Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Earth Sciences (6472)
- Geology (5124)
- Computer Sciences (3534)
- Environmental Sciences (2941)
- Engineering (2373)
-
- Life Sciences (2201)
- Chemistry (1631)
- Mathematics (1438)
- Physics (1328)
- Oceanography and Atmospheric Sciences and Meteorology (999)
- Social and Behavioral Sciences (963)
- Artificial Intelligence and Robotics (951)
- Sustainability (905)
- Natural Resources and Conservation (800)
- Medicine and Health Sciences (762)
- Computer Engineering (703)
- Environmental Monitoring (655)
- Environmental Indicators and Impact Assessment (653)
- Oil, Gas, and Energy (631)
- Statistics and Probability (573)
- Mining Engineering (537)
- Marine Biology (506)
- Plant Sciences (499)
- Mechanical Engineering (480)
- Soil Science (474)
- Natural Resources Management and Policy (453)
- Electrical and Computer Engineering (449)
- Education (445)
- Ecology and Evolutionary Biology (427)
- Institution
-
- Western Michigan University (4768)
- University of Kentucky (739)
- TÜBİTAK (620)
- University of Nebraska - Lincoln (618)
- Singapore Management University (527)
-
- Western Washington University (400)
- Old Dominion University (384)
- William & Mary (288)
- China Simulation Federation (281)
- China Coal Technology and Engineering Group (CCTEG) (252)
- Montana Tech Library (233)
- University of Texas Rio Grande Valley (233)
- Chulalongkorn University (224)
- Utah State University (223)
- Missouri University of Science and Technology (220)
- University of Texas at El Paso (209)
- City University of New York (CUNY) (206)
- Portland State University (185)
- Western University (181)
- University of Tennessee, Knoxville (174)
- Kennesaw State University (172)
- University of South Carolina (172)
- University of South Florida (157)
- University of Arkansas, Fayetteville (150)
- Virginia Commonwealth University (138)
- Louisiana State University (134)
- MBZUAI (134)
- Technological University Dublin (132)
- Air Force Institute of Technology (131)
- Boise State University (129)
- Keyword
-
- Gas (249)
- And Energy; Structural Materials; Sustainability (248)
- Energy Systems; Environmental Indicators and Impact Assessment; Environmental Monitoring; Mining Engineering; Oil (248)
- Machine learning (243)
- Deep learning (167)
-
- Coastal Hydrodynamics and Sediment Dynamics (CHSD) (133)
- Sediment transport (133)
- CTD (131)
- Technical Reports (129)
- UTEP Computer Science Department (129)
- Machine Learning (122)
- Climate change (121)
- LISST (120)
- COVID-19 (113)
- Artificial intelligence (99)
- Sustainability (94)
- Temperature (85)
- Mathematics (83)
- Deep Learning (73)
- Conductivity (69)
- ADV (66)
- X-ray images (66)
- Grain size distribution (65)
- Gust erodibility (65)
- Gust microcosm (65)
- Organic content (65)
- Percent moisture (65)
- Sediment erosion (65)
- Sediment structure (65)
- X-radiograph (65)
- Publication
-
- Thin Sections (3589)
- Legacy Color Lithology Strip Logs (1152)
- Theses and Dissertations (501)
- Research Collection School Of Computing and Information Systems (476)
- IGC Proceedings (1993-2023) (359)
-
- Journal of System Simulation (281)
- Salish Sea Ecosystem Conference (278)
- Coal Geology & Exploration (252)
- World of Coal Ash Proceedings (248)
- Electronic Theses and Dissertations (243)
- Turkish Journal of Mathematics (228)
- Silver Bow Creek/Butte Area Superfund Site (227)
- Chulalongkorn University Theses and Dissertations (Chula ETD) (224)
- Faculty Publications (197)
- Turkish Journal of Chemistry (172)
- Turkish Journal of Electrical Engineering and Computer Sciences (166)
- Data (150)
- Departmental Technical Reports (CS) (129)
- School of Natural Resources: Faculty Publications (129)
- Journal of Marine Science and Technology (125)
- All Works (124)
- USF Tampa Graduate Theses and Dissertations (112)
- Honors Theses (106)
- Doctoral Dissertations (101)
- Electronic Thesis and Dissertation Repository (98)
- Articles (96)
