Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Databases and Information Systems

Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 2191 - 2220 of 6720

Full-Text Articles in Physical Sciences and Mathematics

Traffic-Cascade: Mining And Visualizing Lifecycles Of Traffic Congestion Events Using Public Bus Trajectories, Agus Trisnajaya Kwee, Meng-Fen Chiang, Philips Kokoh Prasetyo, Ee-Peng Lim Oct 2018

Traffic-Cascade: Mining And Visualizing Lifecycles Of Traffic Congestion Events Using Public Bus Trajectories, Agus Trisnajaya Kwee, Meng-Fen Chiang, Philips Kokoh Prasetyo, Ee-Peng Lim

Research Collection School Of Computing and Information Systems

As road transportation supports both economic and social activities in developed cities, it is important to maintain smooth traffic on all highways and local roads. Whenever possible, traffic congestions should be detected early and resolved quickly. While existing traffic monitoring dashboard systems have been put in place in many cities, these systems require high-cost vehicle speed monitoring instruments and detect traffic congestion as independent events. There is a lack of low-cost dashboards to inspect and analyze the lifecycle of traffic congestion which is critical in assessing the overall impact of congestion, determining the possible the source(s) of congestion and its …


Optimal In-Place Suffix Sorting, Zhize Li, Jian Li, Hongwei Huo Oct 2018

Optimal In-Place Suffix Sorting, Zhize Li, Jian Li, Hongwei Huo

Research Collection School Of Computing and Information Systems

The suffix array is a fundamental data structure for many applications that involve string searching and data compression. Designing time/space-efficient suffix array construction algorithms has attracted significant attentions and considerable advances have been made for the past 20 years. We obtain the first in-place linear time suffix array construction algorithms that are optimal both in time and space for (read-only) integer alphabets. Our algorithm settles the open problem posed by Franceschini and Muthukrishnan in ICALP 2007. The open problem asked to design in-place algorithms in $o(n \log n)$ time and ultimately, in $O(n)$ time for (read-only) integer alphabets with $|\Sigma| …


Learning To Love Data (Week): Creating Data Services Awareness On Campus, Katie M. Wissel, Lisa Deluca Sep 2018

Learning To Love Data (Week): Creating Data Services Awareness On Campus, Katie M. Wissel, Lisa Deluca

Kathryn Wissel, MBA, MI

In May 2017, The Economist ran a cover story titled “The world’s most valuable resource is no longer oil, but data.” Given the continued growth in the sourcing, curating, and storing of data for academic research, it seems the academy would agree. In response to this growing need at Seton Hall, a midsized research university, the Seton Hall University (SHU) Libraries conducted an assessment of the current and emerging data requirements of the researchers and students on campus.


An Outlier Detection Algorithm Based On Cross-Correlation Analysis For Time Series Dataset, Hui Lu, Yaxian Liu, Zongming Fei, Chongchong Guan Sep 2018

An Outlier Detection Algorithm Based On Cross-Correlation Analysis For Time Series Dataset, Hui Lu, Yaxian Liu, Zongming Fei, Chongchong Guan

Computer Science Faculty Publications

Outlier detection is a very essential problem in a variety of application areas. Many detection methods are deficient for high-dimensional time series data sets containing both isolated and assembled outliers. In this paper, we propose an Outlier Detection method based on Cross-correlation Analysis (ODCA). ODCA consists of three key parts. They are data preprocessing, outlier analysis, and outlier rank. First, we investigate a linear interpolation method to convert assembled outliers into isolated ones. Second, a detection mechanism based on the cross-correlation analysis is proposed for translating the high-dimensional data sets into 1-D cross-correlation function, according to which the isolated outlier …


Programming For The Web: From Soup To Nuts: Implementing A Complete Gis Web Page Using Html5, Css, Javascript, Node.Js, Mongodb, And Open Layers., Charles W. Kann Iii Sep 2018

Programming For The Web: From Soup To Nuts: Implementing A Complete Gis Web Page Using Html5, Css, Javascript, Node.Js, Mongodb, And Open Layers., Charles W. Kann Iii

Open Educational Resources

This book is designed to be used as a class text but should be easily accessible to programmers interested in Web Programming. It should even be accessible to an advanced hobbyist.

The original goal behind this text was to help students doing research with me in Web based mapping applications, generally using Open Layers. The idea was to provide persistent storage using REST and simple http request from JavaScript to store the data on a server.

