Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Earth Sciences (58709)
- Computer Sciences (57896)
- Environmental Sciences (52353)
- Engineering (40188)
- Life Sciences (39752)
-
- Physics (36514)
- Chemistry (34505)
- Geology (29714)
- Mathematics (27371)
- Social and Behavioral Sciences (24559)
- Oceanography and Atmospheric Sciences and Meteorology (16420)
- Statistics and Probability (13243)
- Education (12801)
- Computer Engineering (12790)
- Soil Science (11973)
- Medicine and Health Sciences (11777)
- Plant Sciences (11181)
- Natural Resources and Conservation (10265)
- Arts and Humanities (9725)
- Astrophysics and Astronomy (9199)
- Electrical and Computer Engineering (8896)
- Sustainability (8673)
- Natural Resources Management and Policy (8565)
- Artificial Intelligence and Robotics (8475)
- Water Resource Management (8291)
- Applied Mathematics (7987)
- Environmental Health and Protection (6879)
- Science and Mathematics Education (6755)
- Databases and Information Systems (6717)
- Institution
-
- University of Nebraska - Lincoln (24230)
- Western Michigan University (19508)
- Selected Works (16838)
- University of Kentucky (12002)
- TÜBİTAK (10317)
-
- Singapore Management University (7445)
- Utah State University (7340)
- Missouri University of Science and Technology (6056)
- Old Dominion University (5947)
- University of Wollongong (4868)
- William & Mary (4602)
- University of South Florida (3859)
- Wright State University (3840)
- Portland State University (3797)
- University of Nevada, Las Vegas (3639)
- Louisiana State University (3417)
- China Simulation Federation (3363)
- City University of New York (CUNY) (3219)
- Brigham Young University (2906)
- Purdue University (2813)
- Air Force Institute of Technology (2678)
- Claremont Colleges (2640)
- California Polytechnic State University, San Luis Obispo (2553)
- Western Washington University (2456)
- University of Arkansas, Fayetteville (2433)
- University of Texas Rio Grande Valley (2419)
- Department of Primary Industries and Regional Development, Western Australia (2352)
- University of Texas at El Paso (2315)
- Chinese Chemical Society | Xiamen University (2294)
- Chulalongkorn University (2268)
- Keyword
-
- Machine learning (1686)
- Climate change (1680)
- Western Australia (1581)
- Mathematics (1369)
- Chemistry (1157)
-
- Sustainability (1141)
- Physics (1068)
- Water quality (983)
- Deep learning (890)
- Geology (858)
- Groundwater (851)
- Machine Learning (826)
- Simulation (824)
- Research and Technical Reports (797)
- Water (780)
- United States (757)
- Education (755)
- Management (745)
- Nebraska (744)
- Agriculture (718)
- Artificial intelligence (704)
- Climate (702)
- GIS (698)
- Statistics (685)
- Security (681)
- Grains and field crops (674)
- Environment (672)
- Computer Science (667)
- Ecology (657)
- Optimization (656)
- Publication Year
-
- 2024 (7799)
- 2023 (12566)
- 2022 (18295)
- 2021 (27876)
- 2020 (15205)
-
- 2019 (15926)
- 2018 (13643)
- 2017 (12520)
- 2016 (12675)
- 2015 (12617)
- 2014 (12299)
- 2013 (11461)
- 2012 (12196)
- 2011 (10326)
- 2010 (8620)
- 2009 (7616)
- 2008 (7321)
- 2007 (6758)
- 2006 (5872)
- 2005 (5573)
- 2004 (4447)
- 2003 (3876)
- 2002 (3435)
- 2001 (3030)
- 2000 (2919)
- 1999 (2555)
- 1998 (2574)
- 1997 (2472)
- 1996 (2437)
- 1995 (2193)
- Publication
-
- Legacy Scout Tickets from Pure Oil Company (11044)
- Theses and Dissertations (8341)
- IGC Proceedings (1993-2023) (7001)
- Research Collection School Of Computing and Information Systems (6884)
- Thin Sections (5745)
-
- Electronic Theses and Dissertations (4194)
- Faculty Publications (3783)
- Journal of System Simulation (3363)
- Nebraska Tractor Tests (3348)
- Turkish Journal of Electrical Engineering and Computer Sciences (3020)
- Masters Theses (2634)
- Turkish Journal of Chemistry (2628)
- Turkish Journal of Mathematics (2494)
- Journal of Electrochemistry (2294)
- Honors Theses (2158)
- Faculty of Informatics - Papers (Archive) (2013)
- Physics Faculty Publications (1942)
- Bulletin of the Mineral Research and Exploration (1893)
- Doctoral Dissertations (1882)
- Dissertations, Theses, and Masters Projects (1876)
- Reports (1835)
- Dissertations (1816)
- Physics Faculty Research & Creative Works (1762)
- Department of Computer Science Technical Reports (1721)
- USF Tampa Graduate Theses and Dissertations (1607)
- School of Natural Resources: Faculty Publications (1586)
