Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Life Sciences (2403)
- Earth Sciences (2378)
- Computer Sciences (1907)
- Plant Sciences (1741)
- Soil Science (1718)
-
- Agronomy and Crop Sciences (1689)
- Agricultural Science (1665)
- Weed Science (1665)
- Plant Biology (1658)
- Plant Pathology (1653)
- Environmental Sciences (1238)
- Engineering (1101)
- Mathematics (773)
- Artificial Intelligence and Robotics (719)
- Chemistry (709)
- Physics (684)
- Social and Behavioral Sciences (577)
- Medicine and Health Sciences (530)
- Sustainability (400)
- Statistics and Probability (349)
- Education (333)
- Oceanography and Atmospheric Sciences and Meteorology (329)
- Applied Mathematics (316)
- Environmental Monitoring (285)
- Computer Engineering (270)
- Data Science (267)
- Environmental Indicators and Impact Assessment (262)
- Arts and Humanities (259)
- Environmental Health and Protection (247)
- Institution
-
- University of Kentucky (1694)
- Singapore Management University (317)
- Old Dominion University (248)
- TÜBİTAK (182)
- Missouri University of Science and Technology (181)
-
- University of Nebraska - Lincoln (175)
- China Coal Technology and Engineering Group (CCTEG) (171)
- Montana Tech Library (166)
- China Simulation Federation (159)
- University of Texas Rio Grande Valley (149)
- Portland State University (144)
- Utah State University (116)
- Claremont Colleges (114)
- Western Washington University (92)
- Michigan Technological University (90)
- Chapman University (88)
- Edith Cowan University (87)
- Kennesaw State University (87)
- Association of Arab Universities (86)
- University of New Mexico (84)
- Virginia Commonwealth University (80)
- University of Texas at El Paso (79)
- Chinese Academy of Sciences (73)
- City University of New York (CUNY) (72)
- Clemson University (69)
- Dartmouth College (68)
- University of Tennessee, Knoxville (67)
- Zayed University (65)
- Roseman University of Health Sciences (61)
- East Tennessee State University (60)
- Keyword
-
- Machine learning (145)
- Grazing (128)
- Artificial intelligence (116)
- Climate change (95)
- Deep learning (79)
-
- Sustainability (66)
- Machine Learning (63)
- Sheep (58)
- Artificial Intelligence (54)
- Cattle (53)
- Trifolium repens (52)
- Lolium perenne (47)
- Forage quality (46)
- Nitrogen (45)
- Technical Reports (40)
- UTEP Computer Science Department (40)
- Weather (40)
- Deep Learning (38)
- Forage (38)
- Pasture (38)
- Internship (37)
- AI (36)
- Management (36)
- Persistence (36)
- Cybersecurity (35)
- Climate (34)
- Conservation (34)
- Mathematics (34)
- Nutritive value (34)
- Optimization (34)
- Publication
-
- IGC Proceedings (1993-2023) (1651)
- Research Collection School Of Computing and Information Systems (273)
- Theses and Dissertations (177)
- Coal Geology & Exploration (171)
- Silver Bow Creek/Butte Area Superfund Site (164)
-
- Journal of System Simulation (159)
- Electronic Theses and Dissertations (108)
- Research outputs 2022 to 2026 (86)
- Journal of Engineering Research (83)
- Bulletin of Chinese Academy of Sciences (Chinese Version) (73)
- All Works (65)
- Michigan Tech Publications, Part 2 (64)
- Annual Research Symposium (61)
- Branch Mathematics and Statistics Faculty and Staff Publications (61)
- Journal of Humanistic Mathematics (59)
- ASEAN Journal on Science and Technology for Development (58)
- Doctoral Dissertations (58)
- Honors Theses (58)
- C-Day Computing Showcase (57)
- Biology and Medicine Through Mathematics Conference (53)
- All Graduate Theses and Dissertations, Fall 2023 to Present (52)
- Turkish Journal of Chemistry (52)
- Dissertations, Theses, and Capstone Projects (50)
- School of Mathematical and Statistical Sciences Faculty Publications and Presentations (49)
- Turkish Journal of Mathematics (48)
- Faculty Scholarship (46)
- Master's Theses (46)
- Masters Theses (46)
- Mathematics, Physics, and Computer Science Faculty Articles and Research (45)
- Physics Faculty Publications (42)
- Publication Type
Articles 4921 - 4950 of 7954
Full-Text Articles in Physical Sciences and Mathematics
Computational Modeling And Analysis Of Facial Expressions And Gaze For Discovery Of Candidate Behavioral Biomarkers For Children And Young Adults With Autism Spectrum Disorder, Megan Anita Witherow
Computational Modeling And Analysis Of Facial Expressions And Gaze For Discovery Of Candidate Behavioral Biomarkers For Children And Young Adults With Autism Spectrum Disorder, Megan Anita Witherow
