Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Singapore Management University (2960)
- Wright State University (632)
- Walden University (447)
- Selected Works (287)
- New Jersey Institute of Technology (137)
-
- University of Nebraska at Omaha (119)
- California State University, San Bernardino (96)
- Old Dominion University (95)
- San Jose State University (85)
- University of Dayton (82)
- The University of Maine (67)
- City University of New York (CUNY) (65)
- University of Nebraska - Lincoln (54)
- Air Force Institute of Technology (53)
- SelectedWorks (53)
- Technological University Dublin (51)
- University of South Florida (50)
- Kennesaw State University (46)
- Nova Southeastern University (43)
- Claremont Colleges (42)
- University of Wisconsin Milwaukee (42)
- University of Arkansas, Fayetteville (41)
- Western Kentucky University (41)
- Dakota State University (39)
- Institute of Business Administration (38)
- California Polytechnic State University, San Luis Obispo (36)
- Western University (35)
- Ateneo de Manila University (34)
- Governors State University (34)
- Purdue University (34)
- Keyword
-
- Machine learning (100)
- Information technology (93)
- Data mining (89)
- Social media (78)
- Twitter (64)
-
- Machine Learning (57)
- Cybersecurity (54)
- Semantic Web (54)
- Deep learning (52)
- Artificial intelligence (49)
- Online learning (49)
- Information Technology (47)
- Classification (46)
- Cloud computing (45)
- Information retrieval (45)
- Privacy (45)
- Big data (44)
- Database (43)
- Ontology (43)
- Computer science (42)
- Information security (41)
- Algorithms (40)
- Security (40)
- Databases (39)
- Information systems (39)
- Management (37)
- Clustering (36)
- Data Mining (36)
- Northern Ohio Data and Information Service (NODIS) (36)
- Technology (35)
- Publication Year
- Publication
-
- Research Collection School Of Computing and Information Systems (2866)
- Kno.e.sis Publications (541)
- Walden Dissertations and Doctoral Studies (447)
- Theses and Dissertations (116)
- Dissertations (107)
-
- Computer Science Faculty Publications (91)
- Computer Science and Engineering Faculty Publications (91)
- Theses Digitization Project (84)
- Master's Projects (68)
- Information Systems and Quantitative Analysis Faculty Proceedings & Presentations (64)
- Electronic Theses and Dissertations (55)
- Dissertations and Theses Collection (Open Access) (50)
- Theses (46)
- USF Tampa Graduate Theses and Dissertations (46)
- CCE Theses and Dissertations (42)
- Information Systems and Quantitative Analysis Faculty Publications (41)
- Kyriakos MOURATIDIS (40)
- CGU Faculty Publications and Research (37)
- International Conference on Information and Communication Technologies (36)
- Open Educational Resources (34)
- Department of Information Systems & Computer Science Faculty Publications (33)
- All Capstone Projects (32)
- Graduate Theses and Dissertations (32)
- Masters Theses & Doctoral Dissertations (32)
- Articles (29)
- Conference papers (28)
- David LO (28)
- Journal of Spatial Information Science (28)
- All Maxine Goodman Levin School of Urban Affairs Publications (27)
- Saverio Perugini (25)
- Publication Type
Articles 391 - 420 of 6717
Full-Text Articles in Physical Sciences and Mathematics
A Study Of Various Data Sizes Using Machine Learning, Sochaeta Koeum
A Study Of Various Data Sizes Using Machine Learning, Sochaeta Koeum
Electronic Theses, Projects, and Dissertations
Social media is a great domain for news consumption; however, it is referred to as a double-edged sword. While it is user-friendly and low-cost, social media is the reason why fake news can spread rapidly, which is detrimental to society, businesses, and many consumers. Therefore, fake news detection is an emerging field. However, some challenges have restricted other researchers from developing a universal machine learning model that is fast, efficient, and reliable to stop the proliferation because of the lack of resources available, such as large-sized datasets. The goal of this culminating experience project is to explore how varying datasets …
Developing A Multi-Platform Application To Facilitate Internal Campus Hiring, Carissa Patton
Developing A Multi-Platform Application To Facilitate Internal Campus Hiring, Carissa Patton
Computer Science and Computer Engineering Undergraduate Honors Theses
Undergraduate research has proven to be highly beneficial to students, yet there are many students who do not know how to get involved or who are too timid to approach professors to inquire about potential research opportunities. Our hypothesis is that a cross-platform application has the potential to bridge the gap and help more students get involved in undergraduate research by providing them information about open positions and the faculty or staff members who are mentoring the projects. The key focus of this thesis is to develop an application that provides details about participating faculty or staff including their research …
Trace Dna Detection Using Diamond Dye: A Recovery Technique To Yield More Dna, Leah Davis
Trace Dna Detection Using Diamond Dye: A Recovery Technique To Yield More Dna, Leah Davis
Master's Theses
This study aspires to find a new screening approach to trace DNA recovery techniques to yield a higher quantity of trace DNA from larger items of evidence. It takes the path of visualizing trace DNA on items of evidence with potential DNA so analysts can swab a more localized area rather than attempting to recover trace DNA through the general swabbing technique currently used for trace DNA recovery. The first and second parts consisted of observing trace DNA interaction with Diamond Dye on porous and non-porous surfaces.
