Discovering The Needs Of People At The 10/40 Window With Data Science, 2018 Montemorelos University
Discovering The Needs Of People At The 10/40 Window With Data Science, Germán H. Alférez, Ceila M. González
Adventist Human-Subject Researchers Association
Abstract: We propose an approach to discover the needs of people in particular areas of Iraq, a country located at the 10/40 Window, by means of Data Science applied to Open Big Data. The resulting model predicts refugee crises and artillery attacks with high accuracy even in areas with scarce data.
The Case For It Training Within Guinea’S Ministry Of Agriculture: Evaluating Performance And Usability, 2018 Nova Southeastern University
The Case For It Training Within Guinea’S Ministry Of Agriculture: Evaluating Performance And Usability, Simon Cleveland
Simon Cleveland, Ph.D.
Tolerance Sensitivity Analysis And Robust Optimal Design Method Of A Surface-Mounted Permanent Magnet Motor By Using A Hybrid Response Surface Method Considering Manufacturing Tolerances, 2018 LG Electronics Inc.
Tolerance Sensitivity Analysis And Robust Optimal Design Method Of A Surface-Mounted Permanent Magnet Motor By Using A Hybrid Response Surface Method Considering Manufacturing Tolerances, Cha-Seung Jun, Byung-Il Kwon, Ohbong Kwon
Publications and Research
This paper presents a robust optimal design method using a hybrid response surface method (H-RSM) which directly finds an optimal point satisfying a target Z-value or a probability of failure. Through three steps, this paper achieves the goal that is to increase the open-circuit airgap flux (OCAF) in a surface-mounted permanent magnet motor and decrease its variation caused by variations of the airgap lengths including an additional one between permanent magnets and rotor back yoke. First, the OCAF equation is derived from the magnetic equivalent circuit (MEC) considering the additional airgap. Then, the equation is validated by comparing its results ...
Security Attacks On Reckless-Apps: "Remote Car Keyless Applications" For New Semi Autonomous Vehicles, 2018 James Madison University
Security Attacks On Reckless-Apps: "Remote Car Keyless Applications" For New Semi Autonomous Vehicles, Mohamed El-Tawab
Rapid technological advancements of vehicle manufacturing and the modern wireless technology opens the door for several new Intelligent Transportation applications. Remote Keyless system in vehicles is considered one of the famous applications that has been developed recently, which is susceptible to many cyberattacks. Remote Keyless applications on smartphones were developed in the past few years to perform the functionality of keyless fob and are expected to replace the physical keyless fobs in the next few years, which can open the door to many cyberattacks. In this research, we implemented a simulation that represents the REmote Car KeyLESS Applications (RECKLESS-apps) on ...
Solar And Rain Catching Canopy. Urban Oasis, 2018 CUNY New York City College of Technology
Solar And Rain Catching Canopy. Urban Oasis, Afolabi Ibitoye, Langston Clark, Elena Zimareva, Evan Banks, Alexander Aptekar
Publications and Research
The Urban Oasis is designed to work within existing “pocket parks” in New York City as a combined rainwater collector, personal electronics charging station and resting designation for New Yorkers. Intended to not only lessen the demand on the city power grid by using renewable energy to charge devices, the urban oasis is also intended to mitigate grey water overfill in New York’s combined sewer system and, in general, serve as a model for responsible environmental stewardship in urban areas.
The important technical aspects of the canopy specifically analyzed were:
a) how much rainwater could the canopy be expected ...
Clarity: An Exploration Of Semantic Information Encoded In Mobile Application Guis, 2018 College of William and Mary
Clarity: An Exploration Of Semantic Information Encoded In Mobile Application Guis, Michael J. Curcio
Undergraduate Honors Theses
Upon installing a mobile application, human beings are able, to a great extent, to know immediately what the subcomponents of the screen do. They know what buttons return them to the previous screen, which ones submit their log in information, and which brings up the menu. This is the result of a combination of intuitive design and cross-platform design standards which allow users to draw on previous experience. Regardless, the fact that humans are able to understand the functionality of screen components at a glance suggests that there is semantic information encode into a mobile application’s GUI. In this ...
The 3d Abstract Tile Assembly Model Is Intrinsically Universal, 2018 Iowa State University
The 3d Abstract Tile Assembly Model Is Intrinsically Universal, Aaron Koch, Daniel Hader, Matthew J. Patitz
Computer Science and Computer Engineering Undergraduate Honors Theses
In this paper, we prove that the three-dimensional abstract Tile Assembly Model (3DaTAM) is intrinsically universal. This means that there is a universal tile set in the 3DaTAM which can be used to simulate any 3DaTAM system. This result adds to a body of work on the intrinsic universality of models of self-assembly, and is specifically motivated by a result in FOCS 2016 showing that any intrinsically universal tile set for the 2DaTAM requires nondeterminism (i.e. undirectedness) even when simulating directed systems. To prove our result we have not only designed, but also fully implemented what we believe to ...
