Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Databases and Information Systems

Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 1381 - 1410 of 6720

Full-Text Articles in Physical Sciences and Mathematics

Data: The Good, The Bad And The Ethical, John D. Kelleher, Filipe Cabral Pinto, Luis M. Cortesao Dec 2020

Data: The Good, The Bad And The Ethical, John D. Kelleher, Filipe Cabral Pinto, Luis M. Cortesao

Articles

It is often the case with new technologies that it is very hard to predict their long-term impacts and as a result, although new technology may be beneficial in the short term, it can still cause problems in the longer term. This is what happened with oil by-products in different areas: the use of plastic as a disposable material did not take into account the hundreds of years necessary for its decomposition and its related long-term environmental damage. Data is said to be the new oil. The message to be conveyed is associated with its intrinsic value. But as in …


The Algorithm Project Research And Modeling Of Information Systems, Victoria Kuznetsova, S.B. Dovletova, Mixriddin Raximov, Gulnora Muxtorova, Kim Yelena Dec 2020

The Algorithm Project Research And Modeling Of Information Systems, Victoria Kuznetsova, S.B. Dovletova, Mixriddin Raximov, Gulnora Muxtorova, Kim Yelena

Bulletin of TUIT: Management and Communication Technologies

Pre-project research is a strategic stage of the object design process, based on the results of which a decision is made on the level of competitiveness, development prospects, setting a task for the project, labor intensity and feasibilityof creating a system in general.

The existing methods of pre-project research have a high degree of generalization and are practically not formalized in any way. The disadvantage of these methods is that they consider only specific individual prototypes and are aimed at finding solutions to current problems and eliminating individual shortcomings of a particular prototype. Thus, it Is Concluded that It Is …


Regional Integration: Physician Perceptions On Electronic Medical Record Use And Impact In South West Ontario, Sadiq Raji Dec 2020

Regional Integration: Physician Perceptions On Electronic Medical Record Use And Impact In South West Ontario, Sadiq Raji

Electronic Thesis and Dissertation Repository

Regional initiatives in the health care context in Canada are typically organized and administered along geographic boundaries or operational units. Regional integration of Electronic Medical Records (EMR) has been continuing across Canadian provinces in recent years, yet the use and impact of regionally integrated EMRs are not routinely assessed and questions remain about their impact on and use in physicians’ practices. Are stated goals of simplifying connections and sharing of electronic health information collected and managed by many health services providers being met? What are physicians’ perspectives on the use and impact of regionally integrated EMR? In this thesis, I …


Stem Teacher Database, Veronica Buss Dec 2020

Stem Teacher Database, Veronica Buss

Honors Theses

The College of Engineering and Applied Sciences (CEAS) Recruitment web application provides access to recruitment information for the Manager of Recruitment and Outreach and those who also use the spreadsheet file with their current data. This database is a functional database for the WMU college of engineering and applied sciences’ recruiters to organize their data on STEM teachers from the feeder high schools of WMU. The app provides an interface for its users to filter and search the data they have compiled to create recruitment mailing reports. The main purpose of this app was to facilitate the retrieval and upkeep …


School District Boundaries Map, Nick Huffman Dec 2020

School District Boundaries Map, Nick Huffman

Honors Theses

The purpose of this project is to provide a school district boundary mapping feature to a product sold by Level Data called SDVS, which is a plugin used by districts inside of PowerSchool. Using primarily the features offered by Mapbox, We have implemented a React component that is capable of plotting useful data points related to a student and their school district on a map. The tool is designed to be used primarily by school administrators to determine whether or not a student lives within their district boundaries. The application uses a dataset that is provided by the NCES to …


Eelgrass (Zostera Marina) Population Decline In Morro Bay, Ca: A Meta-Analysis Of Herbicide Application In San Luis Obispo County And Morro Bay Watershed, Tyler King Sinnott Dec 2020

Eelgrass (Zostera Marina) Population Decline In Morro Bay, Ca: A Meta-Analysis Of Herbicide Application In San Luis Obispo County And Morro Bay Watershed, Tyler King Sinnott

Master's Theses

The endemic eelgrass (Zostera marina) community of Morro Bay Estuary, located on the central coast of California, has experienced an estimated decline of 95% in occupied area (reduction of 344 acres to 20 acres) from 2008 to 2017 for reasons that are not yet definitively clear. One possible driver of degradation that has yet to be investigated is the role of herbicides from agricultural fields in the watershed that feeds into the estuary. Thus, the primary research goal of this project was to better understand temporal and spatial trends of herbicide use within the context of San Luis …