The third part involved applying the Diamond Dye solution by spraying it onto …
Graph Neural Point Process For Temporal Interaction Prediction, Wenwen Xia, Yuchen Li, Shengdong Li
Graph Neural Point Process For Temporal Interaction Prediction, Wenwen Xia, Yuchen Li, Shengdong Li
Research Collection School Of Computing and Information Systems
Temporal graphs are ubiquitous data structures in many scenarios, including social networks, user-item interaction networks, etc. In this paper, we focus on predicting the exact time of the next interaction, given a node pair on a temporal graph. This novel problem can support interesting applications, such as time-sensitive items recommendation, congestion prediction on road networks, and many others. We present Graph Neural Point Process (GNPP) to tackle this problem. GNPP relies on the graph neural message passing and the temporal point process framework. Most previous graph neural models only utilize the chronological order of observed events and ignore exact timestamps. …
Lessons Learned From The Hospital To Home Community Care Program In Singapore And The Supporting Ai Multiple Readmissions Prediction Model, John Abisheganaden, Kheng Hock Lee, Lian Leng Low, Eugene Shum, Han Leong Goh, Christine Gia Lee Ang, Adny An Ta Wee, Steven M. Miller
Lessons Learned From The Hospital To Home Community Care Program In Singapore And The Supporting Ai Multiple Readmissions Prediction Model, John Abisheganaden, Kheng Hock Lee, Lian Leng Low, Eugene Shum, Han Leong Goh, Christine Gia Lee Ang, Adny An Ta Wee, Steven M. Miller
Research Collection School Of Computing and Information Systems
In a prior practice and policy article published in Healthcare Science, we introduced the deployed application of an artificial intelligence (AI) model to predict longer-term inpatient readmissions to guide community care interventions for patients with complex conditions in the context of Singapore's Hospital to Home (H2H) program that has been operating since 2017. In this follow on practice and policy article, we further elaborate on Singapore's H2H program and care model, and its supporting AI model for multiple readmission prediction, in the following ways: (1) by providing updates on the AI and supporting information systems, (2) by reporting on customer …
Compositional Prompt Tuning With Motion Cues For Open-Vocabulary Video Relation Detection, Kaifeng Gao, Long Chen, Hanwang Zhang, Jun Xiao, Qianru Sun
Compositional Prompt Tuning With Motion Cues For Open-Vocabulary Video Relation Detection, Kaifeng Gao, Long Chen, Hanwang Zhang, Jun Xiao, Qianru Sun
Research Collection School Of Computing and Information Systems
Prompt tuning with large-scale pretrained vision-language models empowers open-vocabulary prediction trained on limited base categories, e.g., object classification and detection. In this paper, we propose compositional prompt tuning with motion cues: an extended prompt tuning paradigm for compositional predictions of video data. In particular, we present Relation Prompt (RePro) for Open-vocabulary Video Visual Relation Detection (Open-VidVRD), where conventional prompt tuning is easily biased to certain subject-object combinations and motion patterns. To this end, RePro addresses the two technical challenges of Open-VidVRD: 1) the prompt tokens should respect the two different semantic roles of subject and object, and 2) the tuning …
Reinforced Adaptation Network For Partial Domain Adaptation, Keyu Wu, Min Wu, Zhenghua Chen, Ruibing Jin, Wei Cui, Zhiguang Cao, Xiaoli Li
Reinforced Adaptation Network For Partial Domain Adaptation, Keyu Wu, Min Wu, Zhenghua Chen, Ruibing Jin, Wei Cui, Zhiguang Cao, Xiaoli Li
Research Collection School Of Computing and Information Systems
Domain adaptation enables generalized learning in new environments by transferring knowledge from label-rich source domains to label-scarce target domains. As a more realistic extension, partial domain adaptation (PDA) relaxes the assumption of fully shared label space, and instead deals with the scenario where the target label space is a subset of the source label space. In this paper, we propose a Reinforced Adaptation Network (RAN) to address the challenging PDA problem. Specifically, a deep reinforcement learning model is proposed to learn source data selection policies. Meanwhile, a domain adaptation model is presented to simultaneously determine rewards and learn domain-invariant feature …