- Publications and Research (96)
- Biology and Medicine Through Mathematics Conference (92)
- Journal of Electrochemistry (91)
- C-Day Computing Showcase (90)
- Publication Type
Articles 17701 - 17730 of 18298
Full-Text Articles in Physical Sciences and Mathematics
Software Engineering Approaches For Tinyml Based Iot Embedded Vision: A Systematic Literature Review, Shashank Bangalore Lakshman, Nasir U. Eisty
Software Engineering Approaches For Tinyml Based Iot Embedded Vision: A Systematic Literature Review, Shashank Bangalore Lakshman, Nasir U. Eisty
Computer Science Faculty Publications and Presentations
Internet of Things (IoT) has catapulted human ability to control our environments through ubiquitous sensing, communication, computation, and actuation. Over the past few years, IoT has joined forces with Machine Learning (ML) to embed deep intelligence at the far edge. TinyML (Tiny Machine Learning) has enabled the deployment of ML models for embedded vision on extremely lean edge hardware, bringing the power of IoT and ML together. However, TinyML powered embedded vision applications are still in a nascent stage, and they are just starting to scale to widespread real-world IoT deployment. To harness the true potential of IoT and ML, …
Symbol And Communicative Grounding Through Object Permanence With A Mobile Robot, Josue Torres-Fonseca, Catherine Henry, Casey Kennington
Symbol And Communicative Grounding Through Object Permanence With A Mobile Robot, Josue Torres-Fonseca, Catherine Henry, Casey Kennington
Computer Science Faculty Publications and Presentations
Object permanence is the ability to form and recall mental representations of objects even when they are not in view. Despite being a crucial developmental step for children, object permanence has had only some exploration as it relates to symbol and communicative grounding in spoken dialogue systems. In this paper, we leverage SLAM as a module for tracking object permanence and use a robot platform to move around a scene where it discovers objects and learns how they are denoted. We evaluated by comparing our system’s effectiveness at learning words from human dialogue partners both with and without object permanence. …
Exploring Visitor Perceptions And Behaviours Related To Ticks And Lyme Disease Risk In An Ontario Protected Area, Ryan Brady
Theses and Dissertations (Comprehensive)
Lyme disease is the most common vector-borne zoonosis in North America and over the past decade, reported cases of the disease have been rapidly increasing in many regions throughout Canada. The relative novelty of this public health threat presents nature-based tourism and recreation organizations with a range of policy and management challenges. Currently, there is a limited understanding of public perceptions and behaviours associated with tick and Lyme disease risk, especially within a Canadian parks and protected areas visitation and visitor experience context. To address this practical and scholarly knowledge gap, this study utilized in-situ surveys to explore visitor perceptions, …
Actuarial Credibility Approach In Adjusting Initial Cost Estimates Of Transport Infrastructure Projects, Bartłomiej Rokicki, Krzysztof Ostaszewski
Actuarial Credibility Approach In Adjusting Initial Cost Estimates Of Transport Infrastructure Projects, Bartłomiej Rokicki, Krzysztof Ostaszewski
Faculty Publications – Mathematics
This paper presents a novel methodology based on the modified actuarial credibility approach. It allows for the adjustment of initial cost estimates of public infrastructure projects by accounting for the additional risk/uncertainty factor. Hence, it offers an interesting alternative to other existing forecasting methods. We test our approach by applying data for over 300 major infrastructure projects implemented in Poland between 2004 and 2020. We prove that, despite its simplicity, the actuarial credibility approach can deliver accurate cost estimates compared to more complex methods such as regression analysis (OLS) or machine learning (LASSO). In particular, we show that, although the …