Comparison Of Google Image Search And Resnet Image Classification Using Image Similarity Metrics, 2018 University of Arkansas, Fayetteville
Comparison Of Google Image Search And Resnet Image Classification Using Image Similarity Metrics, David Smith
Computer Science and Computer Engineering Undergraduate Honors Theses
In this paper, we compare the results of ResNet image classification with the results of Google Image search. We created a collection of 1,000 images by performing ten Google Image searches with a variety of search terms. We classified each of these images using ResNet and inspected the results. The ResNet classifier predicted the category that matched the search term of the image 77.5% of the time. In our best case, with the search term “forklift”, the classifier categorized 92 of the 100 images as forklifts. In the worst case, for the category “hammer”, the classifier matched the ...
Maintainability Analysis Of Mining Trucks With Data Analytics., 2018 University of Louisville
Maintainability Analysis Of Mining Trucks With Data Analytics., Abdulgani Kahraman
Electronic Theses and Dissertations
The mining industry is one of the biggest industries in need of a large budget, and current changes in global economic challenges force the industry to reduce its production expenses. One of the biggest expenditures is maintenance. Thanks to the data mining techniques, available historical records of machines’ alarms and signals might be used to predict machine failures. This is crucial because repairing machines after failures is not as efficient as utilizing predictive maintenance. In this case study, the reasons for failures seem to be related to the order of signals or alarms, called events, which come from trucks. The ...
Detailed Power Measurement With Arm Embedded Boards, 2018 University of Maine
Detailed Power Measurement With Arm Embedded Boards, Yanxiang Mao
Electronic Theses and Dissertations
Power and energy are becoming important considerations in today's electronic equipment. The amount of power required to run a supercomputer for an hour could supply an ordinary household for many months. The need for low-power computing also extends to smaller devices, such as mobile phones, laptops and embedded devices.
In order to optimize power usage of electronic equipment, we need to collect information on the power consumption of these devices. Unfortunately it is not easy to do this on modern computing systems. Existing measuring equipment is often expensive, inaccurate, and difficult to operate. The main goal of this project ...
Comparative Study Of Deep Learning Models For Network Intrusion Detection, 2018 Southern Methodist University
Comparative Study Of Deep Learning Models For Network Intrusion Detection, Brian Lee, Sandhya Amaresh, Clifford Green, Daniel Engels
SMU Data Science Review
In this paper, we present a comparative evaluation of deep learning approaches to network intrusion detection. A Network Intrusion Detection System (NIDS) is a critical component of every Internet connected system due to likely attacks from both external and internal sources. A NIDS is used to detect network born attacks such as Denial of Service (DoS) attacks, malware replication, and intruders that are operating within the system. Multiple deep learning approaches have been proposed for intrusion detection systems. We evaluate three models, a vanilla deep neural net (DNN), self-taught learning (STL) approach, and Recurrent Neural Network (RNN) based Long Short ...
Distributed Iterative Graph Processing Using Nosql With Data Locality, 2018 Louisiana State University and Agricultural and Mechanical College
Distributed Iterative Graph Processing Using Nosql With Data Locality, Ayam Pokhrel
LSU Master's Theses
A tremendous amount of data is generated every day from a wide range of sources such as social networks, sensors, and application logs. Among them, graph data is one type that represents valuable relationships between various entities. Analytics of large graphs has become an essential part of business processes and scientific studies because it leads to deep and meaningful insights into the related domain based on the connections between various entities. However, the optimal processing of large-scale iterative graph computations is very challenging due to the issues like fault tolerance, high memory requirement, parallelization, and scalability. Most of the contemporary ...
Gradel, 2018 Cedarville University
Gradel, Emily R. Wolf, Christopher D. Brauns Ii, Timothy G. Smith Ii, Emmett Z. Budd
The Research and Scholarship Symposium (2013-2019)
A major problem facing Computer Science faculty members at Cedarville University is grading student assignments. Specifically, grading programming assignments can be a repetitive, time-consuming process which makes it prime for automation. Professors need a web application that takes student code, compiles it, and compares the output to what the professors provides as correct. Gradel, a senior design project, allows students to submit their code online and receive instant feedback based on professor-designed test cases. Furthermore, professors need to be able to keep track of what grades students earn on their projects, which is functionality Gradel provides. In addition to allowing ...
The Computer Modeling Of A Space Habitat: The City College Experience, 2018 College of New Rochelle
The Computer Modeling Of A Space Habitat: The City College Experience, Orlando Mcallister
No abstract provided.