Multi-Lingual Multi-Partite Product Title Matching, Huan Lin Tay, Wei Jie Tay, Hady Wirawan Lauw
Multi-Lingual Multi-Partite Product Title Matching, Huan Lin Tay, Wei Jie Tay, Hady Wirawan Lauw
Research Collection School Of Computing and Information Systems
In a globalized marketplace, one could access products or services from almost anywhere. However, resolving which product in one language corresponds to another product in a different language remains an under-explored problem. We explore this from two perspectives. First, given two products of different languages, how to assess their similarity that could signal a potential match. Second, given products from various languages, how to arrive at a multi-partite clustering that respects cardinality constraints efficiently. We describe algorithms for each perspective and integrate them into a promising solution validated on real-world datasets.
Chronos: Time-Aware Zero-Shot Identification Of Libraries From Vulnerability Reports, Yunbo Lyu, Thanh Le Cong, Hong Jin Kang, Ratnadira Widyasari, Zhipeng Zhao, Xuan-Bach Dinh Le, Ming Li, David Lo
Chronos: Time-Aware Zero-Shot Identification Of Libraries From Vulnerability Reports, Yunbo Lyu, Thanh Le Cong, Hong Jin Kang, Ratnadira Widyasari, Zhipeng Zhao, Xuan-Bach Dinh Le, Ming Li, David Lo
Research Collection School Of Computing and Information Systems
Tools that alert developers about library vulnerabilities depend on accurate, up-to-date vulnerability databases which are maintained by security researchers. These databases record the libraries related to each vulnerability. However, the vulnerability reports may not explicitly list every library and human analysis is required to determine all the relevant libraries. Human analysis may be slow and expensive, which motivates the need for automated approaches. Researchers and practitioners have proposed to automatically identify libraries from vulnerability reports using extreme multi-label learning (XML). While state-of-the-art XML techniques showed promising performance, their experimental settings do not practically fit what happens in reality. Previous studies …
Generation-Based Code Review Automation: How Far Are We?, Xin Zhou, Kisub Kim, Bowen Xu, Donggyun Han, Junda He, David Lo
Generation-Based Code Review Automation: How Far Are We?, Xin Zhou, Kisub Kim, Bowen Xu, Donggyun Han, Junda He, David Lo
Research Collection School Of Computing and Information Systems
Code review is an effective software quality assurance activity; however, it is labor-intensive and time-consuming. Thus, a number of generation-based automatic code review (ACR) approaches have been proposed recently, which leverage deep learning techniques to automate various activities in the code review process (e.g., code revision generation and review comment generation).We find the previous works carry three main limitations. First, the ACR approaches have been shown to be beneficial in each work, but those methods are not comprehensively compared with each other to show their superiority over their peer ACR approaches. Second, general-purpose pre-trained models such as CodeT5 are proven …
What Do Users Ask In Open-Source Ai Repositories? An Empirical Study Of Github Issues, Zhou Yang, Chenyu Wang, Jieke Shi, Thong Hoang, Pavneet Singh Kochhar, Qinghua Lu, Zhenchang Xing, David Lo
What Do Users Ask In Open-Source Ai Repositories? An Empirical Study Of Github Issues, Zhou Yang, Chenyu Wang, Jieke Shi, Thong Hoang, Pavneet Singh Kochhar, Qinghua Lu, Zhenchang Xing, David Lo
Research Collection School Of Computing and Information Systems
Artificial Intelligence (AI) systems, which benefit from the availability of large-scale datasets and increasing computational power, have become effective solutions to various critical tasks, such as natural language understanding, speech recognition, and image processing. The advancement of these AI systems is inseparable from open-source software (OSS). Specifically, many benchmarks, implementations, and frameworks for constructing AI systems are made open source and accessible to the public, allowing researchers and practitioners to reproduce the reported results and broaden the application of AI systems. The development of AI systems follows a data-driven paradigm and is sensitive to hyperparameter settings and data separation. Developers …