The Role Of Interactive Features Within A Mathematics Storybook In Interpreting A Conflict And Conflict Resolution: The Case Of Three Fifth Graders, Mahtob Aqazade
Faculty Publications – Mathematics
Students often experience cognitive conflicts when trying to interpret negative numbers’ order and values because they do not correspond to their prior whole number knowledge. One way to trigger students’ cognitive conflicts and support their conflict resolution meaningfully is through stories. Thus, I used a temperature-related mathematics storybook—Temperature Turmoil—to highlight the cognitive conflict students often experience because of relying on the integers’ absolute value and introduce conflict resolution (i.e., integers have both absolute value and directed value). By incorporating interactive features, I used a multiple-case approach to describe three fifth graders’ cognitive conflict and conflict resolution experiences. Harry, Lola, and …
Air Quality: Assessment Of Pollutant Levels And Chemistry In Kitchener, On Using Multisensor Pods, Wisam Mohammed
Air Quality: Assessment Of Pollutant Levels And Chemistry In Kitchener, On Using Multisensor Pods, Wisam Mohammed
Theses and Dissertations (Comprehensive)
Air quality is a growing concern amongst governmental bodies worldwide. A large number of scientific studies accumulated over the past 25 years suggest that poor ambient air quality is attributed to adverse health effects, especially in vulnerable communities that exhibit pre-existing conditions. The United Nations Children’s Fund (UNICEF) reported around 600 000 deaths globally in children under the age of 5 as a result of acute lower respiratory infections caused by poor air quality. With the current statistics on air quality impacts, it is clear that more needs to be done. This MSc work aims to put into perspective the …
Vims Marsh Migration Final Report + Metadata Sheets, Molly Mitchell, Karinna Nunez, Christine Tombleson, Julie Herman
Vims Marsh Migration Final Report + Metadata Sheets, Molly Mitchell, Karinna Nunez, Christine Tombleson, Julie Herman
Reports
Coastal marsh loss is a significant issue globally, due in part to rising sea levels and high levels of coastal human activity. Marshes have natural mechanisms to allow them to adapt to rising sea levels, however, migration across the landscape is one of those mechanisms and is frequently in conflict with human use of the shoreline. Ensuring the persistence of marshes into the future requires an understanding of where marshes are likely to migrate under sea level rise and targeting those areas for conservation and preservation activities. The goal of this project was to 1) compile existing datasets and information …
A Survey On Deep Learning For Software Engineering, Yanming Yang, Xin Xia, David Lo
A Survey On Deep Learning For Software Engineering, Yanming Yang, Xin Xia, David Lo
Research Collection School Of Computing and Information Systems
In 2006, Geoffrey Hinton proposed the concept of training "Deep Neural Networks (DNNs)" and an improved model training method to break the bottleneck of neural network development. More recently, the introduction of AlphaGo in 2016 demonstrated the powerful learning ability of deep learning and its enormous potential. Deep learning has been increasingly used to develop state-of-the-art software engineering (SE) research tools due to its ability to boost performance for various SE tasks. There are many factors, e.g., deep learning model selection, internal structure differences, and model optimization techniques, that may have an impact on the performance of DNNs applied in …
Secrets Behind The Science Of Symmetry: Evolution And Symmetry, Yeongseo Ko
Secrets Behind The Science Of Symmetry: Evolution And Symmetry, Yeongseo Ko
The Synapse: Intercollegiate science magazine
No abstract provided.
