Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Singapore Management University (2960)
- Wright State University (632)
- Walden University (447)
- Selected Works (287)
- New Jersey Institute of Technology (137)
-
- University of Nebraska at Omaha (119)
- California State University, San Bernardino (96)
- Old Dominion University (95)
- San Jose State University (85)
- University of Dayton (82)
- The University of Maine (67)
- City University of New York (CUNY) (65)
- University of Nebraska - Lincoln (54)
- Air Force Institute of Technology (53)
- SelectedWorks (53)
- Technological University Dublin (51)
- University of South Florida (50)
- Kennesaw State University (46)
- Nova Southeastern University (43)
- Claremont Colleges (42)
- University of Wisconsin Milwaukee (42)
- University of Arkansas, Fayetteville (41)
- Western Kentucky University (41)
- Dakota State University (39)
- Institute of Business Administration (38)
- California Polytechnic State University, San Luis Obispo (36)
- Western University (35)
- Ateneo de Manila University (34)
- Governors State University (34)
- Purdue University (34)
- Keyword
-
- Machine learning (100)
- Information technology (93)
- Data mining (89)
- Social media (78)
- Twitter (64)
-
- Machine Learning (57)
- Cybersecurity (54)
- Semantic Web (54)
- Deep learning (52)
- Artificial intelligence (49)
- Online learning (49)
- Information Technology (47)
- Classification (46)
- Cloud computing (45)
- Information retrieval (45)
- Privacy (45)
- Big data (44)
- Database (43)
- Ontology (43)
- Computer science (42)
- Information security (41)
- Algorithms (40)
- Security (40)
- Databases (39)
- Information systems (39)
- Management (37)
- Clustering (36)
- Data Mining (36)
- Northern Ohio Data and Information Service (NODIS) (36)
- Technology (35)
- Publication Year
- Publication
-
- Research Collection School Of Computing and Information Systems (2866)
- Kno.e.sis Publications (541)
- Walden Dissertations and Doctoral Studies (447)
- Theses and Dissertations (116)
- Dissertations (107)
-
- Computer Science Faculty Publications (91)
- Computer Science and Engineering Faculty Publications (91)
- Theses Digitization Project (84)
- Master's Projects (68)
- Information Systems and Quantitative Analysis Faculty Proceedings & Presentations (64)
- Electronic Theses and Dissertations (55)
- Dissertations and Theses Collection (Open Access) (50)
- Theses (46)
- USF Tampa Graduate Theses and Dissertations (46)
- CCE Theses and Dissertations (42)
- Information Systems and Quantitative Analysis Faculty Publications (41)
- Kyriakos MOURATIDIS (40)
- CGU Faculty Publications and Research (37)
- International Conference on Information and Communication Technologies (36)
- Open Educational Resources (34)
- Department of Information Systems & Computer Science Faculty Publications (33)
- All Capstone Projects (32)
- Graduate Theses and Dissertations (32)
- Masters Theses & Doctoral Dissertations (32)
- Articles (29)
- Conference papers (28)
- David LO (28)
- Journal of Spatial Information Science (28)
- All Maxine Goodman Levin School of Urban Affairs Publications (27)
- Saverio Perugini (25)
- Publication Type
Articles 541 - 570 of 6718
Full-Text Articles in Physical Sciences and Mathematics
Malware Detection And Analysis, Namratha Suraneni
Malware Detection And Analysis, Namratha Suraneni
Culminating Experience Projects
Malicious software poses a serious threat to the cybersecurity of network infrastructures and is a global pandemic in the form of computer viruses, Trojan horses, and Internet worms. Studies imply that the effects of malware are deteriorating. The main defense against malware is malware detectors. The methods that such a detector employ define its level of quality. Therefore, it is crucial that we research malware detection methods and comprehend their advantages and disadvantages. Attackers are creating malware that is polymorphic and metamorphic and has the capacity to modify their source code as they spread. Furthermore, existing defenses, which often utilize …
Notebooks Web Application, Vivekananda Marellali
Notebooks Web Application, Vivekananda Marellali
Culminating Experience Projects
In our day-to-day activities we often need to make quick short notes related to our work, study, or other activities. Later, those notes should be easy to access, modify, delete, share with others, or create PDF documents as and when required. It is ideal if the note content is rich text format such as HTML, as it provides many text formatting options and provide better view and readability. The Notes are better organized if they are grouped into notebooks where each notebook consists of related topic note pages and multiple users can create such notebooks and share with other users …
Big Data Analytics Of Medical Data, Ashwin Rajasankar
Big Data Analytics Of Medical Data, Ashwin Rajasankar
Culminating Experience Projects
Data has become a huge part of modern decision making. With the improvements in computing performance and storage in the past two decades, storing large amounts of data has become much easier. Analyzing large amounts of data and creating data models with them can help organizations obtain insights and information which helps their decision making. Big data analytics has become an integral part of many fields such as retail, real estate, education, and medicine. In the project, the goal is to understand the working of Apache Spark and its different storage methods and create a data warehouse to analyze data. …