Resale Hdb Price Prediction Considering Covid-19 Through Sentiment Analysis, Srinaath Anbu Durai, Zhaoxia Wang
Resale Hdb Price Prediction Considering Covid-19 Through Sentiment Analysis, Srinaath Anbu Durai, Zhaoxia Wang
Research Collection School Of Computing and Information Systems
Twitter sentiment has been used as a predictor to predict price values or trends in both the stock market and housing market. The pioneering works in this stream of research drew upon works in behavioural economics to show that sentiment or emotions impact economic decisions. Latest works in this stream focus on the algorithm used as opposed to the data used. A literature review of works in this stream through the lens of data used shows that there is a paucity of work that considers the impact of sentiments caused due to an external factor on either the stock or …
Colefunda: Explainable Silent Vulnerability Fix Identification, Jiayuan Zhou, Michael Pacheco, Jinfu Chen, Xing Hu, Xin Xia, David Lo, Ahmed E. Hassan
Colefunda: Explainable Silent Vulnerability Fix Identification, Jiayuan Zhou, Michael Pacheco, Jinfu Chen, Xing Hu, Xin Xia, David Lo, Ahmed E. Hassan
Research Collection School Of Computing and Information Systems
It is common practice for OSS users to leverage and monitor security advisories to discover newly disclosed OSS vulnerabilities and their corresponding patches for vulnerability remediation. It is common for vulnerability fixes to be publicly available one week earlier than their disclosure. This gap in time provides an opportunity for attackers to exploit the vulnerability. Hence, OSS users need to sense the fix as early as possible so that the vulnerability can be remediated before it is exploited. However, it is common for OSS to adopt a vulnerability disclosure policy which causes the majority of vulnerabilities to be fixed silently, …
Mando-Hgt: Heterogeneous Graph Transformers For Smart Contract Vulnerability Detection, Huu Hoang Nguyen, Nhat Minh Nguyen, Chunyao Xie, Zahra Ahmadi, Daniel Kudendo, Thanh-Nam Doan, Lingxiao Jiang
Mando-Hgt: Heterogeneous Graph Transformers For Smart Contract Vulnerability Detection, Huu Hoang Nguyen, Nhat Minh Nguyen, Chunyao Xie, Zahra Ahmadi, Daniel Kudendo, Thanh-Nam Doan, Lingxiao Jiang
Research Collection School Of Computing and Information Systems
Smart contracts in blockchains have been increasingly used for high-value business applications. It is essential to check smart contracts' reliability before and after deployment. Although various program analysis and deep learning techniques have been proposed to detect vulnerabilities in either Ethereum smart contract source code or bytecode, their detection accuracy and scalability are still limited. This paper presents a novel framework named MANDO-HGT for detecting smart contract vulnerabilities. Given Ethereum smart contracts, either in source code or bytecode form, and vulnerable or clean, MANDO-HGT custom-builds heterogeneous contract graphs (HCGs) to represent control-flow and/or function-call information of the code. It then …
Link Prediction On Latent Heterogeneous Graphs, Trung Kien Nguyen, Zemin Liu, Yuan Fang
Link Prediction On Latent Heterogeneous Graphs, Trung Kien Nguyen, Zemin Liu, Yuan Fang
Research Collection School Of Computing and Information Systems
On graph data, the multitude of node or edge types gives rise to heterogeneous information networks (HINs). To preserve the heterogeneous semantics on HINs, the rich node/edge types become a cornerstone of HIN representation learning. However, in real-world scenarios, type information is often noisy, missing or inaccessible. Assuming no type information is given, we define a so-called latent heterogeneous graph (LHG), which carries latent heterogeneous semantics as the node/edge types cannot be observed. In this paper, we study the challenging and unexplored problem of link prediction on an LHG. As existing approaches depend heavily on type-based information, they are suboptimal …
Niche: A Curated Dataset Of Engineered Machine Learning Projects In Python, Ratnadira Widyasari, Zhou Yang, Ferdian Thung, Sheng Qin Sim, Fiona Wee, Camellia Lok, Jack Phan, Haodi Qi, Constance Tan, David Lo, David Lo