- United States Department of Agriculture Wildlife Services: Staff Publications (1529)
- Australian Institute for Innovative Materials - Papers (1524)
- Electronic Thesis and Dissertation Repository (1476)
- All Graduate Theses and Dissertations, Spring 1920 to Summer 2023 (1427)
- Publication Type
Articles 16591 - 16620 of 302419
Full-Text Articles in Physical Sciences and Mathematics
Solving Turkish Math Word Problems By Sequence-To-Sequence Encoder-Decoder Models, Esi̇n Gedi̇k, Tunga Güngör
Solving Turkish Math Word Problems By Sequence-To-Sequence Encoder-Decoder Models, Esi̇n Gedi̇k, Tunga Güngör
Turkish Journal of Electrical Engineering and Computer Sciences
Solving math word problems (MWP) is a challenging task due to the semantic gap between natural language texts and mathematical equations. The main purpose of the task is to take a written math problem as input and produce a proper equation as output for solving that problem. This paper describes a sequence-to-sequence (seq2seq) neural model for automatically solving Turkish MWPs based on their semantic meanings in the text. It comprises a bidirectional encoder to comprehend the semantics of the problem by encoding the input sequence and a decoder with attention to extract the equation by tracking the semantic meanings of …
The Vehicle Routing Problem With Simultaneous Pickup And Delivery And Occasional Drivers, Vincent F. Yu, Grace Aloina, Panca Jodiawan, Aldy Gunawan, Tsung-C. Huang
The Vehicle Routing Problem With Simultaneous Pickup And Delivery And Occasional Drivers, Vincent F. Yu, Grace Aloina, Panca Jodiawan, Aldy Gunawan, Tsung-C. Huang
Research Collection School Of Computing and Information Systems
This research addresses the Vehicle Routing Problem with Simultaneous Pickup and Delivery and Occasional Drivers (VRPSPDOD), which is inspired from the importance of addressing product returns and the emerging notion of involving available crowds to perform pickup and delivery activities in exchange for some compensation. At the depot, a set of regular vehicles is available to deliver and/or pick up customers’ goods. A set of occasional drivers, each defined by their origin, destination, and flexibility, is also able to help serve the customers. The objective of VRPSPDOD is to minimize the total traveling cost of operating regular vehicles and total …
Specification-Based Autonomous Driving System Testing, Yuan Zhou, Yang Sun, Yun Tang, Yuqi Chen, Jun Sun, Christopher M. Poskitt, Yang Liu, Zijiang Yang
Specification-Based Autonomous Driving System Testing, Yuan Zhou, Yang Sun, Yun Tang, Yuqi Chen, Jun Sun, Christopher M. Poskitt, Yang Liu, Zijiang Yang
Research Collection School Of Computing and Information Systems
Autonomous vehicle (AV) systems must be comprehensively tested and evaluated before they can be deployed. High-fidelity simulators such as CARLA or LGSVL allow this to be done safely in very realistic and highly customizable environments. Existing testing approaches, however, fail to test simulated AVs systematically, as they focus on specific scenarios and oracles (e.g., lane following scenario with the "no collision" requirement) and lack any coverage criteria measures. In this paper, we propose AVUnit, a framework for systematically testing AV systems against customizable correctness specifications. Designed modularly to support different simulators, AVUnit consists of two new languages for specifying dynamic …
Design, Development, And Evaluation Of An Interactive Personalized Social Robot To Monitor And Coach Post-Stroke Rehabilitation Exercises, Min Hun Lee, Daniel P. Siewiorek, Asim Smailagic, Alexandre Bernardino, Sergi Bermudez I Badia
Design, Development, And Evaluation Of An Interactive Personalized Social Robot To Monitor And Coach Post-Stroke Rehabilitation Exercises, Min Hun Lee, Daniel P. Siewiorek, Asim Smailagic, Alexandre Bernardino, Sergi Bermudez I Badia
Research Collection School Of Computing and Information Systems
Socially assistive robots are increasingly being explored to improve the engagement of older adults and people with disability in health and well-being-related exercises. However, even if people have various physical conditions, most prior work on social robot exercise coaching systems has utilized generic, predefined feedback. The deployment of these systems still remains a challenge. In this paper, we present our work of iteratively engaging therapists and post-stroke survivors to design, develop, and evaluate a social robot exercise coaching system for personalized rehabilitation. Through interviews with therapists, we designed how this system interacts with the user and then developed an interactive …