When teaching this class, I became painfully aware of just how little students know about Web Programming. They did not know how to format …


Talent Flow Analytics In Online Professional Network, Richard J. Oentaryo, Ee-Peng Lim, Xavier Jayaraj Siddarth Ashok, Philips Kokoh Prasetyo Sep 2018

Talent Flow Analytics In Online Professional Network, Richard J. Oentaryo, Ee-Peng Lim, Xavier Jayaraj Siddarth Ashok, Philips Kokoh Prasetyo

Research Collection School Of Computing and Information Systems

Analyzing job hopping behavior is important for understanding job preference and career progression of working individuals. When analyzed at the workforce population level, job hop analysis helps to gain insights of talent flow among different jobs and organizations. Traditionally, surveys are conducted on job seekers and employers to study job hop behavior. Beyond surveys, job hop behavior can also be studied in a highly scalable and timely manner using a data-driven approach in response to fast-changing job landscape. Fortunately, the advent of online professional networks (OPNs) has made it possible to perform a large-scale analysis of talent flow. In this …


A Methodology For Evaluating Relational And Nosql Databases For Small-Scale Storage And Retrieval, Ryan D. Engle Sep 2018

A Methodology For Evaluating Relational And Nosql Databases For Small-Scale Storage And Retrieval, Ryan D. Engle

Theses and Dissertations

Modern systems record large quantities of electronic data capturing time-ordered events, system state information, and behavior. Subsequent analysis enables historic and current system status reporting, supports fault investigations, and may provide insight for emerging system trends. Unfortunately, the management of log data requires ever more efficient and complex storage tools to access, manipulate, and retrieve these records. Truly effective solutions also require a well-planned architecture supporting the needs of multiple stakeholders. Historically, database requirements were well-served by relational data models, however modern, non-relational databases, i.e. NoSQL, solutions, initially intended for “big data” distributed system may also provide value for smaller-scale …


Self-Supervised Feature Learning For Semantic Segmentation Of Overhead Imagery, Suriya Singh, Anil Batra, Guansong Pang, Lorenzo Torresani, Saikat Basu, Manohar Paluri, C. V. Jawahar Sep 2018

Self-Supervised Feature Learning For Semantic Segmentation Of Overhead Imagery, Suriya Singh, Anil Batra, Guansong Pang, Lorenzo Torresani, Saikat Basu, Manohar Paluri, C. V. Jawahar

Research Collection School Of Computing and Information Systems

Overhead imageries play a crucial role in many applications such as urban planning, crop yield forecasting, mapping, and policy making. Semantic segmentation could enable automatic, efficient, and large-scale understanding of overhead imageries for these applications. However, semantic segmentation of overhead imageries is a challenging task, primarily due to the large domain gap from existing research in ground imageries, unavailability of large-scale dataset with pixel-level annotations, and inherent complexity in the task. Readily available vast amount of unlabeled overhead imageries share more common structures and patterns compared to the ground imageries, therefore, its large-scale analysis could benefit from unsupervised feature learning …


Jobcomposer: Career Path Optimization Via Multicriteria Utility Learning, Richard J. Oentaryo, Xavier Jayaraj Siddarth Ashok, Ee-Peng Lim, Philips Kokoh Prasetyo Sep 2018

Jobcomposer: Career Path Optimization Via Multicriteria Utility Learning, Richard J. Oentaryo, Xavier Jayaraj Siddarth Ashok, Ee-Peng Lim, Philips Kokoh Prasetyo

Research Collection School Of Computing and Information Systems

With online professional network platforms (OPNs, e.g., LinkedIn, Xing, etc.)becoming popular on the web, people are now turning to these platforms tocreate and share their professional profiles, to connect with others who sharesimilar professional aspirations and to explore new career opportunities. Theseplatforms however do not offer a long-term roadmap to guide career progressionand improve workforce employability. The career trajectories of OPN users canserve as a reference but they are not always optimal. A career plan can also bedevised through consultation with career coaches, whose knowledge may howeverbe limited to a few industries. To address the above limitations, we present anovel …


Assessing Carbon Pollution Standards: Electric Power Generation Pathways And Their Water Impacts, Kustini Lim-Wavde, Haibo Zhai, Robert John Kauffman, Edward S. Rubin Sep 2018

Assessing Carbon Pollution Standards: Electric Power Generation Pathways And Their Water Impacts, Kustini Lim-Wavde, Haibo Zhai, Robert John Kauffman, Edward S. Rubin

