Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Singapore Management University

Discipline
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 2041 - 2070 of 7454

Full-Text Articles in Physical Sciences and Mathematics

Nearest Centroid: A Bridge Between Statistics And Machine Learning, Manoj Thulasidas Dec 2020

Nearest Centroid: A Bridge Between Statistics And Machine Learning, Manoj Thulasidas

Research Collection School Of Computing and Information Systems

In order to guide our students of machine learning in their statistical thinking, we need conceptually simple and mathematically defensible algorithms. In this paper, we present the Nearest Centroid algorithm (NC) algorithm as a pedagogical tool, combining the key concepts behind two foundational algorithms: K-Means clustering and K Nearest Neighbors (k- NN). In NC, we use the centroid (as defined in the K-Means algorithm) of the observations belonging to each class in our training data set and its distance from a new observation (similar to k-NN) for class prediction. Using this obvious extension, we will illustrate how the concepts of …


Secure And Verifiable Inference In Deep Neural Networks, Guowen Xu, Hongwei Li, Hao Ren, Jianfei Sun, Shengmin Xu, Jianting Ning, Haoming Yang, Kan Yang, Robert H. Deng Dec 2020

Secure And Verifiable Inference In Deep Neural Networks, Guowen Xu, Hongwei Li, Hao Ren, Jianfei Sun, Shengmin Xu, Jianting Ning, Haoming Yang, Kan Yang, Robert H. Deng

Research Collection School Of Computing and Information Systems

Outsourced inference service has enormously promoted the popularity of deep learning, and helped users to customize a range of personalized applications. However, it also entails a variety of security and privacy issues brought by untrusted service providers. Particularly, a malicious adversary may violate user privacy during the inference process, or worse, return incorrect results to the client through compromising the integrity of the outsourced model. To address these problems, we propose SecureDL to protect the model’s integrity and user’s privacy in Deep Neural Networks (DNNs) inference process. In SecureDL, we first transform complicated non-linear activation functions of DNNs to low-degree …


Audee: Automated Testing For Deep Learning Frameworks, Qianyu Guo, Xiaofei Xie, Yi Li, Xiaoyu Zhang, Yang Liu, Xiaohong Li, Chao Shen Dec 2020

Audee: Automated Testing For Deep Learning Frameworks, Qianyu Guo, Xiaofei Xie, Yi Li, Xiaoyu Zhang, Yang Liu, Xiaohong Li, Chao Shen

Research Collection School Of Computing and Information Systems

Deep learning (DL) has been applied widely, and the quality of DL system becomes crucial, especially for safety-critical applications. Existing work mainly focuses on the quality analysis of DL models, but lacks attention to the underlying frameworks on which all DL models depend. In this work, we propose Audee, a novel approach for testing DL frameworks and localizing bugs. Audee adopts a search-based approach and implements three different mutation strategies to generate diverse test cases by exploring combinations of model structures, parameters, weights and inputs. Audee is able to detect three types of bugs: logical bugs, crashes and Not-a-Number (NaN) …


Sadt: Syntax-Aware Differential Testing Of Certificate Validation In Ssl/Tls Implementations, Lili Quan, Qianyu Guo, Hongxu Chen, Xiaofei Xie, Xiaohong Li, Yang Liu, Jing Hu Dec 2020

Sadt: Syntax-Aware Differential Testing Of Certificate Validation In Ssl/Tls Implementations, Lili Quan, Qianyu Guo, Hongxu Chen, Xiaofei Xie, Xiaohong Li, Yang Liu, Jing Hu

Research Collection School Of Computing and Information Systems

The security assurance of SSL/TLS critically depends on the correct validation of X.509 certificates. Therefore, it is important to check whether a certificate is correctly validated by the SSL/TLS implementations. Although differential testing has been proven to be effective in finding semantic bugs, it still suffers from the following limitations: (1) The syntax of test cases cannot be correctly guaranteed. (2) Current test cases are not diverse enough to cover more implementation behaviours. This paper tackles these problems by introducing SADT, a novel syntax-aware differential testing framework for evaluating the certificate validation process in SSL/TLS implementations. We first propose a …