Image Processing Applications In Real Life: 2d Fragmented Image And Document Reassembly And Frequency Division Multiplexed Imaging, 2018 Louisiana State University and Agricultural and Mechanical College
Image Processing Applications In Real Life: 2d Fragmented Image And Document Reassembly And Frequency Division Multiplexed Imaging, Houman Kamran Habibkhani
LSU Doctoral Dissertations
In this era of modern technology, image processing is one the most studied disciplines of signal processing and its applications can be found in every aspect of our daily life. In this work three main applications for image processing has been studied.
In chapter 1, frequency division multiplexed imaging (FDMI), a novel idea in the field of computational photography, has been introduced. Using FDMI, multiple images are captured simultaneously in a single shot and can later be extracted from the multiplexed image. This is achieved by spatially modulating the images so that they are placed at different locations in the ...
The E-Agriculture Research Landscape In South Africa: A Systematic Literature Review, 2018 Cape Peninsula University of Technology, Cape Town
The E-Agriculture Research Landscape In South Africa: A Systematic Literature Review, Alain Nzuzi Kintoki
The African Journal of Information Systems
Despite the growing interest in e-agriculture research in South Africa, academic studies have not sufficiently and deeply investigated the current e-agriculture research trends in the South African context. It is unclear how primary e-agriculture research in South Africa will aid both current and future generations to create new and better ways to transform agricultural development using this modern technology. This study sought to determine the current status of e-agriculture research in the South African context. A systematic literature review was used to gather and analyze data. The results indicate that 17 papers (26.5%) were published during the first two ...
A Sketch-Based Rapid Modeling Method For Crime Scene Presentation, 2018 Beijing Normal University
A Sketch-Based Rapid Modeling Method For Crime Scene Presentation, Pu Ren, Wuyang Shui, Jin Liu, Yachun Fan, Wenshuo Zhao, Mingquan Zhou
Journal of Digital Forensics, Security and Law
The reconstruction of crime scene plays an important role in digital forensic application. This article integrates computer graphics, sketch-based retrieval and virtual reality (VR) techniques to develop a low-cost and rapid 3D crime scene presentation approach, which can be used by investigators to analyze and simulate the criminal process. First, we constructed a collection of 3D models for indoor crime scenes using various popular techniques, including laser scanning, image-based modeling and geometric modeling. Second, to quickly obtain an object of interest from the 3D model database, a sketch-based retrieval method was proposed. Finally, a rapid modeling system that integrates our ...
Evaluating Classifiers' Optimal Performances Over A Range Of Misclassification Costs By Using Cost-Sensitive Classification, 2018 Louisiana State University and Agricultural and Mechanical College
Evaluating Classifiers' Optimal Performances Over A Range Of Misclassification Costs By Using Cost-Sensitive Classification, Ramy Al-Saffar
LSU Master's Theses
We believe that using the classification accuracy is not enough to evaluate the performances of classification algorithms. It can be misleading due to overlooking an important element which is the cost if classification is inaccurate. Furthermore, the Receiver Operational Characteristic (ROC) is one of the most popular graphs used to evaluate classifiers performances. However, one of the biggest ROC’s shortcomings is the assumption of equal costs for all misclassified data. Therefore, our goal is to reduce the total cost of decision making by selecting the classifier that has the least total misclassification cost. Nevertheless, the exact misclassification cost is ...
The Thermal-Constrained Real-Time Systems Design On Multi-Core Platforms -- An Analytical Approach, 2018 Florida International University
The Thermal-Constrained Real-Time Systems Design On Multi-Core Platforms -- An Analytical Approach, Shi Sha
FIU Electronic Theses and Dissertations
Over the past decades, the shrinking transistor size enabled more transistors to be integrated into an IC chip, to achieve higher and higher computing performances. However, the semiconductor industry is now reaching a saturation point of Moore’s Law largely due to soaring power consumption and heat dissipation, among other factors. High chip temperature not only significantly increases packing/cooling cost, degrades system performance and reliability, but also increases the energy consumption and even damages the chip permanently. Although designing 2D and even 3D multi-core processors helps to lower the power/thermal barrier for single-core architectures by exploring the thread ...
An Analysis Of Project Setup And Organization In Software, 2018 University of Nebraska-Lincoln
An Analysis Of Project Setup And Organization In Software, Adam Fitzgibbon
Honors Theses, University of Nebraska-Lincoln
The setup of a software project can greatly influence how efficiently software can be built. In this paper, I will be discussing my experiences with various software projects and their setups. These experiences will be used as a basis to draw conclusions on the strengths and weaknesses of specific project setups in certain situations.
Because of the complexity of building software, there isn’t a project setup that works optimally for solving every type of software-based problem. The best approach is to know what variations would best fit the situation and make design decisions from there.