New Political Ecologies Of Renewable Energy, Sarah Knuth, Ingrid Behrsin, Anthony Levenda, James Mccarthy
New Political Ecologies Of Renewable Energy, Sarah Knuth, Ingrid Behrsin, Anthony Levenda, James Mccarthy
Geography
The critique of fossil fuel regimes has been a foundational concern for the field of political ecology, in its drives to expose the injustices and harms of energy extractivism and its early warnings of the climate crisis. However, it is increasingly evident that renewable energy sources and their infrastructures will carry their own costs and trade-offs, and that critique, resistance and alternative movement-building are needed to forge a truly just renewable energy transition. This theme issue underlines the many ways in which political ecology is well-positioned to lead critical and engaged scholarship in support of energy/climate justice. In this introduction …
Climate Adaptation For Tropical Island Land Stewardship: Adapting A Workshop Planning Process To Hawai'i, Ryan J. Longman, Courtney L. Peterson, Madeline Baroli, Abby G. Frazier, Zachary Cook, Elliott W. Parsons, Maude Dinan, Katie L. Kamelamela, Caitriana Steele, Reanna Burnett, Chris Swanston, Christian P. Giardina
Climate Adaptation For Tropical Island Land Stewardship: Adapting A Workshop Planning Process To Hawai'i, Ryan J. Longman, Courtney L. Peterson, Madeline Baroli, Abby G. Frazier, Zachary Cook, Elliott W. Parsons, Maude Dinan, Katie L. Kamelamela, Caitriana Steele, Reanna Burnett, Chris Swanston, Christian P. Giardina
Geography
No abstract provided.
Just-In-Time Defect Prediction On Javascript Projects: A Replication Study, Chao Ni, Xin Xia, David Lo, Xiaohu Yang, Ahmed E. Hassan
Just-In-Time Defect Prediction On Javascript Projects: A Replication Study, Chao Ni, Xin Xia, David Lo, Xiaohu Yang, Ahmed E. Hassan
Research Collection School Of Computing and Information Systems
Change-level defect prediction is widely referred to as just-in-time (JIT) defect prediction since it identifies a defect-inducing change at the check-in time, and researchers have proposed many approaches based on the language-independent change-level features. These approaches can be divided into two types: supervised approaches and unsupervised approaches, and their effectiveness has been verified on Java or C++ projects. However, whether the language-independent change-level features can effectively identify the defects of JavaScript projects is still unknown. Additionally, many researches have confirmed that supervised approaches outperform unsupervised approaches on Java or C++ projects when considering inspection effort. However, whether supervised JIT defect …
Why Do Smart Contracts Self-Destruct? Investigating The Selfdestruct Function On Ethereum, Jiachi Chen, Xin Xia, David Lo, John C. Grundy
Why Do Smart Contracts Self-Destruct? Investigating The Selfdestruct Function On Ethereum, Jiachi Chen, Xin Xia, David Lo, John C. Grundy
Research Collection School Of Computing and Information Systems
The selfdestruct function is provided by Ethereum smart contracts to destroy a contract on the blockchain system. However, it is a double-edged sword for developers. On the one hand, using the selfdestruct function enables developers to remove smart contracts (SCs) from Ethereum and transfers Ethers when emergency situations happen, e.g., being attacked. On the other hand, this function can increase the complexity for the development and open an attack vector for attackers. To better understand the reasons why SC developers include or exclude the selfdestruct function in their contracts, we conducted an online survey to collect feedback from them and …
Beyond Triplet Loss: Person Re-Identification With Fine-Grained Difference-Aware Pairwise Loss, Cheng Yan, Guansong Pang, Xiao Bai, Changhong Liu, Xin Ning, Jun Zhou
Beyond Triplet Loss: Person Re-Identification With Fine-Grained Difference-Aware Pairwise Loss, Cheng Yan, Guansong Pang, Xiao Bai, Changhong Liu, Xin Ning, Jun Zhou
Research Collection School Of Computing and Information Systems