Electrical & Computer Engineering Theses & Dissertations
Facial expression production and perception in autism spectrum disorder (ASD) suggest the potential presence of behavioral biomarkers that may stratify individuals on the spectrum into prognostic or treatment subgroups. High-speed internet and the ease of technology have enabled remote, scalable, affordable, and timely access to medical care, such as measurements of ASDrelated behaviors in familiar environments to complement clinical observation. Machine and deep learning (DL)-based analysis of video tracking (VT) of expression production and eye tracking (ET) of expression perception may aid stratification biomarker discovery for children and young adults with ASD. However, there are open challenges in 1) facial …
Broadband Dielectric Spectroscopic Detection Of Volatile Organic Compounds With Zinc Oxide And Metal-Organic Frameworks As Solid-State Sensor Materials, Papa Kojo Amoah
Broadband Dielectric Spectroscopic Detection Of Volatile Organic Compounds With Zinc Oxide And Metal-Organic Frameworks As Solid-State Sensor Materials, Papa Kojo Amoah
Electrical & Computer Engineering Theses & Dissertations
The industrial revolution drove technological progress but also increased the release of harmful pollutants, posing significant risks to human health and the environment. Volatile organic compounds (VOCs), which have various anthropogenic and natural sources, are particularly concerning due to their impact on public health, especially in urban areas. Addressing these adverse effects requires comprehensive strategies for mitigation as traditional gas sensing techniques have limitations and there is a need for innovative approaches to VOC detection.
VOCs encompass a diverse group of chemicals with high volatility, emitted from various human activities and natural sources. These compounds play a crucial role in …
Editorial: Emerging On-Demand Passenger And Logistics Systems: Modelling, Optimization, And Data Analytics, Jintao Ke, Hai Wang, Neda Masoud, Maximilian Schiffer, Goncalo H. A. Correia
Editorial: Emerging On-Demand Passenger And Logistics Systems: Modelling, Optimization, And Data Analytics, Jintao Ke, Hai Wang, Neda Masoud, Maximilian Schiffer, Goncalo H. A. Correia
Research Collection School Of Computing and Information Systems
The proliferation of smart personal devices and mobile internet access has fueled numerous advancements in on-demand transportation services. These services are facilitated by online digital platforms and range from providing rides to delivering products. Their influence is transforming transportation systems and leaving a mark on changing individual mobility, activity patterns, and consumption behaviors. For instance, on-demand transportation companies such as Uber, Lyft, Grab, and DiDi have become increasingly vital for meeting urban transportation needs by connecting available drivers with passengers in real time. The recent surge in door-to-door food delivery (e.g., Uber Eats, DoorDash, Meituan); grocery delivery (e.g., Amazon Fresh, …
Marco: A Stochastic Asynchronous Concolic Explorer, Jie Hu, Yue Duan, Heng Yin
Marco: A Stochastic Asynchronous Concolic Explorer, Jie Hu, Yue Duan, Heng Yin
Research Collection School Of Computing and Information Systems
Concolic execution is a powerful program analysis technique for code path exploration. Despite recent advances that greatly improved the efficiency of concolic execution engines, path constraint solving remains a major bottleneck of concolic testing. An intelligent scheduler for inputs/branches becomes even more crucial. Our studies show that the previously under-studied branch-flipping policy adopted by state-of-the-art concolic execution engines has several limitations. We propose to assess each branch by its potential for new code coverage from a global view, concerning the path divergence probability at each branch. To validate this idea, we implemented a prototype Marco and evaluated it against the …
Teaching Software Development For Real-World Problems Using A Microservice-Based Collaborative Problem-Solving Approach, Yi Meng Lau, Christian Michael Koh, Lingxiao Jiang
Teaching Software Development For Real-World Problems Using A Microservice-Based Collaborative Problem-Solving Approach, Yi Meng Lau, Christian Michael Koh, Lingxiao Jiang
Research Collection School Of Computing and Information Systems