Niche: A Curated Dataset Of Engineered Machine Learning Projects In Python, Ratnadira Widyasari, Zhou Yang, Ferdian Thung, Sheng Qin Sim, Fiona Wee, Camellia Lok, Jack Phan, Haodi Qi, Constance Tan, David Lo, David Lo
Research Collection School Of Computing and Information Systems
Machine learning (ML) has gained much attention and has been incorporated into our daily lives. While there are numerous publicly available ML projects on open source platforms such as GitHub, there have been limited attempts in filtering those projects to curate ML projects of high quality. The limited availability of such a high-quality dataset poses an obstacle to understanding ML projects. To help clear this obstacle, we present NICHE, a manually labelled dataset consisting of 572 ML projects. Based on the evidence of good software engineering practices, we label 441 of these projects as engineered and 131 as non-engineered. This …
Picaso: Enhancing Api Recommendations With Relevant Stack Overflow Posts, Ivana Clairine Irsan, Ting Zhang, Ferdian Thung, Kisub Kim, David Lo
Picaso: Enhancing Api Recommendations With Relevant Stack Overflow Posts, Ivana Clairine Irsan, Ting Zhang, Ferdian Thung, Kisub Kim, David Lo
Research Collection School Of Computing and Information Systems
While having options could be liberating, too many options could lead to the sub-optimal solution being chosen. This is not an exception in the software engineering domain. Nowadays, API has become imperative in making software developers' life easier. APIs help developers implement a function faster and more efficiently. However, given the large number of open-source libraries to choose from, choosing the right APIs is not a simple task. Previous studies on API recommendation leverage natural language (query) to identify which API would be suitable for the given task. However, these studies only consider one source of input, i.e., GitHub or …
Head And Neck Tumor Histopathological Image Representation With Pre- Trained Convolutional Neural Network And Vision Transformer, Ranny Rahaningrum Herdiantoputri, Daisuke Komura, Tohru Ikeda, Shumpei Ishikawa
Head And Neck Tumor Histopathological Image Representation With Pre- Trained Convolutional Neural Network And Vision Transformer, Ranny Rahaningrum Herdiantoputri, Daisuke Komura, Tohru Ikeda, Shumpei Ishikawa
Journal of Dentistry Indonesia
Image representation via machine learning is an approach to quantitatively represent histopathological images of head and neck tumors for future applications of artificial intelligence-assisted pathological diagnosis systems. Objective: This study compares image representations produced by a pre-trained convolutional neural network (VGG16) to those produced by a vision transformer (ViT-L/14) in terms of the classification performance of head and neck tumors. Methods: W hole-slide images of five oral t umor categories (n = 319 cases) were analyzed. Image patches were created from manually annotated regions at 4096, 2048, and 1024 pixels and rescaled to 256 pixels. Image representations were …
Arkavalley Liquor: Simplifying Restaurant Alcohol Orders, Isaiah A. Kitts, Dayton Drilling, Bradlee Treece, Cameron Lumpkin
Arkavalley Liquor: Simplifying Restaurant Alcohol Orders, Isaiah A. Kitts, Dayton Drilling, Bradlee Treece, Cameron Lumpkin
ATU Research Symposium
The ArkaValley Liquor system is a web-based ordering platform designed to simplify the process of ordering alcohol for local restaurants. Currently, restaurants place orders by emailing the store, which makes it difficult to maintain a paper trail and track order details. With the ArkaValley Liquor system, the ordering process is automated, and all order details are saved in one central location. Each restaurant will have a login, ensuring only authorized individuals can place orders. The system will also provide a record of each restaurant's most recent order, making it easy to reorder if necessary. By using the ArkaValley Liquor system, …
Premium Wireless, Dakota Burkhart, Andrew Clark, Garrett Kenney, Brandon Monroe
Premium Wireless, Dakota Burkhart, Andrew Clark, Garrett Kenney, Brandon Monroe
ATU Research Symposium
Our work implements an inventory system and appointment system for the Premium Wireless phone company. It includes separate views for employees to manage inventory and view appointments for the day and the near future and allows customers to view all current inventory and set an appointment.
