Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Databases and Information Systems

Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 361 - 390 of 6717

Full-Text Articles in Physical Sciences and Mathematics

Semantic Scene Completion With Cleaner Self, Fengyun Wang, Dong Zhang, Hanwang Zhang, Jinhui Tang, Qianru Sun Jun 2023

Semantic Scene Completion With Cleaner Self, Fengyun Wang, Dong Zhang, Hanwang Zhang, Jinhui Tang, Qianru Sun

Research Collection School Of Computing and Information Systems

Semantic Scene Completion (SSC) transforms an image of single-view depth and/or RGB 2D pixels into 3D voxels, each of whose semantic labels are predicted. SSC is a well-known ill-posed problem as the prediction model has to “imagine” what is behind the visible surface, which is usually represented by Truncated Signed Distance Function (TSDF). Due to the sensory imperfection of the depth camera, most existing methods based on the noisy TSDF estimated from depth values suffer from 1) incomplete volumetric predictions and 2) confused semantic labels. To this end, we use the ground-truth 3D voxels to generate a perfect visible surface, …


Unbiased Multiple Instance Learning For Weakly Supervised Video Anomaly Detection, Hui Lyu, Zhongqi Yue, Qianru Sun, Bin Luo, Zhen Cui, Hanwang Zhang Jun 2023

Unbiased Multiple Instance Learning For Weakly Supervised Video Anomaly Detection, Hui Lyu, Zhongqi Yue, Qianru Sun, Bin Luo, Zhen Cui, Hanwang Zhang

Research Collection School Of Computing and Information Systems

Weakly Supervised Video Anomaly Detection (WSVAD) is challenging because the binary anomaly label is only given on the video level, but the output requires snippet-level predictions. So, Multiple Instance Learning (MIL) is prevailing in WSVAD. However, MIL is notoriously known to suffer from many false alarms because the snippet-level detector is easily biased towards the abnormal snippets with simple context, confused by the normality with the same bias, and missing the anomaly with a different pattern. To this end, we propose a new MIL framework: Unbiased MIL (UMIL), to learn unbiased anomaly features that improve WSVAD. At each MIL training …


Groundnlq @ Ego4d Natural Language Queries Challenge 2023, Zhijian Hou, Lei Ji, Difei Gao, Wanjun Zhong, Kun Yan, Chong-Wah Ngo, Wing-Kwong Chan, Chong-Wah Ngo, Nan Duan, Mike Zheng Shou Jun 2023

Groundnlq @ Ego4d Natural Language Queries Challenge 2023, Zhijian Hou, Lei Ji, Difei Gao, Wanjun Zhong, Kun Yan, Chong-Wah Ngo, Wing-Kwong Chan, Chong-Wah Ngo, Nan Duan, Mike Zheng Shou

Research Collection School Of Computing and Information Systems

In this report, we present our champion solution for Ego4D Natural Language Queries (NLQ) Challenge in CVPR 2023. Essentially, to accurately ground in a video, an effective egocentric feature extractor and a powerful grounding model are required. Motivated by this, we leverage a two-stage pre-training strategy to train egocentric feature extractors and the grounding model on video narrations, and further fine-tune the model on annotated data. In addition, we introduce a novel grounding model GroundNLQ, which employs a multi-modal multiscale grounding module for effective video and text fusion and various temporal intervals, especially for long videos. On the blind test …


Towards A Smaller Student: Capacity Dynamic Distillation For Efficient Image Retrieval, Yi Xie, Huaidong Zhang, Xuemiao Xu, Jianqing Zhu, Shengfeng He Jun 2023

Towards A Smaller Student: Capacity Dynamic Distillation For Efficient Image Retrieval, Yi Xie, Huaidong Zhang, Xuemiao Xu, Jianqing Zhu, Shengfeng He