Person Re-IDentification (ReID) aims at re-identifying persons from different viewpoints across multiple cameras. Capturing the fine-grained appearance differences is often the key to accurate person ReID, because many identities can be differentiated only when looking into these fine-grained differences. However, most state-of-the-art person ReID approaches, typically driven by a triplet loss, fail to effectively learn the fine-grained features as they are focused more on differentiating large appearance differences. To address this issue, we introduce a novel pairwise loss function that enables ReID models to learn the fine-grained features by adaptively enforcing an exponential penalization on the images of small differences …
Comparison Of The Mental Burden On Nursing Care Providers With And Without Mat-Type Sleep State Sensors At A Nursing Home In Tokyo, Japan: Quasi-Experimental Study, Sakiko Itoh, Hwee-Pink Tan, Kenichi Kudo, Yasuko Ogata
Comparison Of The Mental Burden On Nursing Care Providers With And Without Mat-Type Sleep State Sensors At A Nursing Home In Tokyo, Japan: Quasi-Experimental Study, Sakiko Itoh, Hwee-Pink Tan, Kenichi Kudo, Yasuko Ogata
Research Collection School Of Computing and Information Systems
Background: Increasing need for nursing care has led to the increased burden on formal caregivers, with those in nursing homes having to deal with exhausting labor. Although research activities on the use of internet of things devices to support nursing care for older adults exist, there is limited evidence on the effectiveness of these interventions among formal caregivers in nursing homes. Objective: This study aims to investigate whether mat-type sleep state sensors for supporting nursing care can reduce the mental burden of formal caregivers in a nursing home. Methods: This was a quasi-experimental study at a nursing home in Tokyo, …
Secure Cloud Data Deduplication With Efficient Re-Encryption, Haoran Yuan, Xiaofeng Chen, Jin Li, Tao Jiang, Jianfeng Wang, Robert H. Deng
Secure Cloud Data Deduplication With Efficient Re-Encryption, Haoran Yuan, Xiaofeng Chen, Jin Li, Tao Jiang, Jianfeng Wang, Robert H. Deng
Research Collection School Of Computing and Information Systems
Data deduplication technique has been widely adopted by commercial cloud storage providers, which is both important and necessary in coping with the explosive growth of data. To further protect the security of users' sensitive data in the outsourced storage mode, many secure data deduplication schemes have been designed and applied in various scenarios. Among these schemes, secure and efficient re-encryption for encrypted data deduplication attracted the attention of many scholars, and many solutions have been designed to support dynamic ownership management. In this paper, we focus on the re-encryption deduplication storage system and show that the recently designed lightweight rekeying-aware …
Transformer-Based Joint Learning Approach For Text Normalization In Vietnamese Automatic Speech Recognition Systems, The Viet Bui, Tho Chi Luong, Oanh Thi Tran
Transformer-Based Joint Learning Approach For Text Normalization In Vietnamese Automatic Speech Recognition Systems, The Viet Bui, Tho Chi Luong, Oanh Thi Tran
Research Collection School Of Computing and Information Systems
In this article, we investigate the task of normalizing transcribed texts in Vietnamese Automatic Speech Recognition (ASR) systems in order to improve user readability and the performance of downstream tasks. This task usually consists of two main sub-tasks: predicting and inserting punctuation (i.e., period, comma); and detecting and standardizing named entities (i.e., numbers, person names) from spoken forms to their appropriate written forms. To achieve these goals, we introduce a complete corpus including of 87,700 sentences and investigate conditional joint learning approaches which globally optimize two sub-tasks simultaneously. The experimental results are quite promising. Overall, the proposed architecture outperformed the …
On The Reproducibility And Replicability Of Deep Learning In Software Engineering, Chao Liu, Cuiyun Gao, Xin Xia, David Lo, John C. Grundy, Xiaohu Yang
On The Reproducibility And Replicability Of Deep Learning In Software Engineering, Chao Liu, Cuiyun Gao, Xin Xia, David Lo, John C. Grundy, Xiaohu Yang
Research Collection School Of Computing and Information Systems