College Job Portal, Harikrishna Gonuguntla
College Job Portal, Harikrishna Gonuguntla
Culminating Experience Projects
Through this project, I am producing a portal called "College Job Portal" that will make life easier for students, colleges, and the companies who hire the students by handling the hiring process. On-campus job placements are a crucial component in contemporary educational institutions. By entering information about their educational history, grades, technological abilities, and CV, students would register with the portal. Like students, companies would sign up with the site by supplying basic details like their address and contact information for human resources. The college would be the portal's administrator. Companies can advertise job openings using this site by including …
Full-Text Search Using Elasticsearch, Akash Shrestha
Full-Text Search Using Elasticsearch, Akash Shrestha
Culminating Experience Projects
Search engines have changed the way we use the internet. They can search or filter out relevant and valuable content of interest to the users. But many of the applications we use today lack search or are just poor. So how can we leverage the same power of search engines in our applications? This project aims to look at “Full-Text Search” which allows us to do a text-based search in text-intensive data. The search will be performed by matching any, or all words of the query exactly or with some relevancy against the indexes created by the searching tool. The …
Curriculum Development In Technical Education For Boys And Girls Club, Damanpreet Singh
Curriculum Development In Technical Education For Boys And Girls Club, Damanpreet Singh
Culminating Experience Projects
Technical education has been and will continue to be more and more important to succeed in the future. The Boys and Girls Club, founded in 1860, is a national organization of local chapters which provide voluntary after-school programs for young individuals. The Boys and Girls Club have life-changing programs that prepare the young individuals in the club for their future whether it’s for college, career, or life. The perfect way to prepare best prepare these kids for the future is to develop their technical education. Unfortunately, the boys and girls club of Muskegon has a lack of educational resources for …
Devops: Course Development, James Lee Vanderzouwen
Devops: Course Development, James Lee Vanderzouwen
Culminating Experience Projects
DevOps has become somewhat of a buzzword amongst software engineers in the industry. Often developers do not have a dedicated DevOps engineer let alone a DevOps team. Developers benefit when they know what happens between ‘works on my machine’ and production. Making sure those steps make sense and are safe benefits the operations team. From compliance to code review to regression testing, understanding the full SDLC, employing DevOps concepts, and minimizing overhead from dependencies is quickly becoming a pre-requisite for the modern software engineer. This project attempts to bridge the gap between buzzword and best practice by developing a college-level …
Building A Deep Model For Multi-Class Coral Species Discrimination, Hyeong Gyu Jang
Building A Deep Model For Multi-Class Coral Species Discrimination, Hyeong Gyu Jang
Culminating Experience Projects
The goal of this qualitative research project is to develop and optimize a multi-class discrimination model to identify different species of coral based on their digital images. Currently, there are artificial intelligence (AI) models that can distinguish between coral and other undersea objects such as sand or rocks, but to our knowledge the problem of multi-species classification has not yet been addressed. Given that coral reefs are a good indicator of overall ocean health, it is important to develop models that can classify the presence of different species in underwater images as a way to monitor the effects of climate …
Covid-19 Prediction Using Machine Learning, Parashuram Singaraveni
Covid-19 Prediction Using Machine Learning, Parashuram Singaraveni
Culminating Experience Projects
All around the globe, humankind faces a disastrous situation that witnessed COVID-19 outbreak. The COVID-19 pandemic caused severe loss of human life across the world. Most of the countries had been socially and economically weakened. The health sector faced lots of challenges in diagnosing the COVID patients, vaccinating the people, identifying the people who are infected by the virus. At the earlier stage, it has been difficult to identify the symptoms in infected person that is caused by the virus. Months later, symptoms were identified and, disease detecting machines were invented. But still, time taking for the results from the …
Exploring Coral Reefs With Interactive Geospatial Visualizations, David Nicolas Tonning
Exploring Coral Reefs With Interactive Geospatial Visualizations, David Nicolas Tonning
Culminating Experience Projects
This project uses geospatial data to generate custom polygons in an interactive setting to represent the size and location of coral reefs to extract insights from coral reef-centered data sets. Historically, the data used by the Reef Restoration Group Bonaire exists in disparate sources, making it difficult to track and analyze the outcomes of their restoration work. Additionally, this information is not available in a digestible format for other audiences who would be interested in this data, such as citizen scientists seeking coral reef health statistics, the general public wanting to better understand the coral reefs surrounding Bonaire or recreational …