Experienced and skillful software developers are needed in organizations to develop software products effective for their business with shortened time-to-market. Such developers will not only need to code but also be able to work in teams and collaboratively solve real-world problems that organizations arefacing. It is challenging for educators to nurture students to become such developers with strong technical, social, and cognitive skills. Towards addressing the challenge, this study presents a Collaborative Software Development Project Framework for a course that focuses on learning microservices architectures anddeveloping a software application for a real-world business. Students get to work in teams to …
W4-Groups: Modeling The Who, What, When And Where Of Group Behavior Via Mobility Sensing, Akansha Atrey, Camellia Zakaria, Rajesh Krishna Balan, Prashant Shenoy
W4-Groups: Modeling The Who, What, When And Where Of Group Behavior Via Mobility Sensing, Akansha Atrey, Camellia Zakaria, Rajesh Krishna Balan, Prashant Shenoy
Research Collection School Of Computing and Information Systems
Human social interactions occur in group settings of varying sizes and locations, depending on the type of social activity. The ability to distinguish group formations based on their purposes transforms how group detection mechanisms function. Not only should such tools support the effective detection of serendipitous encounters, but they can derive categories of relation types among users. Determining who is involved, what activity is performed, and when and where the activity occurs are critical to understanding group processes in greater depth, including supporting goal-oriented applications (e.g., performance, productivity, and mental health) that require sensing social factors. In this work, we …
Improving Automated Code Reviews: Learning From Experience, Hong Yi Lin, Patanamon Thongtanunam, Christoph Treude, Wachiraphan Charoenwet
Improving Automated Code Reviews: Learning From Experience, Hong Yi Lin, Patanamon Thongtanunam, Christoph Treude, Wachiraphan Charoenwet
Research Collection School Of Computing and Information Systems
Modern code review is a critical quality assurance process that is widely adopted in both industry and open source software environments. This process can help newcomers learn from the feedback of experienced reviewers; however, it often brings a large workload and stress to reviewers. To alleviate this burden, the field of automated code reviews aims to automate the process, teaching large language models to provide reviews on submitted code, just as a human would. A recent approach pre-trained and fine-tuned the code intelligent language model on a large-scale code review corpus. However, such techniques did not fully utilise quality reviews …
Dronlomaly: Runtime Log-Based Anomaly Detector For Dji Drones, Wei Minn, Naing Tun Yan, Lwin Khin Shar, Lingxiao Jiang
Dronlomaly: Runtime Log-Based Anomaly Detector For Dji Drones, Wei Minn, Naing Tun Yan, Lwin Khin Shar, Lingxiao Jiang
Research Collection School Of Computing and Information Systems
We present an automated tool for realtime detection of anomalous behaviors while a DJI drone is executing a flight mission. The tool takes sensor data logged by drone at fixed time intervals and performs anomaly detection using a Bi-LSTM model. The model is trained on baseline flight logs from a successful mission physically or via a simulator. The tool has two modules --- the first module is responsible for sending the log data to the remote controller station, and the second module is run as a service in the remote controller station powered by a Bi-LSTM model, which receives the …
Extracting Relevant Test Inputs From Bug Reports For Automatic Test Case Generation, Wendkuuni C. Ouédraogo, Laura Plein, Kader Kaboré, Andrew Habib, Jacques Klein, David Lo, Tegawende F. Bissyandé
Extracting Relevant Test Inputs From Bug Reports For Automatic Test Case Generation, Wendkuuni C. Ouédraogo, Laura Plein, Kader Kaboré, Andrew Habib, Jacques Klein, David Lo, Tegawende F. Bissyandé
Research Collection School Of Computing and Information Systems
The pursuit of automating software test case generation, particularly for unit tests, has become increasingly important due to the labor-intensive nature of manual test generation [6]. However, a significant challenge in this domain is the inability of automated approaches to generate relevant inputs, which compromises the efficacy of the tests [6].