Adelaidecyc At Semeval-2020 Task 12: Ensemble Of Classifiers For Offensive Language Detection In Social Media, Mahen Herath, Thushari Atapattu, Hoang Anh Dung, Christoph Treude, Katrina Falkner Dec 2020

Adelaidecyc At Semeval-2020 Task 12: Ensemble Of Classifiers For Offensive Language Detection In Social Media, Mahen Herath, Thushari Atapattu, Hoang Anh Dung, Christoph Treude, Katrina Falkner

Research Collection School Of Computing and Information Systems

This paper describes the systems our team (AdelaideCyC) has developed for SemEval Task 12 (OffensEval 2020) to detect offensive language in social media. The challenge focuses on three subtasks – offensive language identification (subtask A), offense type identification (subtask B), and offense target identification (subtask C). Our team has participated in all the three subtasks. We have developed machine learning and deep learning-based ensembles of models. We have achieved F1-scores of 0.906, 0.552, and 0.623 in subtask A, B, and C respectively. While our performance scores are promising for subtask A, the results demonstrate that subtask B and C still …


Walls Have Ears: Eavesdropping User Behaviors Via Graphics-Interrupt-Based Side Channel, Haoyu Ma, Jianwen Tian, Debin Gao, Jia Chunfu Dec 2020

Walls Have Ears: Eavesdropping User Behaviors Via Graphics-Interrupt-Based Side Channel, Haoyu Ma, Jianwen Tian, Debin Gao, Jia Chunfu

Research Collection School Of Computing and Information Systems

Graphics Processing Units (GPUs) are now playing a vital role in many devices and systems including computing devices, data centers, and clouds, making them the next target of side-channel attacks. Unlike those targeting CPUs, existing side-channel attacks on GPUs exploited vulnerabilities exposed by application interfaces like OpenGL and CUDA, which can be easily mitigated with software patches. In this paper, we investigate the lower-level and native interface between GPUs and CPUs, i.e., the graphics interrupts, and evaluate the side channel they expose. Being an intrinsic profile in the communication between a GPU and a CPU, the pattern of graphics interrupts …


Secure Answer Book And Automatic Grading, Manoj Thulasidas Dec 2020

Secure Answer Book And Automatic Grading, Manoj Thulasidas

Research Collection School Of Computing and Information Systems

In response to the growing need to perform assessments online, we have developed a secure answer book, as well as a tool for automatically grading it for our course on spread- sheet modeling. We applied these techniques to a cohort of about 160 students who took the course last term. In this paper, we describe the design, implementation and the techniques employed to enhance both the security of the answer book and the ease, accuracy and consistency of grading. In addition, we summarize the experience and takeaways, both from the instructor and the student perspectives. Although the answer book and …


Jointly Optimizing Sensing Pipelines For Multimodal Mixed Reality Interaction, Ramesh Darshana Rathnayake Kanatta Gamage, Ashen De Silva, Dasun Puwakdandawa, Lakmal Meegahapola, Archan Misra, Indika Perera Dec 2020

Jointly Optimizing Sensing Pipelines For Multimodal Mixed Reality Interaction, Ramesh Darshana Rathnayake Kanatta Gamage, Ashen De Silva, Dasun Puwakdandawa, Lakmal Meegahapola, Archan Misra, Indika Perera

Research Collection School Of Computing and Information Systems

Natural human interactions for Mixed Reality Applications are overwhelmingly multimodal: humans communicate intent and instructions via a combination of visual, aural and gestural cues. However, supporting low-latency and accurate comprehension of such multimodal instructions (MMI), on resource-constrained wearable devices, remains an open challenge, especially as the state-of-the-art comprehension techniques for each individual modality increasingly utilize complex Deep Neural Network models. We demonstrate the possibility of overcoming the core limitation of latency–vs.–accuracy tradeoff by exploiting cross-modal dependencies–i.e., by compensating for the inferior performance of one model with an increased accuracy of more complex model of a different modality. We present a …