Research Collection School Of Computing and Information Systems

Previous Knowledge Distillation based efficient image retrieval methods employ a lightweight network as the student model for fast inference. However, the lightweight student model lacks adequate representation capacity for effective knowledge imitation during the most critical early training period, causing final performance degeneration. To tackle this issue, we propose a Capacity Dynamic Distillation framework, which constructs a student model with editable representation capacity. Specifically, the employed student model is initially a heavy model to fruitfully learn distilled knowledge in the early training epochs, and the student model is gradually compressed during the training. To dynamically adjust the model capacity, our …


Preference-Aware Delivery Planning For Last-Mile Logistics, Qian Shao, Shih-Fen Cheng Jun 2023

Preference-Aware Delivery Planning For Last-Mile Logistics, Qian Shao, Shih-Fen Cheng

Research Collection School Of Computing and Information Systems

Optimizing delivery routes for last-mile logistics service is challenging and has attracted the attention of many researchers. These problems are usually modeled and solved as variants of vehicle routing problems (VRPs) with challenging real-world constraints (e.g., time windows, precedence). However, despite many decades of solid research on solving these VRP instances, we still see significant gaps between optimized routes and the routes that are actually preferred by the practitioners. Most of these gaps are due to the difference between what's being optimized, and what the practitioners actually care about, which is hard to be defined exactly in many instances. In …


Avoiding Starvation Of Arms In Restless Multi-Armed Bandit, Dexun Li, Pradeep Varakantham Jun 2023

Avoiding Starvation Of Arms In Restless Multi-Armed Bandit, Dexun Li, Pradeep Varakantham

Research Collection School Of Computing and Information Systems

Restless multi-armed bandits (RMAB) is a popular framework for optimizing performance with limited resources under uncertainty. It is an extremely useful model for monitoring beneficiaries (arms) and executing timely interventions using health workers (limited resources) to ensure optimal benefit in public health settings. For instance, RMAB has been used to track patients' health and monitor their adherence in tuberculosis settings, ensure pregnant mothers listen to automated calls about good pregnancy practices, etc. Due to the limited resources, typically certain individuals, communities, or regions are starved of interventions, which can potentially have a significant negative impact on the individual/community in the …


Enhancing Third-Party Software Reliability Through Bug Bounty Programs, Tianlu Zhou, Dan Ma, Nan Feng Jun 2023

Enhancing Third-Party Software Reliability Through Bug Bounty Programs, Tianlu Zhou, Dan Ma, Nan Feng

Research Collection School Of Computing and Information Systems

Bug Bounty Programs (BBPs) reward external hackers for identifying and reporting software vulnerabilities. As the number of security issues caused by third-party applications has been significantly increased recently, many digital platforms are considering launching BBPs to help enhance the reliability of third-party software. BBPs bring benefits to the platform and vendors, meanwhile impose additional costs on them as well. As a result, the overall impact of using BBP is unclear. In this paper, we present an analytical model to examine the strategic decisions of launching and participating in a BBP for the platform and the third-party vendor, respectively. We find …


Improving Quantal Cognitive Hierarchy Model Through Iterative Population Learning, Yuhong Xu, Shih-Fen Cheng, Xinyu Chen Jun 2023

Improving Quantal Cognitive Hierarchy Model Through Iterative Population Learning, Yuhong Xu, Shih-Fen Cheng, Xinyu Chen

Research Collection School Of Computing and Information Systems

In this paper, we propose to enhance the state-of-the-art quantal cognitive hierarchy (QCH) model with iterative population learning (IPL) to estimate the empirical distribution of agents’ reasoning levels and fit human agents’ behavioral data. We apply our approach to a real-world dataset from the Swedish lowest unique positive integer (LUPI) game and show that our proposed approach outperforms the theoretical Poisson Nash equilibrium predictions and the QCH approach by 49.8% and 46.6% in Wasserstein distance respectively. Our approach also allows us to explicitly measure an agent’s reasoning level distribution, which is not previously possible.