Docker Container Image – Vulnerability Scanning, Joseph U. Ohaeche
Docker Container Image – Vulnerability Scanning, Joseph U. Ohaeche
Culminating Experience Projects
The technology landscape for container adoption has greatly evolved over the years from the first known Unix U7 container concept introduced in 1979 to the most utilized docker container concept which emerged in 2013. Docker container image is essentially a lightweight, standalone executable software package with capabilities to run an application. It is important to know that container images become containers when deployed, and simultaneously docker container images become docker containers when deployed on Docker Engine. This project paper aims, evaluates, and presents a methodology useful in vulnerability scanning of docker container images and suggests possible fixes based on OWASP …
Muse: A Genetic Algorithm For Musical Chord Progression Generation, Griffin Going
Muse: A Genetic Algorithm For Musical Chord Progression Generation, Griffin Going
Culminating Experience Projects
Foundational to our understanding and enjoyment of music is the intersection of harmony and movement. This intersection manifests as chord progressions which themselves underscore the rhythm and melody of a piece. In musical compositions, these progressions often follow a set of rules and patterns which are themselves frequently broken for the sake of novelty. In this work, we developed a genetic algorithm which learns these rules and patterns (and how to break them) from a dataset of 890 songs from various periods of the Billboard Top 100 rankings. The algorithm learned to generate increasingly valid, yet interesting chord progressions via …
Lawrence County Archives Website, Brianna Hawkins, Areeb Mohammed, David Niederweis, Mary-Kate Rynders
Lawrence County Archives Website, Brianna Hawkins, Areeb Mohammed, David Niederweis, Mary-Kate Rynders
Honors Capstone Projects and Theses
No abstract provided.
A Maturity Model Of Data Modeling In Self-Service Business Intelligence Software, Anna Kurenkov
A Maturity Model Of Data Modeling In Self-Service Business Intelligence Software, Anna Kurenkov
Master of Science in Information Technology Theses
Although Self-Service Business Intelligence (SSBI) is continually being adopted in various industries, there is a lack of research focused on data modeling in SSBI. This research aims to fill that research gap and propose a maturity model for SSBI data modeling which is generalizeable between different software and applicable for users of all technical backgrounds. Through extensive literature review, a five-tier maturity model was proposed, explained, and instantiated in PowerBI and Tableau. The testing of the model was found to be simple and intuitive, and the research concludes that the model is applicable to enterprise SSBI environments. This research is …
Software Supply Chain Security Attacks And Analysis Of Defense, Juanjose Rodriguez-Cardenas, Jobair Hossain Faruk, Masura Tansim, Asia Shavers, Corey Brookins, Shamar Lake, Ava Norouzi, Marie Nassif, Kenneth Burke, Miranda Dominguez
Software Supply Chain Security Attacks And Analysis Of Defense, Juanjose Rodriguez-Cardenas, Jobair Hossain Faruk, Masura Tansim, Asia Shavers, Corey Brookins, Shamar Lake, Ava Norouzi, Marie Nassif, Kenneth Burke, Miranda Dominguez
Symposium of Student Scholars
The Software Supply chain or SSC is the backbone of the logistics industry and is crucial to a business's success and operation. The surge of attacks and risks for the SSC has grown in coming years with each attack's impact becoming more significant. These attacks have led to the leaking of both client and company sensitive information, corruption of the data, and having it subject to malware and ransomware installation, despite new practices implemented and investments into SSC security and its branches that have not stopped attackers from developing new vulnerabilities and exploits. In our research, we have investigated Software …
Secure Cloud-Based Iot Water Quality Gathering For Analysis And Visualization, Soin Abdoul Kassif Baba M Traore
Secure Cloud-Based Iot Water Quality Gathering For Analysis And Visualization, Soin Abdoul Kassif Baba M Traore
Symposium of Student Scholars
Water quality refers to measurable water characteristics, including chemical, biological, physical, and radiological characteristics usually relative to human needs. Dumping waste and untreated sewage are the reasons for water pollution and several diseases to the living hood. The quality of water can also have a significant impact on animals and plant ecosystems. Therefore, keeping track of water quality is a substantial national interest. Much research has been done for measuring water quality using sensors to prevent water pollution. In summary, those systems are built based on online and reagent-free water monitoring SCADA systems in wired networks. However, centralized servers, transmission …
Text And Image Frames Affect Message's Sharing And Acceptance Of Social Media Users, Xin Sa
Text And Image Frames Affect Message's Sharing And Acceptance Of Social Media Users, Xin Sa
ETD Archive
No abstract provided.