Concept-Oriented Transformers For Visual Sentiment Analysis, Quoc Tuan Truong, Hady Wirawan Lauw
Concept-Oriented Transformers For Visual Sentiment Analysis, Quoc Tuan Truong, Hady Wirawan Lauw
Research Collection School Of Computing and Information Systems
In the richly multimedia Web, detecting sentiment signals expressed in images would support multiple applications, e.g., measuring customer satisfaction from online reviews, analyzing trends and opinions from social media. Given an image, visual sentiment analysis aims at recognizing positive or negative sentiment, and occasionally neutral sentiment as well. A nascent yet promising direction is Transformer-based models applied to image data, whereby Vision Transformer (ViT) establishes remarkable performance on largescale vision benchmarks. In addition to investigating the fitness of ViT for visual sentiment analysis, we further incorporate concept orientation into the self-attention mechanism, which is the core component of Transformer. The …
Generalizing Graph Neural Network Across Graphs And Time, Zhihao Wen
Generalizing Graph Neural Network Across Graphs And Time, Zhihao Wen
Research Collection School Of Computing and Information Systems
Graph-structured data widely exist in diverse real-world scenarios, analysis of these graphs can uncover valuable insights about their respective application domains. However, most previous works focused on learning node representation from a single fixed graph, while many real-world scenarios require representations to be quickly generated for unseen nodes, new edges, or entirely new graphs. This inductive ability is essential for high-throughtput machine learning systems. However, this inductive graph representation problem is quite difficult, compared to the transductive setting, for that generalizing to unseen nodes requires new subgraphs containing the new nodes to be aligned to the neural network trained already. …
Proactive Conversational Agents, Lizi Liao, Grace Hui Yang, Chirag Shah
Proactive Conversational Agents, Lizi Liao, Grace Hui Yang, Chirag Shah
Research Collection School Of Computing and Information Systems
Conversational agents, or commonly known as dialogue systems, have gained escalating popularity in recent years. Their widespread applications support conversational interactions with users and accomplishing various tasks as personal assistants. However, one key weakness in existing conversational agents is that they only learn to passively answer user queries via training on pre-collected and manually-labeled data. Such passiveness makes the interaction modeling and system-building process relatively easier, but it largely hinders the possibility of being human-like hence lowering the user engagement level. In this tutorial, we introduce and discuss methods to equip conversational agents with the ability to interact with end …
Green Data Analytics Of Supercomputing From Massive Sensor Networks: Does Workload Distribution Matter?, Zhiling Guo, Jin Li, Ram Ramesh
Green Data Analytics Of Supercomputing From Massive Sensor Networks: Does Workload Distribution Matter?, Zhiling Guo, Jin Li, Ram Ramesh
Research Collection School Of Computing and Information Systems
Energy costs represent a significant share of the total cost of ownership in high performance computing (HPC) systems. Using a unique data set collected by massive sensor networks in a peta scale national supercomputing center, we first present an explanatory model to identify key factors that affect energy consumption in supercomputing. Our analytic results show that, not only does computing node utilization significantly affect energy consumption, workload distribution among the nodes also has significant effects and could effectively be leveraged to improve energy efficiency. Next, we establish the high model performance using in-sample and out-of-sample analyses. We then develop prescriptive …
Blockscope: Detecting And Investigating Propagated Vulnerabilities In Forked Blockchain Projects, Xiao Yi, Yuzhou Fang, Daoyuan Wu, Lingxiao Jiang
