factors related to the use of new financial innovations, by examining how over-the-counter (OTC) derivatives contributed to the Global Financial Crisis (GFC) which occurred during 2007 and 2008. Based on this analysis, the potential for similar concerns with smart contracts are evaluated, drawing on the failure of The DAO on the Ethereum blockchain, which involved the loss …
Generic Design Methodology For Smart Manufacturing Systems From A Practical Perspective, Part I—Digital Triad Concept And Its Application As A System Reference Model, Zhuming Bi, Wen-Jun Zhang, Chong Wu, Chaomin Luo, Lida Xu
Generic Design Methodology For Smart Manufacturing Systems From A Practical Perspective, Part I—Digital Triad Concept And Its Application As A System Reference Model, Zhuming Bi, Wen-Jun Zhang, Chong Wu, Chaomin Luo, Lida Xu
Information Technology & Decision Sciences Faculty Publications
Rapidly developed information technologies (IT) have continuously empowered manufacturing systems and accelerated the evolution of manufacturing system paradigms, and smart manufacturing (SM) has become one of the most promising paradigms. The study of SM has attracted a great deal of attention for researchers in academia and practitioners in industry. However, an obvious fact is that people with different backgrounds have different expectations for SM, and this has led to high diversity, ambiguity, and inconsistency in terms of definitions, reference models, performance matrices, and system design methodologies. It has been found that the state of the art SM research is limited …
Coherence And Identity Learning For Arbitrary-Length Face Video Generation, Shuquan Ye, Chu Han, Jiaying Lin, Guoqiang Han, Shengfeng He
Coherence And Identity Learning For Arbitrary-Length Face Video Generation, Shuquan Ye, Chu Han, Jiaying Lin, Guoqiang Han, Shengfeng He
Research Collection School Of Computing and Information Systems
Face synthesis is an interesting yet challenging task in computer vision. It is even much harder to generate a portrait video than a single image. In this paper, we propose a novel video generation framework for synthesizing arbitrary-length face videos without any face exemplar or landmark. To overcome the synthesis ambiguity of face video, we propose a divide-and-conquer strategy to separately address the video face synthesis problem from two aspects, face identity synthesis and rearrangement. To this end, we design a cascaded network which contains three components, Identity-aware GAN (IA-GAN), Face Coherence Network, and Interpolation Network. IA-GAN is proposed to …
Activity Based Traffic Indicator System For Monitoring The Covid-19 Pandemic, Justin Junsay, Aaron Joaquin Lebumfacil, Ivan George Tarun, William Emmanuel S. Yu
Activity Based Traffic Indicator System For Monitoring The Covid-19 Pandemic, Justin Junsay, Aaron Joaquin Lebumfacil, Ivan George Tarun, William Emmanuel S. Yu
Department of Information Systems & Computer Science Faculty Publications
This study describes an activity based traffic indicator system to provide information for COVID-19 pandemic management. The activity based traffic indicator system does this by utilizing a social probability model based on the birthday paradox to determine the exposure risk, the probability of meeting someone infected (PoMSI). COVID-19 data, particularly the 7-day moving average of the daily growth rate of cases (7-DMA of DGR) and cumulative confirmed cases of next week covering a period from April to September 2020, were then used to test PoMSI using Pearson correlation to verify whether it can be used as a factor for the …
Transactional Distances During Emergency Remote Teaching Experiences, Ma. Monica L. Moreno, Ma. Mercedes T. Rodrigo, Johanna Marion R. Torres, Timothy Jireh Gaspar, Jenilyn L. Agapito
Transactional Distances During Emergency Remote Teaching Experiences, Ma. Monica L. Moreno, Ma. Mercedes T. Rodrigo, Johanna Marion R. Torres, Timothy Jireh Gaspar, Jenilyn L. Agapito
Department of Information Systems & Computer Science Faculty Publications
The Transactional Distance Theory posits that successful remote learning occurs when teachers decrease psychological or transactional gaps. Narrowing the transactional distance can be achieved through a balance of appropriate course structure and dialogue, fostering healthy student autonomy in the process. This paper describes the Emergency Remote Teaching experiences of faculty and students of the Ateneo de Manila University in the Philippines. It examines these experiences in the context of the transactional distance framework. Findings show that a sudden shift to remote learning mandates greater student autonomy, which increases transactional distance. Because of this, efforts by faculty to increase student-teacher dialogue …