Ppmexplorer: Using Information Retrieval, Computer Vision And Transfer Learning Methods To Index And Explore Images Of Pompeii, Cindy Roullet Dec 2020

Ppmexplorer: Using Information Retrieval, Computer Vision And Transfer Learning Methods To Index And Explore Images Of Pompeii, Cindy Roullet

Graduate Theses and Dissertations

In this dissertation, we present and analyze the technology used in the making of PPMExplorer: Search, Find, and Explore Pompeii. PPMExplorer is a software tool made with data extracted from the Pompei: Pitture e Mosaic (PPM) volumes. PPM is a valuable set of volumes containing 20,000 historical annotated images of the archaeological site of Pompeii, Italy accompanied by extensive captions. We transformed the volumes from paper, to digital, to searchable. PPMExplorer enables archaeologist researchers to conduct and check hypotheses on historical findings. We present a theory that such a concept is possible by leveraging computer generated correlations between artifacts using …


Teaching Applications And Implications Of Blockchain Via Project-Based Learning: A Case Study, Kevin Mentzer, Mark Frydenberg, David J. Yates Dec 2020

Teaching Applications And Implications Of Blockchain Via Project-Based Learning: A Case Study, Kevin Mentzer, Mark Frydenberg, David J. Yates

Information Systems and Analytics Department Faculty Journal Articles

This paper presents student projects analyzing or using blockchain technologies, created by students enrolled in courses dedicated to teaching blockchain, at two different universities during the 2018-2019 academic year. Students explored perceptions related to storing private healthcare information on a blockchain, managing the security of Internet of Things devices, maintaining public governmental records, and creating smart contracts. The course designs, which were centered around project-based learning, include self-regulated learning and peer feedback as ways to improve student learning. Students either wrote a research paper or worked in teams on a programming project to build and deploy a blockchain-based application using …


Empowering People With Cognitive Disabilities To Live Independently By Supporting Their Self-Management Of Food And Related Expenses, Apoorv Prasad Dec 2020

Empowering People With Cognitive Disabilities To Live Independently By Supporting Their Self-Management Of Food And Related Expenses, Apoorv Prasad

Theses and Dissertations

People with ADHD (attention deficit hyperactivity disorder) often have difficulty in planning and organization that can impact their eating habits and lifestyle. We have created a novel mobile software application to support choosing meals and making healthy food purchases that meet dietary preferences within a specified budget. The core functions allow 1) Managing user profiles to support personalization 2) Obtaining recipe recommendations to fit profile, budget, and foods-on-hand 3) Planning food purchases, and 4) Reviewing foods-on-hand, budget and the nutritional balance of recent meals and food purchases.The application supports self-introspection to help people with ADHD review their history of food …


Vision-Based Analytics For Improved Ai-Driven Iot Applications, Amit Sharma Dec 2020

Vision-Based Analytics For Improved Ai-Driven Iot Applications, Amit Sharma

Dissertations and Theses Collection (Open Access)

Proliferation of Internet of Things (IoT) sensor systems, primarily driven by cheaper embedded hardware platforms and wide availability of light-weight software platforms, has opened up doors for large-scale data collection opportunities. The availability of massive amount of data has in-turn given way to rapidly growing machine learning models e.g. You Only Look Once (YOLO), Single-Shot-Detectors (SSD) and so on. There has been a growing trend of applying machine learning techniques, e.g., object detection, image classification, face detection etc., on data collected from camera sensors and therefore enabling plethora of vision-sensing applications namely self-driving cars, automatic crowd monitoring, traffic-flow analysis, occupancy …


Design Of A Two-Echelon Freight Distribution System In An Urban Area Considering Third-Party Logistics And Loading-Unloading Zones, Vincent F. Yu, Winarno, Shih-Wei Lin, Aldy Gunawan Dec 2020

Design Of A Two-Echelon Freight Distribution System In An Urban Area Considering Third-Party Logistics And Loading-Unloading Zones, Vincent F. Yu, Winarno, Shih-Wei Lin, Aldy Gunawan

Research Collection School Of Computing and Information Systems

This research examines the problem of designing a two-echelon freight distribution system in a dense urban area that considers third-party logistics (TPL) and loading–unloading zones (LUZs). The proposed system takes advantage of outsourcing the last mile deliveries to a TPL provider and utilizing LUZs as temporary intermediate facilities instead of using permanent intermediate facilities to consolidate freight. A mathematical model and a simulated annealing (SA) algorithm are developed to solve the problem. The efficiency and effectiveness of the proposed SA heuristic are verified by testing it on existing benchmark instances. Computational results show that the performance of the proposed SA …