Blockscope: Detecting And Investigating Propagated Vulnerabilities In Forked Blockchain Projects, Xiao Yi, Yuzhou Fang, Daoyuan Wu, Lingxiao Jiang
Research Collection School Of Computing and Information Systems
Due to the open-source nature of the blockchain ecosystem, it is common for new blockchains to fork or partially reuse the code of classic blockchains. For example, the popular Dogecoin, Litecoin, Binance BSC, and Polygon are all variants of Bitcoin/Ethereum. These “forked” blockchains thus could encounter similar vulnerabilities that are propagated from Bitcoin/Ethereum during forking or subsequently commit fetching. In this paper, we conduct a systematic study of detecting and investigating the propagated vulnerabilities in forked blockchain projects. To facilitate this study, we propose BlockScope, a novel tool that can effectively and efficiently detect multiple types of cloned vulnerabilities given …
Volere: Leakage Resilient User Authentication Based On Personal Voice Challenges, Rui Zhang, Zheng Yan, Xuerui Wang, Robert H. Deng
Volere: Leakage Resilient User Authentication Based On Personal Voice Challenges, Rui Zhang, Zheng Yan, Xuerui Wang, Robert H. Deng
Research Collection School Of Computing and Information Systems
Voiceprint Authentication as a Service (VAaS) offers great convenience due to ubiquity, generality, and usability. Despite its attractiveness, it suffers from user voiceprint leakage over the air or at the cloud, which intrudes user voice privacy and retards its wide adoption. The literature still lacks an effective solution on this issue. Traditional methods based on cryptography are too complex to be practically deployed while other approaches distort user voiceprints, which hinders accurate user identification. In this article, we propose a leakage resilient user authentication cloud service with privacy preservation based on random personal voice challenges, named VOLERE (VOice LEakage REsilient). …
Towards A Design Space For Storytelling On The Fashion Technology Runway, Sydney Pratte, Anthony Tang, Shannon Hoover, Maria Elena Hoover, Matt Laprarie, Catherine Larose, Lora Oehlberg
Towards A Design Space For Storytelling On The Fashion Technology Runway, Sydney Pratte, Anthony Tang, Shannon Hoover, Maria Elena Hoover, Matt Laprarie, Catherine Larose, Lora Oehlberg
Research Collection School Of Computing and Information Systems
Fashion is driven by a narrative, i.e. a story or idea that the designer wants to convey to the audience. Fashion-tech now adds another dimension to this narrative through dynamically changing aspects of the garments. Many factors of presentation in a runway show affect how fashion-tech garments communicate a story to the audience. In this pictorial, we review a set of twenty-eight storytelling fashion-tech garments. We identify, catalogue, and categorize the factors designers used to convey stories to the audience from the runway. The design space consists of three levels: (1) the artifact-level, (2) the viewer-level, and (3) the context-level. …
Investigating Guardian Awareness Techniques To Promote Safety In Virtual Reality, Sixuan Wu, Jiannan Li, Maurício Sousa, Tovi Grossman
Investigating Guardian Awareness Techniques To Promote Safety In Virtual Reality, Sixuan Wu, Jiannan Li, Maurício Sousa, Tovi Grossman
Research Collection School Of Computing and Information Systems
Virtual Reality (VR) can completely immerse users in a virtual world and provide little awareness of bystanders in the surrounding physical environment. Current technologies use predefined guardian area visualizations to set safety boundaries for VR interactions. However, bystanders cannot perceive these boundaries and may collide with VR users if they accidentally enter guardian areas. In this paper, we investigate four awareness techniques on mobile phones and smartwatches to help bystanders avoid invading guardian areas. These techniques include augmented reality boundary overlays and visual, auditory, and haptic alerts indicating bystanders' distance from guardians. Our findings suggest that the proposed techniques effectively …
A Review On Learning To Solve Combinatorial Optimisation Problems In Manufacturing, Cong Zhang, Yaoxin Wu, Yining Ma, Wen Song, Zhang Le, Zhiguang Cao, Jie Zhang
A Review On Learning To Solve Combinatorial Optimisation Problems In Manufacturing, Cong Zhang, Yaoxin Wu, Yining Ma, Wen Song, Zhang Le, Zhiguang Cao, Jie Zhang