Test Optimization In Dnn Testing: A Survey, Qiang Hu, Yuejun Guo, Xiaofei Xie, Maxime Cordy, Lei Ma, Mike Papadakis, Yves Le Traon
Test Optimization In Dnn Testing: A Survey, Qiang Hu, Yuejun Guo, Xiaofei Xie, Maxime Cordy, Lei Ma, Mike Papadakis, Yves Le Traon
Research Collection School Of Computing and Information Systems
This article presents a comprehensive survey on test optimization in deep neural network (DNN) testing. Here, test optimization refers to testing with low data labeling effort. We analyzed 90 papers, including 43 from the software engineering (SE) community, 32 from the machine learning (ML) community, and 15 from other communities. Our study: (i) unifies the problems as well as terminologies associated with low-labeling cost testing, (ii) compares the distinct focal points of SE and ML communities, and (iii) reveals the pitfalls in existing literature. Furthermore, we highlight the research opportunities in this domain.
Code Search Is All You Need? Improving Code Suggestions With Code Search, Junkai Chen, Xing Hu, Zhenhao Li, Cuiyun Gao, Xin Xia, David Lo
Code Search Is All You Need? Improving Code Suggestions With Code Search, Junkai Chen, Xing Hu, Zhenhao Li, Cuiyun Gao, Xin Xia, David Lo
Research Collection School Of Computing and Information Systems
Modern integrated development environments (IDEs) provide various automated code suggestion techniques (e.g., code completion and code generation) to help developers improve their efficiency. Such techniques may retrieve similar code snippets from the code base or leverage deep learning models to provide code suggestions. However, how to effectively enhance the code suggestions using code retrieval has not been systematically investigated. In this paper, we study and explore a retrieval-augmented framework for code suggestions. Specifically, our framework leverages different retrieval approaches and search strategies to search similar code snippets. Then the retrieved code is used to further enhance the performance of language …
Unveiling Memorization In Code Models, Zhou Yang, Zhipeng Zhao, Chenyu Wang, Jieke Shi, Dongsun Kim, Donggyun Han, David Lo
Unveiling Memorization In Code Models, Zhou Yang, Zhipeng Zhao, Chenyu Wang, Jieke Shi, Dongsun Kim, Donggyun Han, David Lo
Research Collection School Of Computing and Information Systems
The availability of large-scale datasets, advanced architectures, and powerful computational resources have led to effective code models that automate diverse software engineering activities. The datasets usually consist of billions of lines of code from both open-source and private repositories. A code model memorizes and produces source code verbatim, which potentially contains vulnerabilities, sensitive information, or code with strict licenses, leading to potential security and privacy issues.This paper investigates an important problem: to what extent do code models memorize their training data? We conduct an empirical study to explore memorization in large pre-trained code models. Our study highlights that simply extracting …
Greening Large Language Models Of Code, Jieke Shi, Zhou Yang, Hong Jin Kang, Bowen Xu, Junda He, David Lo
Greening Large Language Models Of Code, Jieke Shi, Zhou Yang, Hong Jin Kang, Bowen Xu, Junda He, David Lo
Research Collection School Of Computing and Information Systems
Large language models of code have shown remarkable effectiveness across various software engineering tasks. Despite the availability of many cloud services built upon these powerful models, there remain several scenarios where developers cannot take full advantage of them, stemming from factors such as restricted or unreliable internet access, institutional privacy policies that prohibit external transmission of code to third-party vendors, and more. Therefore, developing a compact, efficient, and yet energy-saving model for deployment on developers' devices becomes essential.To this aim, we propose Avatar, a novel approach that crafts a deployable model from a large language model of code by optimizing …
Coca: Improving And Explaining Graph Neural Network-Based Vulnerability Detection Systems, Sicong Cao, Xiaobing Sun, Xiaoxue Wu, David Lo, Lili Bo, Bin Li, Wei Liu
Coca: Improving And Explaining Graph Neural Network-Based Vulnerability Detection Systems, Sicong Cao, Xiaobing Sun, Xiaoxue Wu, David Lo, Lili Bo, Bin Li, Wei Liu