Research Collection School Of Computing and Information Systems

Highlights•Without carbon regulations, CO2 emissions and water use are highly affected by fuel prices.•Carbon regulations reduce both CO2 emissions and water use.•Without incentives, carbon capture is not competitive with cheap natural gas and renewables.•A stringent constraint on water withdrawal lowers the fleet share of once-through cooling.AbstractThis study evaluates transition pathways in electricity generation and their future water impacts. Scenarios that do or do not comply with the carbon pollution standards – based on the U.S. New Source Performance Standards and Clean Power Plan – are evaluated. Using the Electric Reliability Council of Texas region as an illustration, the scenarios with …


A Strategic Value Appropriation Path For Cloud Computing, Abhishek Kathuria, Arti Mann, Jiban Khuntia, Robert J. Kauffman Sep 2018

A Strategic Value Appropriation Path For Cloud Computing, Abhishek Kathuria, Arti Mann, Jiban Khuntia, Robert J. Kauffman

Research Collection School Of Computing and Information Systems

Cloud-based information management is one of the leading competitive differentiation strategies for firms. With the increasing criticality of information management in value creation and process support, establishing an integrated capability with cloud computing is vital for organizational success in the changing landscape of business competition. These issues have received scant attention, however. We draw on the resource-based view, dynamic capability hierarchy concepts, and the perspective of operand and operant resources to suggest a cloud value appropriation model for firms. We argue that, to appropriate business value from cloud computing, the firm needs to effectively deploy cloud computing and leverage cloud …


Wasserstein Divergence For Gans, J. Wu, Zhiwu Huang, J. Thoma, D. Acharya, Gool L. Van Sep 2018

Wasserstein Divergence For Gans, J. Wu, Zhiwu Huang, J. Thoma, D. Acharya, Gool L. Van

Research Collection School Of Computing and Information Systems

In many domains of computer vision, generative adversarial networks (GANs) have achieved great success, among which the family of Wasserstein GANs (WGANs) is considered to be state-of-the-art due to the theoretical contributions and competitive qualitative performance. However, it is very challenging to approximate the k-Lipschitz constraint required by the Wasserstein-1 metric (W-met). In this paper, we propose a novel Wasserstein divergence (W-div), which is a relaxed version of W-met and does not require the k-Lipschitz constraint. As a concrete application, we introduce a Wasserstein divergence objective for GANs (WGAN-div), which can faithfully approximate W-div through optimization. Under various settings, including …


A Two-Stage Mechanism For Ordinal Peer Assessment, Zhize Li, Le Zhang, Zhixuan Fang, Jian Li Sep 2018

A Two-Stage Mechanism For Ordinal Peer Assessment, Zhize Li, Le Zhang, Zhixuan Fang, Jian Li

Research Collection School Of Computing and Information Systems

Peer assessment is a major method for evaluating the performance of employee, accessing the contributions of individuals within a group, making social decisions and many other scenarios. The idea is to ask the individuals of the same group to assess the performance of the others. Scores or rankings are then determined based on these evaluations. However, peer assessment can be biased and manipulated, especially when there is a conflict of interests. In this paper, we consider the problem of eliciting the underlying ordering (i.e. ground truth) of n strategic agents with respect to their performances, e.g., quality of work, contributions, …


Implicit Linking Of Food Entities In Social Media, Wen Haw Chong, Ee Peng Lim Sep 2018

Implicit Linking Of Food Entities In Social Media, Wen Haw Chong, Ee Peng Lim

Research Collection School Of Computing and Information Systems

Dining is an important part in people’s lives and this explains why food-related microblogs and reviews are popular in social media. Identifying food entities in food-related posts is important to food lover profiling and food (or restaurant) recommendations. In this work, we conduct Implicit Entity Linking (IEL) to link food-related posts to food entities in a knowledge base. In IEL, we link posts even if they do not contain explicit entity mentions. We first show empirically that food venues are entity-focused and associated with a limited number of food entities each. Hence same-venue posts are likely to share common food …


Diversity In Online Advertising: A Case Study Of 69 Brands On Social Media, Jisun An, Ingmar Weber Sep 2018

Diversity In Online Advertising: A Case Study Of 69 Brands On Social Media, Jisun An, Ingmar Weber