Research Collection School Of Computing and Information Systems
An efficient manufacturing system is key to maintaining a healthy economy today. With the rapid development of science and technology and the progress of human society, the modern manufacturing system is becoming increasingly complex, posing new challenges to both academia and industry. Ever since the beginning of industrialisation, leaps in manufacturing technology have always accompanied technological breakthroughs from other fields, for example, mechanics, physics, and computational science. Recently, machine learning (ML) technology, one of the crucial subjects of artificial intelligence, has made remarkable progress in many areas. This study thoroughly reviews how ML, specifically deep (reinforcement) learning, motivates new ideas …
An Exploratory Study On Museum Visitor Ship Trends In Singapore, Aldy Gunawan, Chentao Liu, Heranshan S/O Subramaniam, Melissa Tan, Ranice Tan, Clarence Tay, Tasaporn. Visawameteekul
An Exploratory Study On Museum Visitor Ship Trends In Singapore, Aldy Gunawan, Chentao Liu, Heranshan S/O Subramaniam, Melissa Tan, Ranice Tan, Clarence Tay, Tasaporn. Visawameteekul
Research Collection School Of Computing and Information Systems
The COVID-19 outbreak has unpredictably disrupted the operations of numerous museums. Museum visitor experience has a physical, personal, and social context, which are not achievable during the pandemic. Despite the depreciation during the Circuit Breaker period, the disruption also presents an opportunity for local museums to develop new strategies of audience engagement to accommodate the altered audience behavior. This exploratory study analyses data from six Singapore-based museums to understand the visitorship patterns across different ages and genders. The impact of COVID-19 is also analysed. Using R-studio and relevant packages, we conducted statistical tests such as hypothesis testing, Chi-square testing and …
Heart: Motion-Resilient Heart Rate Monitoring With In-Ear Microphones, Kayla-Jade Butkow, Ting Dang, Andrea Ferlini, Dong Ma, Mascolo
Heart: Motion-Resilient Heart Rate Monitoring With In-Ear Microphones, Kayla-Jade Butkow, Ting Dang, Andrea Ferlini, Dong Ma, Mascolo
Research Collection School Of Computing and Information Systems
With the soaring adoption of in-ear wearables, the research community has started investigating suitable in-ear heart rate (HR) detection systems. HR is a key physiological marker of cardiovascular health and physical fitness. Continuous and reliable HR monitoring with wearable devices has therefore gained increasing attention in recent years. Existing HR detection systems in wearables mainly rely on photoplethysmography (PPG) sensors, however, these are notorious for poor performance in the presence of human motion. In this work, leveraging the occlusion effect that enhances low-frequency bone-conducted sounds in the ear canal, we investigate for the first time in-ear audio-based motion-resilient HR monitoring. …
Detecting C++ Compiler Front-End Bugs Via Grammar Mutation And Differential Testing, Haoxin Tu, He Jiang, Zhide Zhou, Yixuan Tang, Zhilei Ren, Lei Qiao, Lingxiao Jiang
Detecting C++ Compiler Front-End Bugs Via Grammar Mutation And Differential Testing, Haoxin Tu, He Jiang, Zhide Zhou, Yixuan Tang, Zhilei Ren, Lei Qiao, Lingxiao Jiang
Research Collection School Of Computing and Information Systems
C++ is a widely used programming language and the C++ front-end is a critical part of a C++ compiler. Although many techniques have been proposed to test compilers, few studies are devoted to detecting bugs in C++ compiler. In this study, we take the first step to detect bugs in C++ compiler front-ends. To do so, two main challenges need to be addressed, namely, the acquisition of test programs that are more likely to trigger bugs in compiler front-ends and the bug identification from complicated compiler outputs. In this article, we propose a novel framework named Ccoft to detect bugs …
Green Stormwater Infrastructure: A Critical Review Of The Barriers And Solutions To Widespread Implementation, Bardia Heidari, Sarah Priscilla Randle, Dean Minchillo, Fouad H. Jaber
Green Stormwater Infrastructure: A Critical Review Of The Barriers And Solutions To Widespread Implementation, Bardia Heidari, Sarah Priscilla Randle, Dean Minchillo, Fouad H. Jaber