Deep Multi-Task Learning For Depression Detection And Prediction In Longitudinal Data, Guansong Pang, Ngoc Thien Anh Pham, Emma Baker, Rebecca Bentley, Anton Van Den Hengel Dec 2020

Deep Multi-Task Learning For Depression Detection And Prediction In Longitudinal Data, Guansong Pang, Ngoc Thien Anh Pham, Emma Baker, Rebecca Bentley, Anton Van Den Hengel

Research Collection School Of Computing and Information Systems

Depression is among the most prevalent mental disorders, affecting millions of people of all ages globally. Machine learning techniques have shown effective in enabling automated detection and prediction of depression for early intervention and treatment. However, they are challenged by the relative scarcity of instances of depression in the data. In this work we introduce a novel deep multi-task recurrent neural network to tackle this challenge, in which depression classification is jointly optimized with two auxiliary tasks, namely one-class metric learning and anomaly ranking. The auxiliary tasks introduce an inductive bias that improves the classification model's generalizability on small depression …


Heterogeneous Univariate Outlier Ensembles In Multidimensional Data, Guansong Pang, Longbing Cao Dec 2020

Heterogeneous Univariate Outlier Ensembles In Multidimensional Data, Guansong Pang, Longbing Cao

Research Collection School Of Computing and Information Systems

In outlier detection, recent major research has shifted from developing univariate methods to multivariate methods due to the rapid growth of multidimensional data. However, one typical issue of this paradigm shift is that many multidimensional data often mainly contains univariate outliers, in which many features are actually irrelevant. In such cases, multivariate methods are ineffective in identifying such outliers due to the potential biases and the curse of dimensionality brought by irrelevant features. Those univariate outliers might be well detected by applying univariate outlier detectors in individually relevant features. However, it is very challenging to choose a right univariate detector …


Understanding Continuance Intention Toward Crowdsourcing Games: A Longitudinal Investigation, Xiaohui Wang, Dion Hoe-Lian Goh, Ee-Peng Lim Dec 2020

Understanding Continuance Intention Toward Crowdsourcing Games: A Longitudinal Investigation, Xiaohui Wang, Dion Hoe-Lian Goh, Ee-Peng Lim

Research Collection School Of Computing and Information Systems

Given the increasing popularity of gamified crowdsourcing, the study reported here involved examining determinants of users' continuance intention toward crowdsourcing games, both with longitudinal data and reference to a revised unified theory of acceptance and use of technology (UTAUT). At three time points, data were collected from an online survey about playing crowdsourcing games. Time-lagged regression, cross-temporal correlation, and structural equation modeling were performed to examine determinants of the acceptance of crowdsourcing games. Results indicate that the revised UTAUT2 is applicable to explaining the acceptance of crowdsourcing games. Not only did effort expectancy, hedonic motivation, and social influence directly affect …


Identifying And Characterizing Alternative News Media On Facebook, Samuel S. Guimaraes, Julia C. S. Reis, Lucas Lima, Filipe N. Ribeiro, Marisa Vasconcelos, Jisun An, Haewoon Kwak, Fabricio Benevenuto Dec 2020

Identifying And Characterizing Alternative News Media On Facebook, Samuel S. Guimaraes, Julia C. S. Reis, Lucas Lima, Filipe N. Ribeiro, Marisa Vasconcelos, Jisun An, Haewoon Kwak, Fabricio Benevenuto

Research Collection School Of Computing and Information Systems

As Internet users increasingly rely on social media sites to receive news, they are faced with a bewildering number of news media choices. For example, thousands of Facebook pages today are registered and categorized as some form of news media outlets. This situation boosted the so-called independent journalism, also known as alternative news media. Identifying and characterizing all the news pages that play an important role in news dissemination is key for understanding the news ecosystems of a country. In this work, we propose a graph-based semi-supervised method to measure the political bias of pages on most countries and show …


Business Practice Of Social Media - Platform And Customer Service Adoption, Shujing Sun, Yang Gao, Huaxia Rui Dec 2020