R2f: A General Retrieval, Reading And Fusion Framework For Document-Level Natural Language Inference, Hao Wang, Yixin Cao, Yangguang Li, Zhen Huang, Kun Wang, Jing Shao
R2f: A General Retrieval, Reading And Fusion Framework For Document-Level Natural Language Inference, Hao Wang, Yixin Cao, Yangguang Li, Zhen Huang, Kun Wang, Jing Shao
Research Collection School Of Computing and Information Systems
Document-level natural language inference (DocNLI) is a new challenging task in natural language processing, aiming at judging the entailment relationship between a pair of hypothesis and premise documents. Current datasets and baselines largely follow sentence-level settings, but fail to address the issues raised by longer documents. In this paper, we establish a general solution, named Retrieval, Reading and Fusion (R2F) framework, and a new setting, by analyzing the main challenges of DocNLI: interpretability, long-range dependency, and cross-sentence inference. The basic idea of the framework is to simplify document-level task into a set of sentence-level tasks, and improve both performance and …
Using Landsat Satellite Imagery To Estimate Groundcover In The Grainbelt Of Western Australia, Justin Laycock, Nick Middleton, Karen Holmes
Using Landsat Satellite Imagery To Estimate Groundcover In The Grainbelt Of Western Australia, Justin Laycock, Nick Middleton, Karen Holmes
Resource management technical reports
Maintaining vegetative groundcover is an important component of sustainable agricultural systems and plays a critical function for soil and land conservation in Western Australia’s (WA) grainbelt (the south-west cropping region). This report describes how satellite imagery can be used to quantitatively and objectively estimate total vegetative groundcover, both in near real time and historically across large areas. We used the Landsat seasonal fractional groundcover products developed by the Joint Remote Sensing Research Program from the extensive archive of Landsat imagery. These products provide an estimate of the percentage of green vegetation, non-green vegetation and bare soil for each 30 m …
Cold Calls To Enhance Class Participation And Student Engagement, Manoj Thulasidas, Aldy Gunawan
Cold Calls To Enhance Class Participation And Student Engagement, Manoj Thulasidas, Aldy Gunawan
Research Collection School Of Computing and Information Systems
The question whether cold calls increase student engagement in the classroom has not been conclusively answered in the literature. This study describes the automated system to implement unbiased, randomized cold calling by posing a question, allowing all students to think first and then calling on a particular student to respond. Since we already have a measure of the level of student engagement as the self-reported classparticipation entries from the students, its correlation to cold calling is also further studied. The results show that there is a statistically significant increase in the class participation reported, and therefore in student engagement, in …
Conversation Disentanglement With Bi-Level Contrastive Learning, Chengyu Huang, Zheng Zhang, Hao Fei, Lizi Liao
Conversation Disentanglement With Bi-Level Contrastive Learning, Chengyu Huang, Zheng Zhang, Hao Fei, Lizi Liao
Research Collection School Of Computing and Information Systems
Conversation disentanglement aims to group utterances into detached sessions, which is a fundamental task in processing multi-party conversations. Existing methods have two main drawbacks. First, they overemphasize pairwise utterance relations but pay inadequate attention to the utterance-to-context relation modeling. Second, a huge amount of human annotated data is required for training, which is expensive to obtain in practice. To address these issues, we propose a general disentangle model based on bi-level contrastive learning. It brings closer utterances in the same session while encourages each utterance to be near its clustered session prototypes in the representation space. Unlike existing approaches, our …
Gamified Online Industry Learning Platform For Teaching Of Foundational Computing Skills, Yi Meng Lau, Rafael Jose Barros Barrios, Gottipati Swapna, Kyong Jin Shim
Gamified Online Industry Learning Platform For Teaching Of Foundational Computing Skills, Yi Meng Lau, Rafael Jose Barros Barrios, Gottipati Swapna, Kyong Jin Shim