Research Collection School Of Computing and Information Systems
Recently, Graph Neural Network (GNN)-based vulnerability detection systems have achieved remarkable success. However, the lack of explainability poses a critical challenge to deploy black-box models in security-related domains. For this reason, several approaches have been proposed to explain the decision logic of the detection model by providing a set of crucial statements positively contributing to its predictions. Unfortunately, due to the weakly-robust detection models and suboptimal explanation strategy, they have the danger of revealing spurious correlations and redundancy issue.In this paper, we propose Coca, a general framework aiming to 1) enhance the robustness of existing GNN-based vulnerability detection models to …
Exploiting Library Vulnerability Via Migration-Based Automated Test Generation, Zirui Chen, Xing Hu, Xin Xia, Yi Gao, Tongtong Xu, David Lo, Xiaohu Yang
Exploiting Library Vulnerability Via Migration-Based Automated Test Generation, Zirui Chen, Xing Hu, Xin Xia, Yi Gao, Tongtong Xu, David Lo, Xiaohu Yang
Research Collection School Of Computing and Information Systems
In software development, developers extensively utilize third-party libraries to avoid implementing existing functionalities. When a new third-party library vulnerability is disclosed, project maintainers need to determine whether their projects are affected by the vulnerability, which requires developers to invest substantial effort in assessment. However, existing tools face a series of issues: static analysis tools produce false alarms, dynamic analysis tools require existing tests and test generation tools have low success rates when facing complex vulnerabilities.Vulnerability exploits, as code snippets provided for reproducing vulnerabilities after disclosure, contain a wealth of vulnerability-related information. This study proposes a new method based on vulnerability …
Curiosity-Driven Testing For Sequential Decision-Making Process, Junda He, Zhou Yang, Jieke Shi, Chengran Yang, Kisub Kim, Bowen Xu, Xin Zhou, David Lo
Curiosity-Driven Testing For Sequential Decision-Making Process, Junda He, Zhou Yang, Jieke Shi, Chengran Yang, Kisub Kim, Bowen Xu, Xin Zhou, David Lo
Research Collection School Of Computing and Information Systems
Sequential decision-making processes (SDPs) are fundamental for complex real-world challenges, such as autonomous driving, robotic control, and traffic management. While recent advances in Deep Learning (DL) have led to mature solutions for solving these complex problems, SDMs remain vulnerable to learning unsafe behaviors, posing significant risks in safety-critical applications. However, developing a testing framework for SDMs that can identify a diverse set of crash-triggering scenarios remains an open challenge. To address this, we propose CureFuzz, a novel curiosity-driven black-box fuzz testing approach for SDMs. CureFuzz proposes a curiosity mechanism that allows a fuzzer to effectively explore novel and diverse scenarios, …
Deep Reinforcement Learning For Dynamic Algorithm Selection: A Proof-Of-Principle Study On Differential Evolution, Hongshu Guo, Yining Ma, Zeyuan Ma, Jiacheng Chen, Xinglin Zhang, Zhiguang Cao, Jun Zhang, Yue-Jiao Gong
Deep Reinforcement Learning For Dynamic Algorithm Selection: A Proof-Of-Principle Study On Differential Evolution, Hongshu Guo, Yining Ma, Zeyuan Ma, Jiacheng Chen, Xinglin Zhang, Zhiguang Cao, Jun Zhang, Yue-Jiao Gong
Research Collection School Of Computing and Information Systems
Evolutionary algorithms, such as differential evolution, excel in solving real-parameter optimization challenges. However, the effectiveness of a single algorithm varies across different problem instances, necessitating considerable efforts in algorithm selection or configuration. This article aims to address the limitation by leveraging the complementary strengths of a group of algorithms and dynamically scheduling them throughout the optimization progress for specific problems. We propose a deep reinforcement learning-based dynamic algorithm selection framework to accomplish this task. Our approach models the dynamic algorithm selection a Markov decision process, training an agent in a policy gradient manner to select the most suitable algorithm according …