Research Collection School Of Computing and Information Systems

Lack of diversity in advertising is a long-standing problem. Despite growing cultural awareness and missed business opportunities, many minorities remain under- or inappropriately represented in advertising. Previous research has studied how people react to culturally embedded ads, but such work focused mostly on print media or television using lab experiments. In this work, we look at diversity in content posted by 69 U.S. brands on two social media platforms, Instagram and Facebook. Using face detection technology, we infer the gender, race, and age of both the faces in the ads and of the users engaging with ads. Using this dataset, …


Question-Guided Hybrid Convolution For Visual Question Answering, Peng Gao, Pan Lu, Hongsheng Li, Shuang Li, Yikang Li, Steven C. H. Hoi, Xiaogang Wang Sep 2018

Question-Guided Hybrid Convolution For Visual Question Answering, Peng Gao, Pan Lu, Hongsheng Li, Shuang Li, Yikang Li, Steven C. H. Hoi, Xiaogang Wang

Research Collection School Of Computing and Information Systems

In this paper, we propose a novel Question-Guided Hybrid Convolution (QGHC) network for Visual Question Answering (VQA). Most state-of-the-art VQA methods fuse the high-level textual and visual features from the neural network and abandon the visual spatial information when learning multi-modal features.To address these problems, question-guided kernels generated from the input question are designed to convolute with visual features for capturing the textual and visual relationship in the early stage. The question-guided convolution can tightly couple the textual and visual information but also introduce more parameters when learning kernels. We apply the group convolution, which consists of question-independent kernels and …


Are You On The Right Track? Learning Career Tracks For Job Movement Analysis, Meng-Fen Chiang, Ee-Peng Lim, Wang-Chien Lee, Yuan Tian, Chih-Chieh Hung Sep 2018

Are You On The Right Track? Learning Career Tracks For Job Movement Analysis, Meng-Fen Chiang, Ee-Peng Lim, Wang-Chien Lee, Yuan Tian, Chih-Chieh Hung

Research Collection School Of Computing and Information Systems

Career track represents a vertical career pathway, where one can gradually move up to take up higher job appointments when relevant skills are acquired. Understanding the propensity of career movements in an evolving job market can enable timely career guidance to job seekers and working professionals. To this end, we harvest career trajectories from online professional network (OPN). Our focus lies on obtaining a macro view on career movements at the track granularity. Specifically, we propose a semi-supervised career track labelling framework to automatically assign career tracks for large set of jobs. To contextually label jobs, we collect example jobs …


A Hybrid Model For Identity Obfuscation By Face Replacement, Qianru Sun, Ayush Tewari, Weipeng Xu, Mario Fritz, Christian Theobalt, Bernt Schiele Sep 2018

A Hybrid Model For Identity Obfuscation By Face Replacement, Qianru Sun, Ayush Tewari, Weipeng Xu, Mario Fritz, Christian Theobalt, Bernt Schiele

Research Collection School Of Computing and Information Systems

As more and more personal photos are shared and tagged in social media, avoiding privacy risks such as unintended recognition, becomes increasingly challenging. We propose a new hybrid approach to obfuscate identities in photos by head replacement. Our approach combines state of the art parametric face synthesis with latest advances in Generative Adversarial Networks (GAN) for data-driven image synthesis. On the one hand, the parametric part of our method gives us control over the facial parameters and allows for explicit manipulation of the identity. On the other hand, the data-driven aspects allow for adding fine details and overall realism as …


The Influence Of Conversational Agent Embodiment And Conversational Relevance On Socially Desirable Responding, Ryan M. Schuetzler, Justin Scott Giboney, G. Mark Grimes, Jay F. Nunamaker Jr. Aug 2018

The Influence Of Conversational Agent Embodiment And Conversational Relevance On Socially Desirable Responding, Ryan M. Schuetzler, Justin Scott Giboney, G. Mark Grimes, Jay F. Nunamaker Jr.

Information Systems and Quantitative Analysis Faculty Publications

Conversational agents (CAs) are becoming an increasingly common component in a wide range of information systems. A great deal of research to date has focused on enhancing traits that make CAs more humanlike. However, few studies have examined the influence such traits have on information disclosure. This research builds on self-disclosure, social desirability, and social presence theories to explain how CA anthropomorphism affects disclosure of personally sensitive information. Taken together, these theories suggest that as CAs become more humanlike, the social desirability of user responses will increase. In this study, we use a laboratory experiment to examine the influence of …


A Linked Coptic Dictionary Online, Frank Feder, Maxim Kupreyev, Emma Manning, Caroline T. Schroeder, Amir Zeldes Aug 2018