Causal Intervention For Weakly-Supervised Semantic Segmentation, Zhang Dong, Hanwang Zhang, Jinhui Tang, Xian-Sheng Hua, Qianru Sun Dec 2020

Causal Intervention For Weakly-Supervised Semantic Segmentation, Zhang Dong, Hanwang Zhang, Jinhui Tang, Xian-Sheng Hua, Qianru Sun

Research Collection School Of Computing and Information Systems

We present a causal inference framework to improve Weakly-Supervised Semantic Segmentation (WSSS). Specifically, we aim to generate better pixel-level pseudo-masks by using only image-level labels --- the most crucial step in WSSS. We attribute the cause of the ambiguous boundaries of pseudo-masks to the confounding context, e.g., the correct image-level classification of "horse'' and "person'' may be not only due to the recognition of each instance, but also their co-occurrence context, making the model inspection (e.g., CAM) hard to distinguish between the boundaries. Inspired by this, we propose a structural causal model to analyze the causalities among images, contexts, and …


A Bert-Based Dual Embedding Model For Chinese Idiom Prediction, Minghuan Tan, Jing Jiang Dec 2020

A Bert-Based Dual Embedding Model For Chinese Idiom Prediction, Minghuan Tan, Jing Jiang

Research Collection School Of Computing and Information Systems

Chinese idioms are special fixed phrases usually derived from ancient stories, whose meanings are oftentimes highly idiomatic and non-compositional. The Chinese idiom prediction task is to select the correct idiom from a set of candidate idioms given a context with a blank. We propose a BERT-based dual embedding model to encode the contextual words as well as to learn dual embeddings of the idioms. Specifically, we first match the embedding of each candidate idiom with the hidden representation corresponding to the blank in the context. We then match the embedding of each candidate idiom with the hidden representations of all …


A Near-Optimal Change-Detection Based Algorithm For Piecewise-Stationary Combinatorial Semi-Bandits, Huozhi Zhou, Lingda Wang, Lav N. Varshney, Ee-Peng Lim Dec 2020

A Near-Optimal Change-Detection Based Algorithm For Piecewise-Stationary Combinatorial Semi-Bandits, Huozhi Zhou, Lingda Wang, Lav N. Varshney, Ee-Peng Lim

Research Collection School Of Computing and Information Systems

We investigate the piecewise-stationary combinatorial semi-bandit problem. Compared to the original combinatorial semi-bandit problem, our setting assumes the reward distributions of base arms may change in a piecewise-stationary manner at unknown time steps. We propose an algorithm, GLR-CUCB, which incorporates an efficient combinatorial semi-bandit algorithm, CUCB, with an almost parameter-free change-point detector, the Generalized Likelihood Ratio Test (GLRT). Our analysis shows that the regret of GLR-CUCB is upper bounded by O(√NKT logT), where N is the number of piecewise-stationary segments, K is the number of base arms, and T is the number of time steps. As a complement, we also …


Security Analysis Of Permission Re-Delegation Vulnerabilities In Android Apps, Biniam Fisseha Demissie, Mariano Ceccato, Lwin Khin Shar Dec 2020

Security Analysis Of Permission Re-Delegation Vulnerabilities In Android Apps, Biniam Fisseha Demissie, Mariano Ceccato, Lwin Khin Shar

Research Collection School Of Computing and Information Systems

The Android platform facilitates reuse of app functionalities by allowing an app to request an action from another app through inter-process communication mechanism. This feature is one of the reasons for the popularity of Android, but it also poses security risks to the end users because malicious, unprivileged apps could exploit this feature to make privileged apps perform privileged actions on behalf of them. In this paper, we investigate the hybrid use of program analysis, genetic algorithm based test generation, natural language processing, machine learning techniques for precise detection of permission re-delegation vulnerabilities in Android apps. Our approach first groups …


Sharper Generalisation Bounds For Pairwise Learning, Yunwen Lei, Antoine Ledent, Marius Kloft Dec 2020

Sharper Generalisation Bounds For Pairwise Learning, Yunwen Lei, Antoine Ledent, Marius Kloft