Context: Deep learning (DL) techniques have gained significant popularity among software engineering (SE) researchers in recent years. This is because they can often solve many SE challenges without enormous manual feature engineering effort and complex domain knowledge.Objective: Although many DL studies have reported substantial advantages over other state-of-the-art models on effectiveness, they often ignore two factors: (1) reproducibility—whether the reported experimental results can be obtained by other researchers using authors’ artifacts (i.e., source code and datasets) with the same experimental setup; and (2) replicability—whether the reported experimental result can be obtained by other researchers using their re-implemented artifacts with a …
Codematcher: Searching Code Based On Sequential Semantics Of Important Query Words, Chao Liu, Xin Xia, David Lo, Zhiwei Liu, Ahmed E. Hassan, Shanping Li
Codematcher: Searching Code Based On Sequential Semantics Of Important Query Words, Chao Liu, Xin Xia, David Lo, Zhiwei Liu, Ahmed E. Hassan, Shanping Li
Research Collection School Of Computing and Information Systems
To accelerate software development, developers frequently search and reuse existing code snippets from a large-scale codebase, e.g., GitHub. Over the years, researchers proposed many information retrieval (IR)-based models for code search, but they fail to connect the semantic gap between query and code. An early successful deep learning (DL)-based model DeepCS solved this issue by learning the relationship between pairs of code methods and corresponding natural language descriptions. Two major advantages of DeepCS are the capability of understanding irrelevant/noisy keywords and capturing sequential relationships between words in query and code. In this article, we proposed an IR-based model CodeMatcher that …
Automating App Review Response Generation Based On Contextual Knowledge, Cuiyun Gao, Wenjie Zhou, Xin Xia, David Lo, Qi Xie, Michael R. Lyu
Automating App Review Response Generation Based On Contextual Knowledge, Cuiyun Gao, Wenjie Zhou, Xin Xia, David Lo, Qi Xie, Michael R. Lyu
Research Collection School Of Computing and Information Systems
User experience of mobile apps is an essential ingredient that can influence the user base and app revenue. To ensure good user experience and assist app development, several prior studies resort to analysis of app reviews, a type of repository that directly reflects user opinions about the apps. Accurately responding to the app reviews is one of the ways to relieve user concerns and thus improve user experience. However, the response quality of the existing method relies on the pre-extracted features from other tools, including manually labelled keywords and predicted review sentiment, which may hinder the generalizability and flexibility of …
Face To Purchase: Predicting Consumer Choices With Structured Facial And Behavioral Traits Embedding, Zhe Liu, Xianzhi Wang, Lina Yao, Jake An, Lei Bai, Ee-Peng Lim
Face To Purchase: Predicting Consumer Choices With Structured Facial And Behavioral Traits Embedding, Zhe Liu, Xianzhi Wang, Lina Yao, Jake An, Lei Bai, Ee-Peng Lim
Research Collection School Of Computing and Information Systems
Predicting consumers’ purchasing behaviors is critical for targeted advertisement and sales promotion in e-commerce. Human faces are an invaluable source of information for gaining insights into consumer personality and behavioral traits. However, consumer's faces are largely unexplored in previous research, and the existing face-related studies focus on high-level features such as personality traits while neglecting the business significance of learning from facial data. We propose to predict consumers’ purchases based on their facial features and purchasing histories. We design a semi-supervised model based on a hierarchical embedding network to extract high-level features of consumers and to predict the top-N purchase …
On Discovering Motifs And Frequent Patterns In Spatial Trajectories With Discrete Fréchet Distance, Bo Tang, Man Lung Yiu, Kyriakos Mouratidis, Jiahao Zhang, Kai Wang
On Discovering Motifs And Frequent Patterns In Spatial Trajectories With Discrete Fréchet Distance, Bo Tang, Man Lung Yiu, Kyriakos Mouratidis, Jiahao Zhang, Kai Wang
Research Collection School Of Computing and Information Systems