Discovering Significant Topics From Legal Decisions With Selective Inference, Jerrold Tsin Howe Soh
Discovering Significant Topics From Legal Decisions With Selective Inference, Jerrold Tsin Howe Soh
Research Collection Yong Pung How School Of Law
We propose and evaluate an automated pipeline for discovering significant topics from legal decision texts by passing features synthesized with topic models through penalized regressions and post-selection significance tests. The method identifies case topics significantly correlated with outcomes, topic-word distributions which can be manually interpreted to gain insights about significant topics, and case-topic weights which can be used to identify representative cases for each topic. We demonstrate the method on a new dataset of domain name disputes and a canonical dataset of European Court of Human Rights violation cases. Topic models based on latent semantic analysis as well as language …
State Energy Research Center, University Of North Dakota. Energy And Environmental Research Center
State Energy Research Center, University Of North Dakota. Energy And Environmental Research Center
EERC Brochures and Fact Sheets
Fact sheet about the Energy & Environmental Research Center and its role as North Dakota's State Energy Research Center (SERC). Includes SERC accomplishments.
Reevaluating The Origin Of Detectable Cataclysmic Variables In Globular Clusters: Testing The Importance Of Dynamics, Liliana Rivera Sandoval, Diogo Belloni, Miriam Ramos Arevalo
Reevaluating The Origin Of Detectable Cataclysmic Variables In Globular Clusters: Testing The Importance Of Dynamics, Liliana Rivera Sandoval, Diogo Belloni, Miriam Ramos Arevalo
Physics and Astronomy Faculty Publications and Presentations
Based on the current detectable cataclysmic variable (CV) population in Galactic globular clusters (GCs), we show that there is not a clear relation between the number of sources per unit of mass and the stellar encounter rate, the cluster mass, or the cluster central density. If any, only in the case of core-collapsed GCs could there be an anticorrelation with the stellar encounter rate. Our findings contrast with previous studies where clear positive correlations were identified. Our results suggest that correlations between faint X-ray sources, from which often conclusions for the CV population are drawn, and the GC parameters considered …
Exploring N-H Bond Activation And C-H Bond Activation By Tripodal Tris(Nitroxide) Aluminum And Gallium Complexes, Vivian W. Guo , '24
Exploring N-H Bond Activation And C-H Bond Activation By Tripodal Tris(Nitroxide) Aluminum And Gallium Complexes, Vivian W. Guo , '24
Senior Theses, Projects, and Awards
The activation of H–X (X = O, N, C) bonds is a common primary step in introducing alcohols, amines, and hydrocarbons into catalytic processes used in various industries. Precious metal complexes are commonly used as catalysts to activate H–X bonds through formal metal-based oxidative addition. However, since precious metals are scarce, expensive, toxic, and environmentally harmful, developing non-precious metal coordination complexes for H–X bond activation is essential. As a result, we investigate the activation of O–H, N–H, and C–H bonds through tripodal tris(nitroxide) aluminum and gallium complexes to develop a green strategy for broad-based H–X bond activation. Past members of …
A Computer Vision Solution To Cross-Cultural Food Image Classification And Nutrition Logging, Rohan Sethi, George K. Thiruvathukal
A Computer Vision Solution To Cross-Cultural Food Image Classification And Nutrition Logging, Rohan Sethi, George K. Thiruvathukal
Computer Science: Faculty Publications and Other Works
The US is a culturally and ethnically diverse country, and with this diversity comes a myriad of cuisines and eating habits that expand well beyond that of western culture. Each of these meals have their own good and bad effects when it comes to the nutritional value and its potential impact on human health. Thus, there is a greater need for people to be able to access the nutritional profile of their diverse daily meals and better manage their health. A revolutionary solution to democratize food image classification and nutritional logging is using deep learning to extract that information from …