A Linked Coptic Dictionary Online, Frank Feder, Maxim Kupreyev, Emma Manning, Caroline T. Schroeder, Amir Zeldes

College of the Pacific Faculty Presentations

We describe a new project publishing a freely available online dictionary for Coptic. The dictionary encompasses comprehensive cross-referencing mechanisms, including linking entries to an online scanned edition of Crum’s Coptic Dictionary, internal cross-references and etymological information, translated searchable definitions in English, French and German, and linked corpus data which provides frequencies and corpus look-up for headwords and multiword expressions. Headwords are available for linking in external projects using a REST API. We describe the challenges in encoding our dictionary using TEI XML and implementing linking mechanisms to construct a Web interface querying frequency information, which draw on NLP tools to …


Towards An Efficient, Scalable Stream Query Operator Framework For Representing And Analyzing Continuous Fields, John Whittier Aug 2018

Towards An Efficient, Scalable Stream Query Operator Framework For Representing And Analyzing Continuous Fields, John Whittier

Electronic Theses and Dissertations

Advancements in sensor technology have made it less expensive to deploy massive numbers of sensors to observe continuous geographic phenomena at high sample rates and stream live sensor observations. This fact has raised new challenges since sensor streams have pushed the limits of traditional geo-sensor data management technology. Data Stream Engines (DSEs) provide facilities for near real-time processing of streams, however, algorithms supporting representing and analyzing Spatio-Temporal (ST) phenomena are limited.

This dissertation investigates near real-time representation and analysis of continuous ST phenomena, observed by large numbers of mobile, asynchronously sampling sensors, using a DSE and proposes two novel stream …


Principles And Guidelines For Advancement Of Touchscreen-Based Non-Visual Access To 2d Spatial Information, Hari Prasath Palani Aug 2018

Principles And Guidelines For Advancement Of Touchscreen-Based Non-Visual Access To 2d Spatial Information, Hari Prasath Palani

Electronic Theses and Dissertations

Graphical materials such as graphs and maps are often inaccessible to millions of blind and visually-impaired (BVI) people, which negatively impacts their educational prospects, ability to travel, and vocational opportunities. To address this longstanding issue, a three-phase research program was conducted that builds on and extends previous work establishing touchscreen-based haptic cuing as a viable alternative for conveying digital graphics to BVI users. Although promising, this approach poses unique challenges that can only be addressed by schematizing the underlying graphical information based on perceptual and spatio-cognitive characteristics pertinent to touchscreen-based haptic access. Towards this end, this dissertation empirically identified a …


Predict The Failure Of Hydraulic Pumps By Different Machine Learning Algorithms, Yifei Zhou, Monika Ivantysynova, Nathan Keller Aug 2018

Predict The Failure Of Hydraulic Pumps By Different Machine Learning Algorithms, Yifei Zhou, Monika Ivantysynova, Nathan Keller

The Summer Undergraduate Research Fellowship (SURF) Symposium

Pump failure is a general concerned problem in the hydraulic field. Once happening, it will cause a huge property loss and even the life loss. The common methods to prevent the occurrence of pump failure is by preventative maintenance and breakdown maintenance, however, both of them have significant drawbacks. This research focuses on the axial piston pump and provides a new solution by the prognostic of pump failure using the classification of machine learning. Different kinds of sensors (temperature, acceleration and etc.) were installed into a good condition pump and three different kinds of damaged pumps to measure 10 of …


Sort Vs. Hash Join On Knights Landing Architecture, Victor L. Pan, Felix Lin Aug 2018

Sort Vs. Hash Join On Knights Landing Architecture, Victor L. Pan, Felix Lin

The Summer Undergraduate Research Fellowship (SURF) Symposium

With the increasing amount of information stored, there is a need for efficient database algorithms. One of the most important database operations is “join”. This involves combining columns from two tables and grouping common values in the same row in order to minimize redundant data. The two main algorithms used are hash join and sort merge join. Hash join builds a hash table to allow for faster searching. Sort merge join first sorts the two tables to make it more efficient when comparing values. There has been a lot of debate over which approach is superior. At first, hash join …


Expected Length Of The Longest Chain In Linear Hashing, Pongthip Srivarangkul, Hemanta K. Maji Aug 2018

Expected Length Of The Longest Chain In Linear Hashing, Pongthip Srivarangkul, Hemanta K. Maji

The Summer Undergraduate Research Fellowship (SURF) Symposium

Hash table with chaining is a data structure that chains objects with identical hash values together with an entry or a memory address. It works by calculating a hash value from an input then placing the input in the hash table entry. When we place two inputs in the same entry, they chain together in a linear linked list. We are interested in the expected length of the longest chain in linear hashing and methods to reduce the length because the worst-case look-up time is directly proportional to it.