Catching The Fast Payments Trend: Optimal Designs And Leadership Strategies Of Retail Payment And Settlement Systems, Zhiling Guo, Dan Ma Jun 2023

Catching The Fast Payments Trend: Optimal Designs And Leadership Strategies Of Retail Payment And Settlement Systems, Zhiling Guo, Dan Ma

Research Collection School Of Computing and Information Systems

Recent financial technologies have enabled fast payments and are reshaping retail payment and settlement systems globally. We developed an analytical model to study the optimal design of a new retail payment system in terms of settlement speed and system capability under both bank and fintech firm heterogeneous participation incentives. We found that three types of payment systems emerge as equilibrium outcomes: batch retail (BR), expedited retail (ER), and real-time retail (RR) payment systems. Although the base value of the payment service positively affects both settlement speed and system capability, the expected liquidity cost negatively impacts settlement speed, and total transaction …


Towards Explaining Sequences Of Actions In Multi-Agent Deep Reinforcement Learning Models, Phyo Wai Khaing, Minghong Geng, Budhitama Subagdja, Shubham Pateria, Ah-Hwee Tan Jun 2023

Towards Explaining Sequences Of Actions In Multi-Agent Deep Reinforcement Learning Models, Phyo Wai Khaing, Minghong Geng, Budhitama Subagdja, Shubham Pateria, Ah-Hwee Tan

Research Collection School Of Computing and Information Systems

Although Multi-agent Deep Reinforcement Learning (MADRL) has shown promising results in solving complex real-world problems, the applicability and reliability of MADRL models are often limited by a lack of understanding of their inner workings for explaining the decisions made. To address this issue, this paper proposes a novel method for explaining MADRL by generalizing the sequences of action events performed by agents into high-level abstract strategies using a spatio-temporal neural network model. Specifically, an interval-based memory retrieval procedure is developed to generalize the encoded sequences of action events over time into short sequential patterns. In addition, two abstraction algorithms are …


Knowledge Compilation For Constrained Combinatorial Action Spaces In Reinforcement Learning, Jiajing Ling, Moritz Lukas Schuler, Akshat Kumar, Pradeep Varakantham Jun 2023

Knowledge Compilation For Constrained Combinatorial Action Spaces In Reinforcement Learning, Jiajing Ling, Moritz Lukas Schuler, Akshat Kumar, Pradeep Varakantham

Research Collection School Of Computing and Information Systems

Action-constrained reinforcement learning (ACRL), where any action taken in a state must satisfy given constraints, has several practical applications such as resource allocation in supply-demand matching, and path planning among others. A key challenge is to enforce constraints when the action space is discrete and combinatorial. To address this, first, we assume an action is represented using propositional variables, and action constraints are represented using Boolean functions. Second, we compactly encode the set of all valid actions that satisfy action constraints using a probabilistic sentential decision diagram (PSDD), a recently proposed knowledge compilation framework. Parameters of the PSDD compactly encode …


Avoiding Starvation Of Arms In Restless Multi-Armed Bandit, Dexun Li, Pradeep Varakantham Jun 2023

Avoiding Starvation Of Arms In Restless Multi-Armed Bandit, Dexun Li, Pradeep Varakantham

Research Collection School Of Computing and Information Systems

Restless multi-armed bandits (RMAB) is a popular framework for optimizing performance with limited resources under uncertainty. It is an extremely useful model for monitoring beneficiaries (arms) and executing timely interventions using health workers (limited resources) to ensure optimal benefit in public health settings. For instance, RMAB has been used to track patients’ health and monitor their adherence in tuberculosis settings, ensure pregnant mothers listen to automated calls about good pregnancy practices, etc. Due to the limited resources, typically certain individuals, communities, or regions are starved of interventions, which can potentially have a significant negative impact on the individual/community in the …


Motif Graph Neural Network, Xuexin Chen, Ruicui Cai, Yuan Fang, Min Wu, Zijian Li, Zhifeng Hao Jun 2023

Motif Graph Neural Network, Xuexin Chen, Ruicui Cai, Yuan Fang, Min Wu, Zijian Li, Zhifeng Hao