Research Collection College of Integrative Studies
Rapid urbanization, aging infrastructure, and climate change impacts have put a strain on existing stormwater drainage systems. One commonly acknowledged solution to relieve such stress is Green Stormwater Infrastructure (GSI). Interest in GSI technology has been growing. However, the level of implementation in many areas around the world lags behind the interest level. This study aims to critically review the body of literature from the last decade to determine the main barriers to wide adoption and the offered solutions to overcome them. Based on a review of 92 peer-reviewed journal articles published between 2012 and 2022, we classify barriers and …
Climate Denialism Bullshit Is Harmful, Joshua Luczak
Climate Denialism Bullshit Is Harmful, Joshua Luczak
Research Collection College of Integrative Studies
This paper suggests that some climate denialism is bullshit. Those who spread it do not display a proper concern for the truth. This paper also shows that this bullshit is harmful in some significant ways. It undermines the epistemic demands imposed on us by what we care about, by the social roles we occupy, and by morality. It is also harmful because it corrodes epistemic trust.
Wearables For In-Situ Monitoring Of Cognitive States: Challenges And Opportunities, Meeralakshmi Radhakrishnan, Thivya Kandappu, Manoj Gulati, Archan Misra
Wearables For In-Situ Monitoring Of Cognitive States: Challenges And Opportunities, Meeralakshmi Radhakrishnan, Thivya Kandappu, Manoj Gulati, Archan Misra
Research Collection School Of Computing and Information Systems
We propose using wrist and ear-based sensing, via multiple novel and complementary modalities, to unobtrusively infer activity-aware, complex cognitive and affective states (such as confusion, boredom, and recall failure) of individuals. While state-of-the-art wearable devices are predominantly used (a) independently, with limited coordination among multiple devices, and (b) to capture macro-level physical activity and physiological state, we seek to expand the ambit of unobtrusive wearable sensing to capture the cognitive states while performing commonplace physical activities. Such states typically manifest via fine-grained, almost unobservable, microscopic head, face, and eye movements. We identify some of these fine-grained physical markers that serve …
Exploring And Repairing Gender Fairness Violations In Word Embedding-Based Sentiment Analysis Model Through Adversarial Patches, Lin Sze Khoo, Jia Qi Bay, Ming Lee Kimberly Yap, Mei Kuan Lim, Chun Yong Chong, Zhou Yang, David Lo
Exploring And Repairing Gender Fairness Violations In Word Embedding-Based Sentiment Analysis Model Through Adversarial Patches, Lin Sze Khoo, Jia Qi Bay, Ming Lee Kimberly Yap, Mei Kuan Lim, Chun Yong Chong, Zhou Yang, David Lo
Research Collection School Of Computing and Information Systems
With the advancement of sentiment analysis (SA) models and their incorporation into our daily lives, fairness testing on these models is crucial, since unfair decisions can cause discrimination to a large population. Nevertheless, some challenges in fairness testing include the unknown oracle, the difficulty in generating suitable test inputs, and the lack of a reliable way of fixing the issues. To fill in these gaps, BiasRV, a tool based on metamorphic testing (MT), was introduced and succeeded in uncovering fairness issues in a transformer-based model. However, the extent of unfairness in other SA models has not been thoroughly investigated. Our …
Effective Graph Kernels For Evolving Functional Brain Networks, Xinlei Wang, Jinyi Chen, Bing Tian Dai, Junchang Xin, Yu Gu, Ge Yu
Effective Graph Kernels For Evolving Functional Brain Networks, Xinlei Wang, Jinyi Chen, Bing Tian Dai, Junchang Xin, Yu Gu, Ge Yu
Research Collection School Of Computing and Information Systems
The graph kernel of the functional brain network is an effective method in the field of neuropsychiatric disease diagnosis like Alzheimer's Disease (AD). The traditional static brain networks cannot reflect dynamic changes of brain activities, but evolving brain networks, which are a series of brain networks over time, are able to seize such dynamic changes. As far as we know, the graph kernel method is effective for calculating the differences among networks. Therefore, it has a great potential to understand the dynamic changes of evolving brain networks, which are a series of chronological differences. However, if the conventional graph kernel …