A Study Of The Collection And Sharing Of Student Data With Virginia Universities, Titus Voell
A Study Of The Collection And Sharing Of Student Data With Virginia Universities, Titus Voell
Cybersecurity Undergraduate Research Showcase
Data collection is a vital component in any organization in regards to keeping track of user activity, gaining statistics and improving the user experience, and user identification. While the underlying basis of data collection is understandable, the use of this data has to be closely regulated and documented. In many cases, the VCDPA (Virginia Consumer Data Protection Act) outlines the guidelines for data use, data controller responsibilities, and limitations however nonprofit organizations are exempt from compliance. Colleges and universities, although still held to some degree of limitation, range in permissiveness with what data they choose to collect and retain but …
Web Repository Of Southern’S Research Projects, Rebecca Zaldivar, Siegwart Mayr
Web Repository Of Southern’S Research Projects, Rebecca Zaldivar, Siegwart Mayr
Campus Research Day
A research repository was created so that Southern Adventist University has a central place for all past, current, and future research projects. This repository is a web application created with the use of the Yii framework that utilizes PHP and SQL. The repository has a user-friendly interface to let authorized users upload the information about their projects. Also, professors and students from different departments can see the list of projects per department.
Creating Characters In A Game Based Learning System, Jaehyun Park, Siegwart Mayr
Creating Characters In A Game Based Learning System, Jaehyun Park, Siegwart Mayr
Campus Research Day
Gamification is the idea of adding video game elements into a non-gaming context, such as for educational or business purposes. Game-based learning takes that idea one step further by not only adding elements of video games, but turning the whole process into a game-like structure.
The Center for Innovation and Research in Computing (CIRC) is currently developing a game-based learning system that can be used in place of a traditional classroom setting. The focus of this research work is on the relationship between users and characters within a course in the Character Module. The Character Module encompasses everything to do …
Generating University Course Catalogs Via A Php Based Module, Chileleko Chileya, Siegwart Mayr
Generating University Course Catalogs Via A Php Based Module, Chileleko Chileya, Siegwart Mayr
Campus Research Day
Catalogs are a requirement at any university. The current academic system at Southern Adventist University entails creating catalogs for the school by hand. The current model is very outdated and time consuming especially considering the database of all related school records available. The solution is a module using the PHP based framework called Yii to construct a module that will be integrated into the Southern Adventist University website that will automatically generate formatted catalogs through the frontend of the website. The previous module uses Kuali to store academic data as well as provide an API for third-party applications but was …
A Study Of A Collaborative Task Management Application Built On React Native Using The Basic Ux Framework, Andrei Modiga
A Study Of A Collaborative Task Management Application Built On React Native Using The Basic Ux Framework, Andrei Modiga
Campus Research Day
Many times it can be difficult to accomplish all this is proposed in a meeting. This project aimed to build a simple planner application using React Native that allows groups of people to collaborate and stay organized. The application was built using the BASIC Framework as a guide, and featured a collaboration feature that enabled users to share tasks, projects, and communicate with one another in order to stay coordinated and productive. The user interface was designed for easy use, allowing for quick and efficient task management within a group. The goal of the application was to provide a useful …
Visualizing Literary Narratives With A Graph-Centered Approach., Meg Ermer
Visualizing Literary Narratives With A Graph-Centered Approach., Meg Ermer