Research Collection School Of Computing and Information Systems

Pairwise learning refers to learning tasks with loss functions depending on a pair of training examples, which includes ranking and metric learning as specific examples. Recently, there has been an increasing amount of attention on the generalization analysis of pairwise learning to understand its practical behavior. However, the existing stability analysis provides suboptimal high-probability generalization bounds. In this paper, we provide a refined stability analysis by developing generalization bounds which can be √nn-times faster than the existing results, where nn is the sample size. This implies excess risk bounds of the order O(n−1/2) (up to a logarithmic factor) for both …


Blockchain-Based Public Auditing And Secure Deduplication With Fair Arbitration, Haoran Yuan, Xiaofeng Chen, Jianfeng Wang, Jiaming Yuan, Hongyang Yan, Willy Susilo Dec 2020

Blockchain-Based Public Auditing And Secure Deduplication With Fair Arbitration, Haoran Yuan, Xiaofeng Chen, Jianfeng Wang, Jiaming Yuan, Hongyang Yan, Willy Susilo

Research Collection School Of Computing and Information Systems

Data auditing enables data owners to verify the integrity of their sensitive data stored at an untrusted cloud without retrieving them. This feature has been widely adopted by commercial cloud storage. However, the existing approaches still have some drawbacks. On the one hand, the existing schemes have a defect of fair arbitration, i.e., existing auditing schemes lack an effective method to punish the malicious cloud service provider (CSP) and compensate users whose data integrity is destroyed. On the other hand, a CSP may store redundant and repetitive data. These redundant data inevitably increase management overhead and computational cost during the …


Differential Privacy Protection Over Deep Learning: An Investigation Of Its Impacted Factors, Ying Lin, Ling-Yan Bao, Ze-Minghui Li, Shu-Sheng Si, Chao-Hsien Chu Dec 2020

Differential Privacy Protection Over Deep Learning: An Investigation Of Its Impacted Factors, Ying Lin, Ling-Yan Bao, Ze-Minghui Li, Shu-Sheng Si, Chao-Hsien Chu

Research Collection School Of Computing and Information Systems

Deep learning (DL) has been widely applied to achieve promising results in many fields, but it still exists various privacy concerns and issues. Applying differential privacy (DP) to DL models is an effective way to ensure privacy-preserving training and classification. In this paper, we revisit the DP stochastic gradient descent (DP-SGD) method, which has been used by several algorithms and systems and achieved good privacy protection. However, several factors, such as the sequence of adding noise, the models used etc., may impact its performance with various degrees. We empirically show that adding noise first and clipping second will not only …


Interventional Few-Shot Learning, Zhongqi Yue, Zhang Hanwang, Qianru Sun, Xian-Sheng Hua Dec 2020

Interventional Few-Shot Learning, Zhongqi Yue, Zhang Hanwang, Qianru Sun, Xian-Sheng Hua

Research Collection School Of Computing and Information Systems

We uncover an ever-overlooked deficiency in the prevailing Few-Shot Learning (FSL) methods: the pre-trained knowledge is indeed a confounder that limits the performance. This finding is rooted from our causal assumption: a Structural Causal Model (SCM) for the causalities among the pre-trained knowledge, sample features, and labels. Thanks to it, we propose a novel FSL paradigm: Interventional Few-Shot Learning (IFSL). Specifically, we develop three effective IFSL algorithmic implementations based on the backdoor adjustment, which is essentially a causal intervention towards the SCM of many-shot learning: the upper-bound of FSL in a causal view. It is worth noting that the contribution …


Debunking Rumors On Twitter With Tree Transformer, Jing Ma, Wei Gao Dec 2020

Debunking Rumors On Twitter With Tree Transformer, Jing Ma, Wei Gao

Research Collection School Of Computing and Information Systems

Rumors are manufactured with no respect for accuracy, but can circulate quickly and widely by "word-of-post" through social media conversations. Conversation tree encodes important information indicative of the credibility of rumor. Existing conversation-based techniques for rumor detection either just strictly follow tree edges or treat all the posts fully-connected during feature learning. In this paper, we propose a novel detection model based on tree transformer to better utilize user interactions in the dialogue where post-level self-attention plays the key role for aggregating the intra-/inter-subtree stances. Experimental results on the TWITTER and PHEME datasets show that the proposed approach consistently improves …


Digital Social Listening On Conversations About Sexual Harassment, Xuesi Sim, Ern Rae Chang, Yu Xiang Ong, Jie Ying Yeo, Christine Bai Shuang Yan, Eugene Wen Jia Choy, Kyong Jin Shim Dec 2020

Digital Social Listening On Conversations About Sexual Harassment, Xuesi Sim, Ern Rae Chang, Yu Xiang Ong, Jie Ying Yeo, Christine Bai Shuang Yan, Eugene Wen Jia Choy, Kyong Jin Shim

Research Collection School Of Computing and Information Systems

In light of the #MeToo movement and publicized sexual harassment incidents in Singapore in recent years, we built an analytics pipeline for performing digital social listening on conversations about sexual harassment for AWARE (Association of Women for Action and Research). Our social network analysis results identified key influencers that AWARE can engage for sexual harassment awareness campaigns. Further, our analysis results suggest new hashtags that AWARE can use to run social media campaigns and achieve greater reach.