Multi-Modal Api Recommendation, Ivana Clairine Irsan, Ting Zhang, Ferdian Thung, Kisub Kim, David Lo
Multi-Modal Api Recommendation, Ivana Clairine Irsan, Ting Zhang, Ferdian Thung, Kisub Kim, David Lo
Research Collection School Of Computing and Information Systems
Too many options can be a problem, which is the case for Application Programming Interfaces (APIs). As there are many such APIs, with many more being introduced periodically, it raises the problem of choosing which API to be recommended. Furthermore, numerous APIs are commonly used together with other complementary third-party APIs. It can be challenging for developers to understand how to use each API and to remember all the complementary APIs for the API they want to use. Therefore, an accurate API recommendation approach can improve developers' efficiency in implementing certain functionality. Several approaches have been developed to automatically recommend …
Prudex-Compass: Towards Systematic Evaluation Of Reinforcement Learning In Financial Markets, Shuo Sun, Molei Qin, Xinrun Wang, Bo An
Prudex-Compass: Towards Systematic Evaluation Of Reinforcement Learning In Financial Markets, Shuo Sun, Molei Qin, Xinrun Wang, Bo An
Research Collection School Of Computing and Information Systems
The financial markets, which involve more than $90 trillion market capitals, attract the attention of innumerable investors around the world. Recently, reinforcement learning in financial markets (FinRL) has emerged as a promising direction to train agents for making profitable investment decisions. However, the evaluation of most FinRL methods only focuses on profit-related measures and ignores many critical axes, which are far from satisfactory for financial practitioners to deploy these methods into real-world financial markets. Therefore, we introduce PRUDEX-Compass, which has 6 axes, i.e., Profitability, Risk-control, Universality, Diversity, rEliability, and eXplainability, with a total of 17 measures for a systematic evaluation. …
Spatio-Temporal Heterogeneity In The International Trade Resilience During Covid-19, Wei Luo, Lingfeng He, Zihui Yang, Shirui Zhang, Yong Wang, Dianbo Liu, Sheng Hu, Li He, Jizhe Xia, Min Chen
Spatio-Temporal Heterogeneity In The International Trade Resilience During Covid-19, Wei Luo, Lingfeng He, Zihui Yang, Shirui Zhang, Yong Wang, Dianbo Liu, Sheng Hu, Li He, Jizhe Xia, Min Chen
Research Collection School Of Computing and Information Systems
The COVID-19 pandemic and subsequent lockdowns have created immeasurable health and economic crises, leading to unprecedented disruptions to world trade. The COVID-19 pandemic shows diverse impacts on different economies that suffer and recover at different rates and degrees. This research aims to evaluate the spatio-temporal heterogeneity of international trade network vulnerabilities in the current crisis to understand the global production resilience and prepare for the future crisis. We applied a series of complex network analysis approaches to the monthly international trade networks at the world, regional, and country scales for the pre- and post- COVID-19 outbreak period. The spatio-temporal patterns …
Assessment Of Gnss Radio Occultation Data Assimilation In Numerical Weather Prediction Wind Forecasts, Gregory A. Egger
Assessment Of Gnss Radio Occultation Data Assimilation In Numerical Weather Prediction Wind Forecasts, Gregory A. Egger
Theses and Dissertations
A crucial component of weather forecasting in numerical weather prediction (NWP) is the analysis of the initial state of the atmosphere. Inaccurate analysis of the environment can lead to amplifying errors in the forecast which can cause devastating effects to the population and its resources. In this study, a weather model simulation was performed over the Pacific Northwest to evaluate wind speed forecast performance by assimilating Global Navigation Satellite System (GNSS) radio occultation (RO) data. Two separate events were examined: 24 - 26 October 2021 during which a strong extratropical cyclone struck the area, and 7 - 9 November 2021 …
Classification And Analysis Of Twitter Bot And Troll Accounts, Callan P. Mccormick