Campus Research Day
The art of storytelling is multifaceted and nonlinear, involving multiple characters, themes, and symbols while often jumping between the present and past. While media forms such as novels can encapsulate these complexities, it is often difficult to visualize a narrative in an easy-to-understand format. Our contribution is a graph-based system to let users organize and visualize those narratives. Events and characters are represented as nodes and their relationships are represented as edges. Neo4J is used as a database management system to store the graph and to run queries on it, and Streamlit and Pyvis are used to represent the database …
Cie Text Analysis: Narrative Of The Life Of Frederick Douglass, The Declaration Of Independence, And The Declaration Of Sentiments, Arianna Knipe
Cie Text Analysis: Narrative Of The Life Of Frederick Douglass, The Declaration Of Independence, And The Declaration Of Sentiments, Arianna Knipe
Mathematics and Computer Science Presentations
Our STAT-451 class has worked with analyzing the words from CIE texts and assigning them to a sentiment or feeling and comparing them with one another using RStudio. This project analyzes texts from three sources: The Narrative of the Life of Frederick Douglass, The Declaration of Independence and the Declaration of Sentiments.
Essays On Cybersecurity And Information Privacy, Moez Hamedani Farokhnia
Essays On Cybersecurity And Information Privacy, Moez Hamedani Farokhnia
USF Tampa Graduate Theses and Dissertations
This dissertation research focuses on two key aspects of cybersecurity research. Security safeguard allocation, and AI-powered tools for anomaly detection. The first dissertation essay (Chapter 1) proposes a novel framework for the allocation of security countermeasures in the presence of uncertainty using robust optimization technique. The second dissertation essay (Chapter 2) studies the impact of algorithmic bias on the practice of insider threat detection in Electronic Health Record Systems and proposes a mitigations strategy. The final dissertation essay (Chapter 3) investigates how the biases of anomaly detection algorithms, and the characteristics of ensemble methods relate to the ensembles’ accuracy and …
Morphologically-Aware Vocabulary Reduction Of Word Embeddings, Chong Cher Chia, Maksim Tkachenko, Hady Wirawan Lauw
Morphologically-Aware Vocabulary Reduction Of Word Embeddings, Chong Cher Chia, Maksim Tkachenko, Hady Wirawan Lauw
Research Collection School Of Computing and Information Systems
We propose SubText, a compression mechanism via vocabulary reduction. The crux is to judiciously select a subset of word embeddings which support the reconstruction of the remaining word embeddings based on their form alone. The proposed algorithm considers the preservation of the original embeddings, as well as a word’s relationship to other words that are morphologically or semantically similar. Comprehensive evaluation of the compressed vocabulary reveals SubText’s efficacy on diverse tasks over traditional vocabulary reduction techniques, as validated on English, as well as a collection of inflected languages.
Dsdnet: Toward Single Image Deraining With Self-Paced Curricular Dual Stimulations, Yong Du, Junjie Deng, Yulong Zheng, Junyu Dong, Shengfeng He
Dsdnet: Toward Single Image Deraining With Self-Paced Curricular Dual Stimulations, Yong Du, Junjie Deng, Yulong Zheng, Junyu Dong, Shengfeng He
Research Collection School Of Computing and Information Systems
A crucial challenge regarding the single image deraining task is to completely remove rain streaks while still preserving explicit image details. Due to the inherent overlapping between rain streaks and background scenes, the texture details could be inevitably lost when clearing rain away from the degraded image, making the two purposes contradictory. Existing deep learning based approaches endeavor to resolve the two issues successively in a cascaded framework or to treat them as independent tasks in a parallel structure. However, none of the models explores a proper interaction between rain distributions and hidden feature responses, which intuitively would provide more …