Research Collection School Of Computing and Information Systems
Online industry learning platforms are widely used by organizations for employee training and upskilling. Courses or lessons offered by these platforms can be generic or specific to an enterprise application. The increased demand of new hires to learn these platforms or who are already certified in some of these courses has led universities to look at the opportunities for integrating online industry learning platforms into their curricula. Universities hope to use these platforms to aid students in their learning of concepts and theories. At the same time, these platforms can equip students with industryrecognized certifications or digital badges. This paper …
S-Prompts Learning With Pre-Trained Transformers: An Occam's Razor For Domain Incremental Learning, Yabin Wang, Zhiwu Huang, Xiaopeng. Hong
S-Prompts Learning With Pre-Trained Transformers: An Occam's Razor For Domain Incremental Learning, Yabin Wang, Zhiwu Huang, Xiaopeng. Hong
Research Collection School Of Computing and Information Systems
State-of-the-art deep neural networks are still struggling to address the catastrophic forgetting problem in continual learning. In this paper, we propose one simple paradigm (named as S-Prompting) and two concrete approaches to highly reduce the forgetting degree in one of the most typical continual learning scenarios, i.e., domain increment learning (DIL). The key idea of the paradigm is to learn prompts independently across domains with pre-trained transformers, avoiding the use of exemplars that commonly appear in conventional methods. This results in a win-win game where the prompting can achieve the best for each domain. The independent prompting across domains only …
Deep Just-In-Time Defect Localization, Fangcheng Qiu, Zhipeng Gao, Xin Xia, David Lo, John Grundy, Xinyu Wang
Deep Just-In-Time Defect Localization, Fangcheng Qiu, Zhipeng Gao, Xin Xia, David Lo, John Grundy, Xinyu Wang
Research Collection School Of Computing and Information Systems
During software development and maintenance, defect localization is an essential part of software quality assurance. Even though different techniques have been proposed for defect localization, i.e., information retrieval (IR)-based techniques and spectrum-based techniques, they can only work after the defect has been exposed, which can be too late and costly to adapt to the newly introduced bugs in the daily development. There are also many JIT defect prediction tools that have been proposed to predict the buggy commit. But these tools do not locate the suspicious buggy positions in the buggy commit. To assist developers to detect bugs in time …
Prompting For Multimodal Hateful Meme Classification, Rui Cao, Roy Ka-Wei Lee, Wen-Haw Chong, Jing Jiang
Prompting For Multimodal Hateful Meme Classification, Rui Cao, Roy Ka-Wei Lee, Wen-Haw Chong, Jing Jiang
Research Collection School Of Computing and Information Systems
Hateful meme classification is a challenging multimodal task that requires complex reasoning and contextual background knowledge. Ideally, we could leverage an explicit external knowledge base to supplement contextual and cultural information in hateful memes. However, there is no known explicit external knowledge base that could provide such hate speech contextual information. To address this gap, we propose PromptHate, a simple yet effective prompt-based model that prompts pre-trained language models (PLMs) for hateful meme classification. Specifically, we construct simple prompts and provide a few in-context examples to exploit the implicit knowledge in the pretrained RoBERTa language model for hateful meme classification. …
Dialogconv: A Lightweight Fully Convolutional Network For Multi-View Response Selection, Yongkang Liu, Shi Feng, Wei Gao, Daling Wang, Yifei Zhang
Dialogconv: A Lightweight Fully Convolutional Network For Multi-View Response Selection, Yongkang Liu, Shi Feng, Wei Gao, Daling Wang, Yifei Zhang
Research Collection School Of Computing and Information Systems