Classification And Analysis Of Twitter Bot And Troll Accounts, Callan P. Mccormick
Theses and Dissertations
This research trains, tests, and analyzes bot and troll classification models using publicly available, open source datasets. Specifically, it applies decision tree, random forest, feed forward neural networks, and long-short term memory neural networks with hyperparameters tuned via designed experiment to five labeled bot datasets created between 2011 and 2020 and one dataset labeling state-sponsored disinformation accounts or trolls. The first three models utilize account profile features, while the last model applies natural language processing techniques, specifically GloVe embedding, to analyze a user’s Tweet history. Results indicate that the random forest model outperforms the other three models with an average …
Distributed Reconnaissance Deception Using Software-Defined Networking In A Dynamic Network Environment, Richard Hunter Feustel
Distributed Reconnaissance Deception Using Software-Defined Networking In A Dynamic Network Environment, Richard Hunter Feustel
Theses and Dissertations
This research outlines the design and implementation of a DRDS, which is a RDS distributed across multiple controllers that is capable of deploying reconnaissance deception across multiple switches to mitigate network enumeration by a compromised host. This research outlines the design and development of the DRDS as well as tests its functional abilities and routing performance when compared to a two other network routing solutions: a legacy network solution and centralized ONOS controller scheme deploying layer 2 forwarding. The functional tests proved the system can properly route traffic across 100% of the tested scenarios carrying traffic that includes IP, ARP, …
Intel Total Memory Encryption: Functional Verification And Performance Analysis, Tallas Tian Sheng Goo
Intel Total Memory Encryption: Functional Verification And Performance Analysis, Tallas Tian Sheng Goo
Theses and Dissertations
While more attention is generally focused on software security, computer hardware security remains an important effort. Should an attacker gain direct physical access, computers with little to no hardware security can quickly be compromised via a manner of methods. One such attacker method is to steal information directly from the active memory of a locked, powered-on computer. To counter this attack, a hardware security method was developed called memory encryption. Memory encryption, as the name suggests, protects against adversary methods like cold boot attacks by encrypting all of memory. This research evaluates the efficacy and performance specifically of Intel TME. …
Characterizing Location-Based Electromagnetic Leakage Of Computing Devices Using Convolutional Neural Networks To Increase The Effectiveness Of Side-Channel Analysis Attacks, Ian C. Heffron
Theses and Dissertations
SCA attacks aim to recover some sort of secret information, often in the form of a cipher key, from a target device. Some of these attacks focus on either power-based leakage, or EM-based leakage. Neural networks have recently gained in popularity as tools in SCA attacks. Near-field EM probes with high-spatial resolution enable attackers to isolate physical locations above a processor. This enables attackers to exploit the spatial dependencies of algorithms running on said processor. These spatial dependencies result in different physical locations above a chip emanating different signal strengths. The strengths of different locations can be mapped using the …
Ensemble Aggregation In A Multi-Perspective Environment, Jonathan P. Nash
Ensemble Aggregation In A Multi-Perspective Environment, Jonathan P. Nash
Theses and Dissertations
Research towards improving the performance of artificial intelligence networks has found that larger and more complex networks tends to yield better results, and continuous hardware upgrades enables the development of larger, more complicated, and better performing neural networks. However, many devices that are widely available and more practical to everyday use, such as drones or smartphones, are unable to use the state-of-the-art neural networks because they simply do not have the processing capabilities to run them in addition to their normal function. It is possible to overcome this lower performance by using a variety of these smaller neural networks as …