Business Practice Of Social Media - Platform And Customer Service Adoption, Shujing Sun, Yang Gao, Huaxia Rui

Research Collection School Of Computing and Information Systems

This paper examines the key drivers in business adoptions of the platform and customer service within the context of social media. We carry out the empirical analyses using the decision trajectories of the international airline industry on Twitter. We find that a firm's decision-making is subject to both peer influence and consumer pressure. Regarding peer influence, we find that the odds of both adoptions increase when the extent of peers' adoption increases. We also identify the distinctive role of consumers. Specifically, before the platform adoption, firms learn about potential consequences from consumer reactions to peers' adoptions. Upon the platform adoption, …


Improving Gan Training With Probability Ratio Clipping And Sample Reweighting, Yue Wu, Pan Zhou, Andrew Wilson Gordon, Eric Xing, Zhiting Hu Dec 2020

Improving Gan Training With Probability Ratio Clipping And Sample Reweighting, Yue Wu, Pan Zhou, Andrew Wilson Gordon, Eric Xing, Zhiting Hu

Research Collection School Of Computing and Information Systems

Despite success on a wide range of problems related to vision, generative adversarial networks (GANs) often suffer from inferior performance due to unstable training, especially for text generation. To solve this issue, we propose a new variational GAN training framework which enjoys superior training stability. Our approach is inspired by a connection of GANs and reinforcement learning under a variational perspective. The connection leads to (1) probability ratio clipping that regularizes generator training to prevent excessively large updates, and (2) a sample re-weighting mechanism that improves discriminator training by downplaying bad-quality fake samples. Moreover, our variational GAN framework can provably …


Theory-Inspired Path-Regularized Differential Network Architecture Search, Pan Zhou, Caiming Xiong, Richard Socher, Steven C. H. Hoi Dec 2020

Theory-Inspired Path-Regularized Differential Network Architecture Search, Pan Zhou, Caiming Xiong, Richard Socher, Steven C. H. Hoi

Research Collection School Of Computing and Information Systems

Despite its high search efficiency, differential architecture search (DARTS) often selects network architectures with dominated skip connections which lead to performance degradation. However, theoretical understandings on this issue remain absent, hindering the development of more advanced methods in a principled way. In this work, we solve this problem by theoretically analyzing the effects of various types of operations, e.g. convolution, skip connection and zero operation, to the network optimization. We prove that the architectures with more skip connections can converge faster than the other candidates, and thus are selected by DARTS. This result, for the first time, theoretically and explicitly …


Renewal Of An Information Systems Curriculum To Support Career Based Tracks: A Case Study, Swapna Gottipati, Venky Shankararaman, Kyong Jin Shim Dec 2020

Renewal Of An Information Systems Curriculum To Support Career Based Tracks: A Case Study, Swapna Gottipati, Venky Shankararaman, Kyong Jin Shim

Research Collection School Of Computing and Information Systems

The pace at which technology redefines traditional job functions is picking up rapidly. This trend is triggered particularly by advances in analytics, security, cloud computing, Artificial Intelligence and big data. The purpose of this paper is to present a case study on our approach to renewing an undergraduate IS Major curriculum to align with the needs of the industry. We adopt a survey based approach to study Information Systems (IS) graduate skills requirements and re-design the curriculum framework for the IS program at our school. The paper describes in detail the process, the redesigned IS curriculum, the impact of the …


Social Media Analytics: A Case Study Of Singapore General Election 2020, Sebastian Zhi Tao Khoo, Leong Hock Ho, Ee Hong Lee, Danston Kheng Boon Goh, Zehao Zhang, Swee Hong Ng, Haodi Qi, Kyong Jin Shim Dec 2020

Social Media Analytics: A Case Study Of Singapore General Election 2020, Sebastian Zhi Tao Khoo, Leong Hock Ho, Ee Hong Lee, Danston Kheng Boon Goh, Zehao Zhang, Swee Hong Ng, Haodi Qi, Kyong Jin Shim

Research Collection School Of Computing and Information Systems

The 2020 Singaporean General Election (GE2020) was a general election held in Singapore on July 10, 2020. In this study, we present an analysis on social conversations about GE2020 during the election period. We analyzed social conversations from popular platforms such as Twitter, HardwareZone, and TR Emeritus.