Current end-to-end retrieval-based dialogue systems are mainly based on Recurrent Neural Networks or Transformers with attention mechanisms. Although promising results have been achieved, these models often suffer from slow inference or huge number of parameters. In this paper, we propose a novel lightweight fully convolutional architecture, called DialogConv, for response selection. DialogConv is exclusively built on top of convolution to extract matching features of context and response. Dialogues are modeled in 3D views, where DialogConv performs convolution operations on embedding view, word view and utterance view to capture richer semantic information from multiple contextual views. On the four benchmark datasets, …
A Recommendation On How To Teach K-Means In Introductory Analytics Courses, Manoj Thulasidas
A Recommendation On How To Teach K-Means In Introductory Analytics Courses, Manoj Thulasidas
Research Collection School Of Computing and Information Systems
We teach K-Means clustering in introductory data analytics courses because it is one of the simplest and most widely used unsupervised machine learning algorithms. However, one drawback of this algorithm is that it does not offer a clear method to determine the appropriate number of clusters; it does not have a built-in mechanism for K selection. What is usually taught as the solution for the K Selection problem is the so-called elbow method, where we look at the incremental changes in some quality metric (usually, the sum of squared errors, SSE), trying to find a sudden change. In addition to …
Bank Error In Whose Favor? A Case Study Of Decentralized Finance Misgovernance, Ping Fan Ke, Ka Chung Boris Ng
Bank Error In Whose Favor? A Case Study Of Decentralized Finance Misgovernance, Ping Fan Ke, Ka Chung Boris Ng
Research Collection School Of Computing and Information Systems
Decentralized Finance (DeFi) emerged rapidly in recent years and provided open and transparent financial services to the public. Due to its popularity, it is not uncommon to see cybersecurity incidents in the DeFi landscape, yet the impact of such incidents is under-studied. In this paper, we examine two incidents in DeFi protocol that are mainly caused by misgovernance and mistake in the smart contract. By using the synthetic control method, we found that the incident in Alchemix did not have a significant effect on the total value locked (TVL) in the protocol, whereas the incident in Compound caused a 6.13% …
Curiosity-Driven And Victim-Aware Adversarial Policies, Chen Gong, Zhou Yang, Yunpeng Bai, Jieke Shi, Arunesh Sinha, Bowen Xu, David Lo, Xinwen Hou, Guoliang Fan
Curiosity-Driven And Victim-Aware Adversarial Policies, Chen Gong, Zhou Yang, Yunpeng Bai, Jieke Shi, Arunesh Sinha, Bowen Xu, David Lo, Xinwen Hou, Guoliang Fan
Research Collection School Of Computing and Information Systems
Recent years have witnessed great potential in applying Deep Reinforcement Learning (DRL) in various challenging applications, such as autonomous driving, nuclear fusion control, complex game playing, etc. However, recently researchers have revealed that deep reinforcement learning models are vulnerable to adversarial attacks: malicious attackers can train adversarial policies to tamper with the observations of a well-trained victim agent, the latter of which fails dramatically when faced with such an attack. Understanding and improving the adversarial robustness of deep reinforcement learning is of great importance in enhancing the quality and reliability of a wide range of DRL-enabled systems. In this paper, …
A Unified Dialogue User Simulator For Few-Shot Data Augmentation, Dazhen Wan, Zheng Zhang, Qi Zhu, Lizi Liao, Minlie Huang
A Unified Dialogue User Simulator For Few-Shot Data Augmentation, Dazhen Wan, Zheng Zhang, Qi Zhu, Lizi Liao, Minlie Huang
Research Collection School Of Computing and Information Systems
Pre-trained language models have shown superior performance in task-oriented dialogues. However, existing datasets are on limited scales, which cannot support large-scale pre-training. Fortunately, various data augmentation methods have been developed to augment largescale task-oriented dialogue corpora. However, they heavily rely on annotated data in the target domain, which require a tremendous amount of data collection and human labeling work. In this paper, we build a unified dialogue user simulation model by pre-training on several publicly available datasets. The model can then be tuned on a target domain with fewshot data. The experiments on a target dataset across multiple domains show …