The discrete Fréchet distance (DFD) captures perceptual and geographical similarity between two trajectories. It has been successfully adopted in a multitude of applications, such as signature and handwriting recognition, computer graphics, as well as geographic applications. Spatial applications, e.g., sports analysis, traffic analysis, etc. require discovering similar subtrajectories within a single trajectory or across multiple trajectories. In this paper, we adopt DFD as the similarity measure, and study two representative trajectory analysis problems, namely, motif discovery and frequent pattern discovery. Due to the time complexity of DFD, these tasks are computationally challenging. We address that challenge with a suite of …
An Empirical Study Of Developers' Discussions About Security Challenges Of Different Programming Languages, Roland Croft, Yongzheng Xie, Mansooreh Zahedi, Muhammad Ali Babar, Christoph Treude
An Empirical Study Of Developers' Discussions About Security Challenges Of Different Programming Languages, Roland Croft, Yongzheng Xie, Mansooreh Zahedi, Muhammad Ali Babar, Christoph Treude
Research Collection School Of Computing and Information Systems
In collaborative software development projects, work items are used as a mechanism to coordinate tasks and track shared development work. In this paper, we explore how “tagging,” a lightweight social computing mechanism, is used to communicate matters of concern in the management of development tasks. We present the results from two empirical studies over 36 and 12 months, respectively, on how tagging has been adopted and what role it plays in the development processes of several professional development projects with more than 1,000 developers in total. Our research shows that the tagging mechanism was eagerly adopted by the teams, and …
The Dsa Toolkit Shines Light Into Dark And Stormy Archives, Shawn Morgan Jones, Himarsha R. Jayanetti, Alex Osborne, Paul Koerbin, Klein Martin, Michele C. Weigle, Michael L. Nelson
The Dsa Toolkit Shines Light Into Dark And Stormy Archives, Shawn Morgan Jones, Himarsha R. Jayanetti, Alex Osborne, Paul Koerbin, Klein Martin, Michele C. Weigle, Michael L. Nelson
Computer Science Faculty Publications
Web archive collections are created with a particular purpose in mind. A curator selects seeds, or original resources, which are then captured by an archiving system and stored as archived web pages, or mementos. The systems that build web archive collections are often configured to revisit the same original resource multiple times. This is incredibly useful for understanding an unfolding news story or the evolution of an organization. Unfortunately, over time, some of these original resources can go off-topic and no longer suit the purpose for which the collection was originally created. They can go off-topic due to web site …
Theory Entity Extraction For Social And Behavioral Sciences Papers Using Distant Supervision, Xin Wei, Lamia Salsabil, Jian Wu
Theory Entity Extraction For Social And Behavioral Sciences Papers Using Distant Supervision, Xin Wei, Lamia Salsabil, Jian Wu
Computer Science Faculty Publications
Theories and models, which are common in scientific papers in almost all domains, usually provide the foundations of theoretical analysis and experiments. Understanding the use of theories and models can shed light on the credibility and reproducibility of research works. Compared with metadata, such as title, author, keywords, etc., theory extraction in scientific literature is rarely explored, especially for social and behavioral science (SBS) domains. One challenge of applying supervised learning methods is the lack of a large number of labeled samples for training. In this paper, we propose an automated framework based on distant supervision that leverages entity mentions …
Climate Change And Cop26: Are Digital Technologies And Information Management Part Of The Problem Or The Solution? An Editorial Reflection And Call To Action, Yogesh K. Dwivedi, Laurie Hughes, Arpan Kumar Kar, Abdullah M. Baabdullah, Purva Grover, Roba Abbas, Daniela Andreini, Iyad Abumoghli, Yves Barlette, Deborah Bunker, Leona Chandra Kruse, Ioanna Constantiou, Robert M. Davison, Rahul De', Rameshwar Dubey, Henry Fenby-Taylor, Babita Gupta, Wu He, Mitsuru Kodama, Matti Mäntymäki, Bhimaraya Metri, Katina Michael, Johan Olaisen, Niki Panteli, Samuli Pekkola, Rohit Nishant, Ramakrishnan Raman, Nripendra P. Rana, Frantz Rowe, Suprateek Sarker, Brenda Scholtz, Maung Sein, Jeel Dharmeshkumar Shah, Thompson S.H. Teo, Manoj Kumar Tiwari, Morten Thanning Vendelø, Michael Wade