The linear hash function used to calculate hash value is defined …


Zero Textbook Cost Syllabus For Cis 2200h (Introduction To Information Systems And Technologies), Curtis Izen Aug 2018

Zero Textbook Cost Syllabus For Cis 2200h (Introduction To Information Systems And Technologies), Curtis Izen

Open Educational Resources

This course introduces students to information systems in business. Due to the rapid developments in Information Technology (IT) and the dramatic changes brought by these new technologies in the way companies operate, compete and do business, familiarity with information systems has become indispensable for the leaders of today and tomorrow's organizations.


Online Social Networks’ Investigations Of Individuals’ Healthy And Unhealthy Lifestyle Behaviors And Social Factors Influencing Them —Three Essays, Mahyar Sharif Vaghefi Aug 2018

Online Social Networks’ Investigations Of Individuals’ Healthy And Unhealthy Lifestyle Behaviors And Social Factors Influencing Them —Three Essays, Mahyar Sharif Vaghefi

Theses and Dissertations

More than half of U.S. adults suffer from one or more chronic diseases, which account for 86% of total U.S. healthcare costs. Major contributors to chronic diseases are unhealthy lifestyle behaviors, which include lack of physical activity, poor nutrition, tobacco use, and drinking too much alcohol. A reduction in the prevalence of health-risk behaviors could improve individuals’ longevity and quality of life and may halt the exponential growth of healthcare costs. Prior studies in the field have acknowledged that a comprehensive understanding of health behaviors requires the examination of individual’ behaviors in supra-dyadic social networks. In recent years, the growth …


Proactive And Reactive Resource/Task Allocation For Agent Teams In Uncertain Environments, Pritee Agrawal Aug 2018

Proactive And Reactive Resource/Task Allocation For Agent Teams In Uncertain Environments, Pritee Agrawal

Dissertations and Theses Collection (Open Access)

Synergistic interactions between task/resource allocation and multi-agent coordinated planning/assignment exist in many problem domains such as trans- portation and logistics, disaster rescue, security patrolling, sensor networks, power distribution networks, etc. These domains often feature dynamic environments where allocations of tasks/resources may have complex dependencies and agents may leave the team due to unforeseen conditions (e.g., emergency, accident or violation, damage to agent, reconfiguration of environment).


Secure Enforcement Of Isolation Policy On Multicore Platforms With Virtualization Techniques, Siqi Zhao Aug 2018

Secure Enforcement Of Isolation Policy On Multicore Platforms With Virtualization Techniques, Siqi Zhao

Dissertations and Theses Collection (Open Access)

A number of virtualization based systems have been proposed in the literature as an effective measure against the adversaries with the kernel privilege. However, under a systematic analysis, such systems exhibit vulnerabilities that can still be exploited by such an attacker with the kernel privilege. The fundamental reason is that there is an inherent incompatibility between the tamper-proof requirement and the complete mediation requirement of the reference monitor model. The incompatibility manifests in the virtualization based systems in the form of a discrepancy between the enforcement capability demanded by the high-level policy and the one achievable through the system design …


Deep Learning For Practical Image Recognition: Case Study On Kaggle Competitions, Xulei Yang, Zeng Zeng, Sin G. Teo, Li Wang, Vijay Chandrasekar, Steven C. H. Hoi Aug 2018

Deep Learning For Practical Image Recognition: Case Study On Kaggle Competitions, Xulei Yang, Zeng Zeng, Sin G. Teo, Li Wang, Vijay Chandrasekar, Steven C. H. Hoi

Research Collection School Of Computing and Information Systems

In past years, deep convolutional neural networks (DCNN) have achieved big successes in image classification and object detection, as demonstrated on ImageNet in academic field. However, There are some unique practical challenges remain for real-world image recognition applications, e.g., small size of the objects, imbalanced data distributions, limited labeled data samples, etc. In this work, we are making efforts to deal with these challenges through a computational framework by incorporating latest developments in deep learning. In terms of two-stage detection scheme, pseudo labeling, data augmentation, cross-validation and ensemble learning, the proposed framework aims to achieve better performances for practical image …