Research Collection School Of Computing and Information Systems

Graphs can model complicated interactions between entities, which naturally emerge in many important applications. These applications can often be cast into standard graph learning tasks, in which a crucial step is to learn low-dimensional graph representations. Graph neural networks (GNNs) are currently the most popular model in graph embedding approaches. However, standard GNNs in the neighborhood aggregation paradigm suffer from limited discriminative power in distinguishing high-order graph structures as opposed to low-order structures. To capture high-order structures, researchers have resorted to motifs and developed motif-based GNNs. However, the existing motif-based GNNs still often suffer from less discriminative power on high-order …


Efficient Convoy Routing And Bridge Load Optimization User Interface, Brandon Lacy, Will Heller, Yonas Kassa, Brian Ricks, Robin Gandhi May 2023

Efficient Convoy Routing And Bridge Load Optimization User Interface, Brandon Lacy, Will Heller, Yonas Kassa, Brian Ricks, Robin Gandhi

Information Systems and Quantitative Analysis Faculty Proceedings & Presentations

No abstract provided.


Building Explainable Machine Learning Lifecycle: Model Training, Selection, And Deployment With Explainability, Vidit Singh, Yonas Kassa, Brian Ricks, Robin Gandhi May 2023

Building Explainable Machine Learning Lifecycle: Model Training, Selection, And Deployment With Explainability, Vidit Singh, Yonas Kassa, Brian Ricks, Robin Gandhi

Information Systems and Quantitative Analysis Faculty Proceedings & Presentations

No abstract provided.


Developing Architecture For A Routing System Using Bridge Data And Adversary Avoidance, Will Heller, Brian Ricks, Yonas Kassa, Brandon Lacy, Rahul Kamar Nethakani May 2023

Developing Architecture For A Routing System Using Bridge Data And Adversary Avoidance, Will Heller, Brian Ricks, Yonas Kassa, Brandon Lacy, Rahul Kamar Nethakani

Information Systems and Quantitative Analysis Faculty Proceedings & Presentations

No abstract provided.


Progress In A New Visualization Strategy For Ml Models, Alex Wissing, Brian Ricks, Robin Gandhi, Yonas Kassa, Akshay Kale May 2023

Progress In A New Visualization Strategy For Ml Models, Alex Wissing, Brian Ricks, Robin Gandhi, Yonas Kassa, Akshay Kale

Information Systems and Quantitative Analysis Faculty Proceedings & Presentations

No abstract provided.


How To Select Simple-Yet-Accurate Model Of Bridge Maintenance?, Akshay Kale, Yonas Kassa, Brian Ricks, Robin Gandhi May 2023

How To Select Simple-Yet-Accurate Model Of Bridge Maintenance?, Akshay Kale, Yonas Kassa, Brian Ricks, Robin Gandhi

Information Systems and Quantitative Analysis Faculty Proceedings & Presentations

No abstract provided.


Fair Signposting Profile, Herbert Van De Sompel, Martin Klein, Shawn Jones, Michael L. Nelson, Simeon Warner, Anusuriya Devaraju, Robert Huber, Wilko Steinhoff, Vyacheslav Tykhonov, Luc Boruta, Enno Meijers, Stian Soiland-Reyes, Mark Wilkonson May 2023

Fair Signposting Profile, Herbert Van De Sompel, Martin Klein, Shawn Jones, Michael L. Nelson, Simeon Warner, Anusuriya Devaraju, Robert Huber, Wilko Steinhoff, Vyacheslav Tykhonov, Luc Boruta, Enno Meijers, Stian Soiland-Reyes, Mark Wilkonson

Computer Science Faculty Publications

[First paragraph] This page details concrete recipes that platforms that host research outputs (e.g. data repositories, institutional repositories, publisher platforms, etc.) can follow to implement Signposting, a lightweight yet powerful approach to increase the FAIRness of scholarly objects.