Climate Change And Cop26: Are Digital Technologies And Information Management Part Of The Problem Or The Solution? An Editorial Reflection And Call To Action, Yogesh K. Dwivedi, Laurie Hughes, Arpan Kumar Kar, Abdullah M. Baabdullah, Purva Grover, Roba Abbas, Daniela Andreini, Iyad Abumoghli, Yves Barlette, Deborah Bunker, Leona Chandra Kruse, Ioanna Constantiou, Robert M. Davison, Rahul De', Rameshwar Dubey, Henry Fenby-Taylor, Babita Gupta, Wu He, Mitsuru Kodama, Matti Mäntymäki, Bhimaraya Metri, Katina Michael, Johan Olaisen, Niki Panteli, Samuli Pekkola, Rohit Nishant, Ramakrishnan Raman, Nripendra P. Rana, Frantz Rowe, Suprateek Sarker, Brenda Scholtz, Maung Sein, Jeel Dharmeshkumar Shah, Thompson S.H. Teo, Manoj Kumar Tiwari, Morten Thanning Vendelø, Michael Wade
Information Technology & Decision Sciences Faculty Publications
The UN COP26 2021 conference on climate change offers the chance for world leaders to take action and make urgent and meaningful commitments to reducing emissions and limit global temperatures to 1.5 °C above pre-industrial levels by 2050. Whilst the political aspects and subsequent ramifications of these fundamental and critical decisions cannot be underestimated, there exists a technical perspective where digital and IS technology has a role to play in the monitoring of potential solutions, but also an integral element of climate change solutions. We explore these aspects in this editorial article, offering a comprehensive opinion based insight to a …
A Drop In The Bucket?: Solutions For Fermi Questions, December 2022, John Adam
A Drop In The Bucket?: Solutions For Fermi Questions, December 2022, John Adam
Mathematics & Statistics Faculty Publications
No abstract provided.
Cloud Ripple Pattern, John Adam
Cloud Ripple Pattern, John Adam
Mathematics & Statistics Faculty Publications
No abstract provided.
Circuit Optimization Techniques For Efficient Ex-Situ Training Of Robust Memristor Based Liquid State Machine, Alex Henderson, Christopher Yakopcic, Cory Merkel, Steven Harbour, Tarek M. Taha, Hananel Hazan
Circuit Optimization Techniques For Efficient Ex-Situ Training Of Robust Memristor Based Liquid State Machine, Alex Henderson, Christopher Yakopcic, Cory Merkel, Steven Harbour, Tarek M. Taha, Hananel Hazan
Electrical and Computer Engineering Faculty Publications
Spiking neural network hardware offers a high performance, power-efficient and robust platform for the processing of complex data. Many of these systems require supervised learning, which poses a challenge when using gradient-based algorithms due to the discontinuous properties of SNNs. Memristor based hardware can offer gains in portability, power reduction, and throughput efficiency when compared to pure CMOS. This paper proposes a memristor-based spiking liquid state machine (LSM). The inherent dynamics of the LSM permit the use of supervised learning without backpropagation for weight updates. To carry out the design space evaluation of the LSM for optimal hardware performance, several …
Continuous And Discrete Models For Optimal Harvesting In Fisheries, Nagham Abbas Al Qubbanchee
Continuous And Discrete Models For Optimal Harvesting In Fisheries, Nagham Abbas Al Qubbanchee
Masters Theses
"This work focuses on the logistic growth model, where the Gordon-Schaefer model is considered in continuous time. We view the Gordon-Schaefer model as a bioeconomic equation involved in the fishing business, considering biological rates, carrying capacity, and total marginal costs and revenues. In [25], the authors illustrate the analytical solution of the Schaefer model using the integration by parts method and two theorems. The theorems have many assumptions with many different strategies. Due to the nature of the problem, the optimal control system involves many equations and functions, such as the second root of the equation. We concentrate on Theorem …