Robust, Fine-Grained Occupancy Estimation Via Combined Camera & Wifi Indoor Localization, Anuradha Ravi, Archan Misra Dec 2020

Robust, Fine-Grained Occupancy Estimation Via Combined Camera & Wifi Indoor Localization, Anuradha Ravi, Archan Misra

Research Collection School Of Computing and Information Systems

We describe the development of a robust, accurate and practically-validated technique for estimating the occupancy count in indoor spaces, based on a combination of WiFi & video sensing. While fusing these two sensing-based inputs is conceptually straightforward, the paper demonstrates and tackles the complexity that arises from several practical artefacts, such as (i) over-counting when a single individual uses multiple WiFi devices and under-counting when the individual has no such device; (ii) corresponding errors in image analysis due to real-world artefacts, such as occlusion, and (iii) the variable errors in mapping image bounding boxes (which can include multiple possible types …


Jointly Optimizing Sensing Pipelines For Multimodal Mixed Reality Interaction, Darshana Rathnayake, Ashen De Silva, Dasun Puwakdandawa, Lakmal Meegahapola, Archan Misra, Indika Perera Dec 2020

Jointly Optimizing Sensing Pipelines For Multimodal Mixed Reality Interaction, Darshana Rathnayake, Ashen De Silva, Dasun Puwakdandawa, Lakmal Meegahapola, Archan Misra, Indika Perera

Research Collection School Of Computing and Information Systems

Natural human interactions for Mixed Reality Applications are overwhelmingly multimodal: humans communicate intent and instructions via a combination of visual, aural and gestural cues. However, supporting low-latency and accurate comprehension of such multimodal instructions (MMI), on resource-constrained wearable devices, remains an open challenge, especially as the state-of-the-art comprehension techniques for each individual modality increasingly utilize complex Deep Neural Network models. We demonstrate the possibility of overcoming the core limitation of latency--vs.--accuracy tradeoff by exploiting cross-modal dependencies -- i.e., by compensating for the inferior performance of one model with an increased accuracy of more complex model of a different modality. We …


Deepcommenter: A Deep Code Comment Generation Tool With Hybrid Lexical And Syntactical Information, Boao Li, Meng Yan, Xin Xia, Xing Hu, Ge Li, David Lo Nov 2020

Deepcommenter: A Deep Code Comment Generation Tool With Hybrid Lexical And Syntactical Information, Boao Li, Meng Yan, Xin Xia, Xing Hu, Ge Li, David Lo

Research Collection School Of Computing and Information Systems

As the scale of software projects increases, the code comments are more and more important for program comprehension. Unfortunately, many code comments are missing, mismatched or outdated due to tight development schedule or other reasons. Automatic code comment generation is of great help for developers to comprehend source code and reduce their workload. Thus, we propose a code comment generation tool (DeepCommenter) to generate descriptive comments for Java methods. DeepCommenter formulates the comment generation task as a machine translation problem and exploits a deep neural network that combines the lexical and structural information of Java methods. We implement DeepCommenter in …


The Impact Of Covid-19 On Asian Businesses And The Economy, Havovi Joshi Nov 2020

The Impact Of Covid-19 On Asian Businesses And The Economy, Havovi Joshi

Asian Management Insights

The Covid-19 pandemic will likely end when a vaccine can be made available to everyone, or when we have achieved some measure of herd immunity. Unfortunately, both are as yet nowhere in sight.