Feature Selection From Clinical Surveys Using Semantic Textual Similarity, Benjamin Warner May 2023

Feature Selection From Clinical Surveys Using Semantic Textual Similarity, Benjamin Warner

McKelvey School of Engineering Theses & Dissertations

Survey data collected from human subjects can contain a high number of features while having a comparatively low quantity of examples. Machine learning models that attempt to predict outcomes from survey data under these conditions can overfit and result in poor generalizability. One remedy to this issue is feature selection, which attempts to select an optimal subset of features to learn upon. A relatively unexplored source of information in the feature selection process is the usage of textual names of features, which may be semantically indicative of which features are relevant to a target outcome. The relationships between feature names …


Cinema Trends And Viewer Preferences: An Analysis Of Movie Trends, Factors Leading To Box-Office Success, And Viewer Ratings, Brandon Crossland May 2023

Cinema Trends And Viewer Preferences: An Analysis Of Movie Trends, Factors Leading To Box-Office Success, And Viewer Ratings, Brandon Crossland

Analytics Capstones

This research paper investigates the critical factors that impact the success and profitability of feature films in the entertainment industry. The study is divided into two primary parts. The first part aims to identify trends in cinema and predict box office earnings using advanced data analytics techniques. The second part examines user reviews to determine the key factors that influence film viewership. The objective is to provide valuable insights to cinema enthusiasts, film executives, and streaming platforms, helping them make informed decisions on film production and recommendations. The methods utilized include descriptive data visualizations in Excel and Python and predictive …


An Analysis And Examination Of Consensus Attacks In Blockchain Networks, Thomas R. Clark May 2023

An Analysis And Examination Of Consensus Attacks In Blockchain Networks, Thomas R. Clark

Senior Honors Projects, 2020-current

This paper examines consensus attacks as they relate to blockchain networks. Consensus attacks are a significant threat to the security and integrity of blockchain networks, and understanding these attacks is crucial for developers and stakeholders. The primary contribution of the paper is to present blockchain and consensus attacks in a clear and accessible manner, with the aim of making these complex concepts easily understandable for a general audience. Using literature review, the paper identifies various methods to prevent consensus attacks, including multi-chain networks, proof-of-work consensus algorithms, and network auditing and monitoring. An analysis revealed that these methods for preventing consensus …


Understanding Data Mining And Its Relation To Information Systems, Malak Alammari May 2023

Understanding Data Mining And Its Relation To Information Systems, Malak Alammari

Publications and Research

This research project aims to enrich an Open Educational Resource (OER) textbook on Introduction to Information Systems/Technology with a focus on data mining and its relation to hardware and software components of information systems. The study will address the following research questions: (1) What is data mining? and (2) How does data relate to the hardware and software components of information systems? To answer these questions, the researcher will conduct research to ascertain the current state of data mining and its relevance in the field of information systems/technology. The results of the research will be incorporated into an existing OER …


Blockchain Security: Double-Spending Attack And Prevention, William Henry Scott Iii May 2023

Blockchain Security: Double-Spending Attack And Prevention, William Henry Scott Iii

Electronic Theses and Dissertations

This thesis shows that distributed consensus systems based on proof of work are vulnerable to hashrate-based double-spending attacks due to abuse of majority rule. Through building a private fork of Litecoin and executing a double-spending attack this thesis examines the mechanics and principles behind the attack. This thesis also conducts a survey of preventative measures used to deter double-spending attacks, concluding that a decentralized peer-to-peer network using proof of work is best protected by the addition of an observer system whether internal or external.


Digital Dna: The Ethical Implications Of Big Data As The World’S New-Age Commodity, Clark H. Dotson May 2023

Digital Dna: The Ethical Implications Of Big Data As The World’S New-Age Commodity, Clark H. Dotson

Honors Theses

In the emerging digital world that we find ourselves in, it becomes apparent that data collection has become a staple of daily life, whether we like it or not. This research discussion aims to bring light to just how much one’s own digital identity is valued in the technologically-infused world of today, with distinct research and local examples to bring awareness to the ethical implications of your online presence. The paper in question examines anecdotal and research evidence of the collection of data, both through true and unjust means, as well as ethical implications of what this information truly represents. …