Co-Embedding Attributed Networks With External Knowledge, Pei-Chi Lo, Ee Peng Lim Dec 2020

Co-Embedding Attributed Networks With External Knowledge, Pei-Chi Lo, Ee Peng Lim

Research Collection School Of Computing and Information Systems

Attributed network embedding aims to learn representations of nodes and their attributes in a low-dimensional space that preserves their semantics. The existing embedding models, however, consider node connectivity and node attributes only while ignoring external knowledge that can enhance node representations for downstream applications. In this paper, we propose a set of new VAE-based embedding models called External Knowledge-Aware Co-Embedding Attributed Network (ECAN) Embeddings to incorporate associations among attributes from relevant external knowledge. Such external knowledge can be extracted from text corpus and knowledge graphs. We use multi-VAE structures to model the attribute associations. To cope with joint encoding of …


Towards Theoretically Understanding Why Sgd Generalizes Better Than Adam In Deep Learning, Pan Zhou, Jiashi Feng, Chao Ma, Caiming Xiong, Steven C. H. Hoi, Weinan E Dec 2020

Towards Theoretically Understanding Why Sgd Generalizes Better Than Adam In Deep Learning, Pan Zhou, Jiashi Feng, Chao Ma, Caiming Xiong, Steven C. H. Hoi, Weinan E

Research Collection School Of Computing and Information Systems

It is not clear yet why ADAM-alike adaptive gradient algorithms suffer from worse generalization performance than SGD despite their faster training speed. This work aims to provide understandings on this generalization gap by analyzing their local convergence behaviors. Specifically, we observe the heavy tails of gradient noise in these algorithms. This motivates us to analyze these algorithms through their Lévy-driven stochastic differential equations (SDEs) because of the similar convergence behaviors of an algorithm and its SDE. Then we establish the escaping time of these SDEs from a local basin. The result shows that (1) the escaping time of both SGD …


Cross Dataset Evaluation For Iot Network Intrusion Detection, Anjum Farah Dec 2020

Cross Dataset Evaluation For Iot Network Intrusion Detection, Anjum Farah

Theses and Dissertations

With the advent of Internet of Things (IOT) technology, the need to ensure the security of an IOT network has become important. There are several intrusion detection systems (IDS) that are available for analyzing and predicting network anomalies and threats. However, it is challenging to evaluate them to realistically estimate their performance when deployed. A lot of research has been conducted where the training and testing is done using the same simulated dataset. However, realistically, a network on which an intrusion detection model is deployed will be very different from the network on which it was trained. The aim of …


Learning To Dispatch For Job Shop Scheduling Via Deep Reinforcement Learning, Cong Zhang, Wen Song, Zhiguang Cao, Jie Zhang, Puay Siew Tan, Xu Chi Dec 2020

Learning To Dispatch For Job Shop Scheduling Via Deep Reinforcement Learning, Cong Zhang, Wen Song, Zhiguang Cao, Jie Zhang, Puay Siew Tan, Xu Chi

Research Collection School Of Computing and Information Systems

Priority dispatching rule (PDR) is widely used for solving real-world Job-shop scheduling problem (JSSP). However, the design of effective PDRs is a tedious task, requiring a myriad of specialized knowledge and often delivering limited performance. In this paper, we propose to automatically learn PDRs via an end-to-end deep reinforcement learning agent. We exploit the disjunctive graph representation of JSSP, and propose a Graph Neural Network based scheme to embed the states encountered during solving. The resulting policy network is size-agnostic, effectively enabling generalization on large-scale instances. Experiments show that the agent can learn high-quality PDRs from scratch with elementary raw …


A Social Network Analysis Of Jobs And Skills, Derrick Ming Yang Lee, Dion Wei Xuan Ang, Grace Mei Ching Pua, Lee Ning Ng, Sharon Purbowo, Eugene Wen Jia Choy, Kyong Jin Shim Dec 2020