Deep-Learning-Based App Sensitive Behavior Surveillance For Android Powered Cyber-Physical Systems, Haoyu Ma, Jianwen Tian, Kefan Qiu, David Lo, Debin Gao, Daoyuan Wu, Chunfu Jia, Thar Baker Nov 2020

Deep-Learning-Based App Sensitive Behavior Surveillance For Android Powered Cyber-Physical Systems, Haoyu Ma, Jianwen Tian, Kefan Qiu, David Lo, Debin Gao, Daoyuan Wu, Chunfu Jia, Thar Baker

Research Collection School Of Computing and Information Systems

Android as an operating system is now increasingly being adopted in industrial information systems, especially with Cyber-Physical Systems (CPS). This also puts Android devices onto the front line of handling security-related data and conducting sensitive behaviors, which could be misused by the increasing number of polymorphic and metamorphic malicous applications targeting the platform. The existence of such malware threats therefore call for more accurate identification and surveillance of sensitive Android app behaviors, which is essential to the security of CPS and IoT devices powered by Android. Nevertheless, achieving dynamic app behavior monitoring and identification on real CPS powered by Android …


Cost-Sensitive Deep Forest For Price Prediction, Chao Ma, Zhenbing Liu, Zhiguang Cao, Wen Song, Jie Zhang, Weiliang Zeng Nov 2020

Cost-Sensitive Deep Forest For Price Prediction, Chao Ma, Zhenbing Liu, Zhiguang Cao, Wen Song, Jie Zhang, Weiliang Zeng

Research Collection School Of Computing and Information Systems

For many real-world applications, predicting a price range is more practical and desirable than predicting a concrete value. In this case, price prediction can be regarded as a classification problem. Although deep forest is recognized as the best solution to many classification problems, a crucial issue limits its direct application to price prediction, i.e., it treated all the misclassifications equally no matter how far away they are from the real classes, since their impacts on the accuracy are the same. This is unreasonable to price prediction as the misclassification should be as close to the real price range as possible …


Multi-User Verifiable Searchable Symmetric Encryption For Cloud Storage, Xueqiao Liu, Guomin Yang, Guomin Yang Nov 2020

Multi-User Verifiable Searchable Symmetric Encryption For Cloud Storage, Xueqiao Liu, Guomin Yang, Guomin Yang

Research Collection School Of Computing and Information Systems

In a cloud data storage system, symmetric key encryption is usually used to encrypt files due to its high efficiency. In order allow the untrusted/semi-trusted cloud storage server to perform searching over encrypted data while maintaining data confidentiality, searchable symmetric encryption (SSE) has been proposed. In a typical SSE scheme, a users stores encrypted files on a cloud storage server and later can retrieve the encrypted files containing specific keywords. The basic security requirement of SSE is that the cloud server learns no information about the files or the keywords during the searching process. Some SSE schemes also offer additional …


A Tripartite Model Of Trust In Facebook: Acceptance Of Information Personalization, Privacy Concern, And Privacy Literacy, Sonny Rosenthal, Ole-Christian Wasenden, Gorm-Andreas Gronnevet, Rich Ling Nov 2020

A Tripartite Model Of Trust In Facebook: Acceptance Of Information Personalization, Privacy Concern, And Privacy Literacy, Sonny Rosenthal, Ole-Christian Wasenden, Gorm-Andreas Gronnevet, Rich Ling

Research Collection College of Integrative Studies

This study draws on the mental accounting perspective and a tripartite model of trust to explain why users trust Facebook. We argue that trust in Facebook is related to (1) trust in companies that collect personal data, (2) acceptance of information personalization, (3) low privacy concern, and (4) low privacy literacy. Further, we argue that privacy literacy amplifies the relationship between privacy concern and the other factors. This is because, among individuals with high privacy literacy, privacy concern is especially diagnostic of the potential harms of a loss of privacy. These arguments align broadly with theorizations about factors influencing privacy-related …


Exploring And Evaluating Attributes, Values, And Structures For Entity Alignment, Zhiyuan Liu, Yixin Cao, Liangming Pan, Juanzi Li, Zhiyuan Liu, Tat-Seng Chua Nov 2020

Exploring And Evaluating Attributes, Values, And Structures For Entity Alignment, Zhiyuan Liu, Yixin Cao, Liangming Pan, Juanzi Li, Zhiyuan Liu, Tat-Seng Chua