Large Sample Statistical Study Of Three-Dimensional Magnetic Reconnection At The Swarthmore Spheromak Experiment, Solomon Murdock , '24
Large Sample Statistical Study Of Three-Dimensional Magnetic Reconnection At The Swarthmore Spheromak Experiment, Solomon Murdock , '24
Senior Theses, Projects, and Awards
Many plasmas can be described by ideal magnetohydrodynamics (MHD). A key result of ideal MHD is the frozen-in-flux theorem which states that the magnetic field stretches and bends with the motion of the plasma. The frozen-in-flux theorem is violated during magnetic reconnection, the annihilation of magnetic flux within a plasma. During reconnection, non-ideal MHD effects dominate plasma dynamics. The dynamics of magnetic reconnection is an unsolved problem in plasma physics. Most prior laboratory studies of magnetic reconnection examined reconnection in 2D scenarios, scenarios with a single ignorable coordinate. The SSX device was used to merge twisted ropes of plasma called …
Integrating Artificial Intelligence For Automated Storytelling In Turn-Based Strategy Games, Timothy Ripper
Integrating Artificial Intelligence For Automated Storytelling In Turn-Based Strategy Games, Timothy Ripper
Theses
This project is inspired by turn-based strategy games, Final Fantasy Tactics, X-Com 2, and modern turn-based strategy games. This project is structured around the use of artificial intelligence for storytelling within strategy games. The focus of this project utilizes artificial intelligence in creating a quest generation system for storytelling. The resulting quest system creates new quests dynamically after communicating with an artificial intelligence allowing players to potentially experience an ever-expanding story from quests
Graph Neural Network Guided By Feature Selection And Centrality Measures For Node Classification On Homophilic And Heterophily Graphs, Asmaa M. Mahmoud, Heba F. Eid, Abeer S. Desuky, Hoda A. Ali
Graph Neural Network Guided By Feature Selection And Centrality Measures For Node Classification On Homophilic And Heterophily Graphs, Asmaa M. Mahmoud, Heba F. Eid, Abeer S. Desuky, Hoda A. Ali
Al-Azhar Bulletin of Science
One of the most recent developments in the fields of deep learning and machine learning is Graph Neural Networks (GNNs). GNNs core task is the feature aggregation stage, which is carried out over the node's neighbours without taking into account whether the features are relevant or not. Additionally, the majority of these existing node representation techniques only consider the network's topology structure while completely ignoring the centrality information. In this paper, a new technique for explaining graph features depending on four different feature selection approaches and centrality measures in order to identify the important nodes and relevant node features is …
Multi-Aspect Rule-Based Ai: Methods, Taxonomy, Challenges And Directions Towards Automation, Intelligence And Transparent Cybersecurity Modeling For Critical Infrastructures, Iqbal H. Sarker, Helge Janicke, Mohamed A. Ferrag, Alsharif Abuadbba
Multi-Aspect Rule-Based Ai: Methods, Taxonomy, Challenges And Directions Towards Automation, Intelligence And Transparent Cybersecurity Modeling For Critical Infrastructures, Iqbal H. Sarker, Helge Janicke, Mohamed A. Ferrag, Alsharif Abuadbba
Research outputs 2022 to 2026
Critical infrastructure (CI) typically refers to the essential physical and virtual systems, assets, and services that are vital for the functioning and well-being of a society, economy, or nation. However, the rapid proliferation and dynamism of today's cyber threats in digital environments may disrupt CI functionalities, which would have a debilitating impact on public safety, economic stability, and national security. This has led to much interest in effective cybersecurity solutions regarding automation and intelligent decision-making, where AI-based modeling is potentially significant. In this paper, we take into account “Rule-based AI” rather than other black-box solutions since model transparency, i.e., human …
Matrix Profile Data Mining For Bgp Anomaly Detection, Ben A. Scott, Michael N. Johnstone, Patryk Szewczyk, Steven Richardson