Areas Of Same Cardinal Direction, Periyandy Thunendran May 2023

Areas Of Same Cardinal Direction, Periyandy Thunendran

Electronic Theses and Dissertations

Cardinal directions, such as North, East, South, and West, are the foundation for qualitative spatial reasoning, a common field of GIS, Artificial Intelligence, and cognitive science. Such cardinal directions capture the relative spatial direction relation between a reference object and a target object, therefore, they are important search criteria in spatial databases. The projection-based model for such direction relations has been well investigated for point-like objects, yielding a relation algebra with strong inference power. The Direction Relation Matrix defines the simple region-to-region direction relations by approximating the reference object to a minimum bounding rectangle. Models that capture the direction between …


Rbac Attack Exposure Auditor. Tracking User Risk Exposure Per Role-Based Access Control Permissions, Adelaide Damrau May 2023

Rbac Attack Exposure Auditor. Tracking User Risk Exposure Per Role-Based Access Control Permissions, Adelaide Damrau

Undergraduate Honors Theses

Access control models and implementation guidelines for determining, provisioning, and de-provisioning user permissions are challenging due to the differing approaches, unique for each organization, the lack of information provided by case studies concerning the organization’s security policies, and no standard means of implementation procedures or best practices. Although there are multiple access control models, one stands out, role-based access control (RBAC). RBAC simplifies maintenance by enabling administrators to group users with similar permissions. This approach to managing user permissions supports the principle of least privilege and separation of duties, which are needed to ensure an organization maintains acceptable user access …


Rattus Norvegicus As A Biological Detector Of Clandestine Remains And The Use Of Ultrasonic Vocalizations As A Locating Mechanism, Gabrielle M. Johnston May 2023

Rattus Norvegicus As A Biological Detector Of Clandestine Remains And The Use Of Ultrasonic Vocalizations As A Locating Mechanism, Gabrielle M. Johnston

Master's Theses

In investigations, locating missing persons and clandestine remains are imperative. One way that first responder and police agencies can search for the remains is by using cadaver dogs as biological detectors. Cadaver dogs are typically used due to their olfactory sensitivity and ability to detect low concentrations of volatile organic compounds produced by biological remains. Cadaver dogs are typically chosen for their stamina, agility, and olfactory sensitivity. However, what is not taken into account often is the size of the animal and the expense of maintaining and training the animal. Cadaver dogs are typically large breeds that cannot fit in …


Bluetooth Low Energy Indoor Positioning System, Jackson T. Diamond, Jordan Hanson Dr May 2023

Bluetooth Low Energy Indoor Positioning System, Jackson T. Diamond, Jordan Hanson Dr

Whittier Scholars Program

Robust indoor positioning systems based on low energy bluetooth signals will service a wide range of applications. We present an example of a low energy bluetooth positioning system. First, the steps taken to locate the target with the bluetooth data will be reviewed. Next, we describe the algorithms of the set of android apps developed to utilize the bluetooth data for positioning. Similar to GPS, the algorithms use trilateration to approximate the target location by utilizing the corner devices running one of the apps. Due to the fluctuating nature of the bluetooth signal strength indicator (RSSI), we used an averaging …


Connecting The Dots For Contextual Information Retrieval, Pei-Chi Lo May 2023

Connecting The Dots For Contextual Information Retrieval, Pei-Chi Lo

Dissertations and Theses Collection (Open Access)

There are many information retrieval tasks that depend on knowledge graphs to return contextually relevant result of the query. We call them Knowledgeenriched Contextual Information Retrieval (KCIR) tasks and these tasks come in many different forms including query-based document retrieval, query answering and others. These KCIR tasks often require the input query to contextualized by additional facts from a knowledge graph, and using the context representation to perform document or knowledge graph retrieval and prediction. In this dissertation, we present a meta-framework that identifies Contextual Representation Learning (CRL) and Contextual Information Retrieval (CIR) to be the two key components in …