Research Collection School Of Computing and Information Systems

Entity alignment (EA) aims at building a unified Knowledge Graph (KG) of rich content by linking the equivalent entities from various KGs. GNN-based EA methods present promising performance by modeling the KG structure defined by relation triples. However, attribute triples can also provide crucial alignment signal but have not been well explored yet. In this paper, we propose to utilize an attributed value encoder and partition the KG into subgraphs to model the various types of attribute triples efficiently. Besides, the performances of current EA methods are overestimated because of the name-bias of existing EA datasets. To make an objective …


Security Analysis Of Permission Re-Delegation Vulnerabilities In Android Apps, Biniam Fisseha Demissie, Mariano Ceccato, Lwin Khin Shar Nov 2020

Security Analysis Of Permission Re-Delegation Vulnerabilities In Android Apps, Biniam Fisseha Demissie, Mariano Ceccato, Lwin Khin Shar

Research Collection School Of Computing and Information Systems

The Android platform facilitates reuse of app func- tionalities by allowing an app to request an action from another app through inter-process communication mechanism. This fea- ture is one of the reasons for the popularity of Android, but it also poses security risks to end users because malicious, unprivileged apps could exploit this feature to make privileged apps perform privileged actions on behalf of them.

In our journal paper [4], we investigate the hybrid use of program analysis, genetic algorithm based test generation, natu- ral language processing, machine learning techniques for precise detection of permission re-delegation vulnerabilities in Android apps. …


Semi-Analytical Model For Design And Analysis Of On-Orbit Servicing Architecture, Koki Ho, Hai Wang, Paul A. De Trempe, Tristan Sarton Du Jonchay, Kento Tomita Nov 2020

Semi-Analytical Model For Design And Analysis Of On-Orbit Servicing Architecture, Koki Ho, Hai Wang, Paul A. De Trempe, Tristan Sarton Du Jonchay, Kento Tomita

Research Collection School Of Computing and Information Systems

Robotic on-orbit servicing (OOS) is expected to be a key technology and concept for future sustainable space exploration. This paper develops a novel semi-analytical model for OOS system analysis, responding to the growing needs and ongoing trend of robotic OOS. An OOS infrastructure system is considered whose goal is to provide responsive services to the random failures of a set of customer modular satellites distributed in space (e.g., at the geosynchronous orbit). The considered OOS architecture comprises a servicer that travels and provides module-replacement services to the customer satellites, an on-orbit depot to store the spares, and a series of …


A Geospatial Analytics Approach To Delineate Trade Areas For Quick Service Restaurants (Qsr) In Singapore, Hui Ting Lim Nov 2020

A Geospatial Analytics Approach To Delineate Trade Areas For Quick Service Restaurants (Qsr) In Singapore, Hui Ting Lim

Research Collection School Of Computing and Information Systems

According to Huff, trade area is defined as “a geographically delineated region containing potential customers for whom there exists a probability greater than zero of their purchasing a given class of products or services offered for sale by a particular firm or by a particular agglomeration of firms”. Several methods to delineate a store trade area have been proposed over the years. For drive-time or travel distance analysis method, the trade area is delineated according to how far or how long the customers are willing to travel to patronise the store. Another commonly used method is the Huff Model which …


Boosting Privately: Federated Extreme Gradient Boosting For Mobile Crowdsensing, Yang Liu, Zhuo Ma, Ximeng Liu, Siqi Ma, Surya Nepal, Robert H. Deng, Kui Ren Nov 2020

Boosting Privately: Federated Extreme Gradient Boosting For Mobile Crowdsensing, Yang Liu, Zhuo Ma, Ximeng Liu, Siqi Ma, Surya Nepal, Robert H. Deng, Kui Ren

Research Collection School Of Computing and Information Systems

Recently, Google and other 24 institutions proposed a series of open challenges towards federated learning (FL), which include application expansion and homomorphic encryption (HE). The former aims to expand the applicable machine learning models of FL. The latter focuses on who holds the secret key when applying HE to FL. For the naive HE scheme, the server is set to master the secret key. Such a setting causes a serious problem that if the server does not conduct aggregation before decryption, a chance is left for the server to access the user’s update. Inspired by the two challenges, we propose …