A Social Network Analysis Of Jobs And Skills, Derrick Ming Yang Lee, Dion Wei Xuan Ang, Grace Mei Ching Pua, Lee Ning Ng, Sharon Purbowo, Eugene Wen Jia Choy, Kyong Jin Shim

Research Collection School Of Computing and Information Systems

In this study, we analyzed job roles and skills across industries in Singapore. Using social network analysis, we identified job roles with similar required skills, and we also identified relationships between job skills. Our analysis visualizes such relationships in an intuitive way. Insights derived from our analyses are expected to assist job seekers, employers as well as recruitment agencies wanting to understand trending and required job roles and skills in today’s fast changing world.


A Hybrid Approach For Detecting Prerequisite Relations In Multi-Modal Food Recipes, Liangming Pan, Jingjing Chen, Shaoteng Liu, Chong-Wah Ngo, Min-Yen Kan, Tat-Seng Chua Dec 2020

A Hybrid Approach For Detecting Prerequisite Relations In Multi-Modal Food Recipes, Liangming Pan, Jingjing Chen, Shaoteng Liu, Chong-Wah Ngo, Min-Yen Kan, Tat-Seng Chua

Research Collection School Of Computing and Information Systems

Modeling the structure of culinary recipes is the core of recipe representation learning. Current approaches mostly focus on extracting the workflow graph from recipes based on text descriptions. Process images, which constitute an important part of cooking recipes, has rarely been investigated in recipe structure modeling. We study this recipe structure problem from a multi-modal learning perspective, by proposing a prerequisite tree to represent recipes with cooking images at a step-level granularity. We propose a simple-yet-effective two-stage framework to automatically construct the prerequisite tree for a recipe by (1) utilizing a trained classifier to detect pairwise prerequisite relations that fuses …


Nearest Centroid: A Bridge Between Statistics And Machine Learning, Manoj Thulasidas Dec 2020

Nearest Centroid: A Bridge Between Statistics And Machine Learning, Manoj Thulasidas

Research Collection School Of Computing and Information Systems

In order to guide our students of machine learning in their statistical thinking, we need conceptually simple and mathematically defensible algorithms. In this paper, we present the Nearest Centroid algorithm (NC) algorithm as a pedagogical tool, combining the key concepts behind two foundational algorithms: K-Means clustering and K Nearest Neighbors (k- NN). In NC, we use the centroid (as defined in the K-Means algorithm) of the observations belonging to each class in our training data set and its distance from a new observation (similar to k-NN) for class prediction. Using this obvious extension, we will illustrate how the concepts of …


Secure Answer Book And Automatic Grading, Manoj Thulasidas Dec 2020

Secure Answer Book And Automatic Grading, Manoj Thulasidas

Research Collection School Of Computing and Information Systems

In response to the growing need to perform assessments online, we have developed a secure answer book, as well as a tool for automatically grading it for our course on spread- sheet modeling. We applied these techniques to a cohort of about 160 students who took the course last term. In this paper, we describe the design, implementation and the techniques employed to enhance both the security of the answer book and the ease, accuracy and consistency of grading. In addition, we summarize the experience and takeaways, both from the instructor and the student perspectives. Although the answer book and …


Jointly Optimizing Sensing Pipelines For Multimodal Mixed Reality Interaction, Ramesh Darshana Rathnayake Kanatta Gamage, Ashen De Silva, Dasun Puwakdandawa, Lakmal Meegahapola, Archan Misra, Indika Perera Dec 2020

Jointly Optimizing Sensing Pipelines For Multimodal Mixed Reality Interaction, Ramesh Darshana Rathnayake Kanatta Gamage, Ashen De Silva, Dasun Puwakdandawa, Lakmal Meegahapola, Archan Misra, Indika Perera

Research Collection School Of Computing and Information Systems

Natural human interactions for Mixed Reality Applications are overwhelmingly multimodal: humans communicate intent and instructions via a combination of visual, aural and gestural cues. However, supporting low-latency and accurate comprehension of such multimodal instructions (MMI), on resource-constrained wearable devices, remains an open challenge, especially as the state-of-the-art comprehension techniques for each individual modality increasingly utilize complex Deep Neural Network models. We demonstrate the possibility of overcoming the core limitation of latency–vs.–accuracy tradeoff by exploiting cross-modal dependencies–i.e., by compensating for the inferior performance of one model with an increased accuracy of more complex model of a different modality. We present a …