Matrix Profile Data Mining For Bgp Anomaly Detection, Ben A. Scott, Michael N. Johnstone, Patryk Szewczyk, Steven Richardson
Research outputs 2022 to 2026
The Border Gateway Protocol (BGP), acting as the communication protocol that binds the Internet, remains vulnerable despite Internet security advancements. This is not surprising, as the Internet was not designed to be resilient to cyber-attacks, therefore the detection of anomalous activity was not of prime importance to the Internet creators. Detection of BGP anomalies can potentially provide network operators with an early warning system to focus on protecting networks, systems, and infrastructure from significant impact, improve security posture and resilience, while ultimately contributing to a secure global Internet environment. In this paper, we present a novel technique for the detection …
Nonstationary Recharge Responses To A Drying Climate In The Gnangara Groundwater System, Western Australia, Simone Gelsinari, Sarah Bourke, James Mccallum, Don Mcfarlane, Joel Hall, Richard Silberstein, Sally Thompson
Nonstationary Recharge Responses To A Drying Climate In The Gnangara Groundwater System, Western Australia, Simone Gelsinari, Sarah Bourke, James Mccallum, Don Mcfarlane, Joel Hall, Richard Silberstein, Sally Thompson
Research outputs 2022 to 2026
The response of groundwater recharge to climate change needs to be understood to enable sustainable management of groundwater systems today and in the future, yet observations of recharge over long-enough time periods to reveal responses to climate trends are scarce. Here we present a meta-analysis of 60 years of recharge studies over the Gnangara Groundwater System of South-West Western Australia, covering a period of sustained drying consistent with climate change projections. The recharge process in the area is defined by a wet winter during which rain saturates a deep, highly permeable soil profile with very low water storage capacity. Measurements …
Analyzing The Influence Of Design And Operating Conditions On Combustion And Emissions In Premixed Turbulent Flames: A Comprehensive Review, Medhat Elkelawy Prof. Dr. Eng., E. A. El Shenawy Prof. Dr., Hagar Alm-Eldin Bastawissi, Ibrahim Ali Mousa Eng., Mohamed M. Abdel-Raouf Ibrahim Dr. Eng.
Analyzing The Influence Of Design And Operating Conditions On Combustion And Emissions In Premixed Turbulent Flames: A Comprehensive Review, Medhat Elkelawy Prof. Dr. Eng., E. A. El Shenawy Prof. Dr., Hagar Alm-Eldin Bastawissi, Ibrahim Ali Mousa Eng., Mohamed M. Abdel-Raouf Ibrahim Dr. Eng.
Journal of Engineering Research
Recently, premixed combustion has dominated the field of combustion research worldwide. The current work is a review that addresses the effects of design and operating regimes on the combustion and emission characteristics of premixed turbulent flames. The study accounts for recent developments aimed at overcoming combustor operability issues that influence emissions and flame stability. Various experimental setups have been utilized in investigations, with results pertaining to performance and emissions concerning premixed turbulent flames. Thus, the objective of this paper is to provide a comprehensive review of the effects of swirl vane angles and equivalence fuel-air ratios for tests conducted both …
Building For Safety: Design Considerations For Refuge Areas In Tall Buildings From Quality Management Perspective, Enass. A. Salama, Heba. M. Gaber, Ahmed. M. Selim
Building For Safety: Design Considerations For Refuge Areas In Tall Buildings From Quality Management Perspective, Enass. A. Salama, Heba. M. Gaber, Ahmed. M. Selim
Journal of Engineering Research
New El Alamein City is one of the largest urban projects in Egypt, and the largest project on the north coast. Tall buildings (super high-rise buildings) are considered the prevailing trend by architectural designers to obtain the maximum view of the Mediterranean Sea. The provision of safety evacuation in emergencies for these buildings’ occupants is a crucial challenge from the Quality management point of view. In contrast, there are no sufficient architectural design guidelines for the tall buildings provided by the Egyptian code for protecting buildings from fire, especially the design of the refuge areas. This study aims to investigate …