Search Results

911 Services and Vital Sign Measurement Utilizing Mobile Phone Sensors and Applications
Patent relating to improved methods for utilizing 911 services and for implementing 911 dispatch protocols by accessing mobile phone sensors and applications.
2021 GenCyber Grant Program University of North Texas
Data management plan for the University of North Texas GenCyber Academy grant. The GenCyber Cybersecurity Program at the University of North Texas is part of the GenCyber program. The program is hosted by the Department of Computer Science and Engineering. The mission as part of the GenCyber program is to engage students at an early age in cybersecurity field and inspire them to become skilled cybersecurity professionals. This is provided by free summer cybersecurity camps for North Texas middle and high school students (7th-11th grade). The goals of the summer camps are to help students at an early age to understand correct and safe on-line behavior, increase students' interest in cybersecurity careers and improve diversity in the cybersecurity workforce of the nation.
2021 NCAE-C-002 University of North Texas
Data management plan for the grant "2021 NCAE-C-002 University of North Texas."
2023-GenCyber-University of North Texas
Data management plan for the grant, "2023-GenCyber-University of North Texas."
3D-FHNet: Three-Dimensional Fusion Hierarchical Reconstruction Method for Any Number of Views
Article proposes a three-dimensional fusion hierarchical reconstruction method that utilizes a multi-view feature combination method and a hierarchical prediction strategy to unify the single view and any number of multiple views 3D reconstructions.
Abstraction Augmented Markov Models
Article discussing the abstraction augmented Markov models.
Accelerometer-Based Automated Counting of Ten Exercises without Exercise-Specific Training or Tuning
Article presents research that creates an automatic repetition counting system that is flexible enough to measure multiple distinct and repeating movements during physical therapy without being trained on the specific motion.
Accuracy-Constrained Efficiency Optimization and GPU Profiling of CNN Inference for Detecting Drainage Crossing Locations
Article describes how the accurate and efficient determination of hydrologic connectivity has garnered significant attention from both academic and industrial sectors due to its critical implications for environment management. To address these challenges, the focus of the author's study is on detecting drainage crossings through the application of advanced convolutional neural networks.
Action unit classification for facial expression recognition using active learning and SVM
Article utilizing active learning and support vector machine (SVM) algorithms to classify facial action units (AU) for human facial expression recognition. Experimental results show that the proposed algorithm can effectively suppress correlated noise and achieve higher recognition rates than principal component analysis and a human observer on seven different facial expressions.
Adaptive and Non Adaptive Long Term Evolution Fractional Frequency Reuse Mechanisms Mobility Performance
Article proposes a performance metric and evaluates an existing adaptation process that dynamically adjusts to optimal network performance determined by Fractional Frequency Reuse (FFR) mechanism with mobile users.
Agent-based Distance Vector Routing: A Resource Efficient and Scalable approach to Routing in Large Communication Networks
Article discussing a resource efficient and scalable approach to routing in large communication networks.
agroString: Visibility and Provenance through a Private Blockchain Platform for Agricultural Dispense towards Consumers
Article discusses the large quantities of farm and meat products that rot and are wasted if correct actions are not taken leading to serious health concerns if consumed. Because there is no proper system for tracking and communicating the status of goods to consumers, a right which according to the authors should be a given, they propose a method of increased communication using Corda private blockchain.
An Algorithm for Open Text Semantic Parsing
This paper describes an algorithm for open text shallow semantic parsing.
Amazon Mechanical Turk for Subjectivity Word Sense Disambiguation
In this paper, the authors discuss research on whether they can use Mechanical Turk (MTurk) to acquire good annotations with respect to gold-standard data, whether they can filter out low-quality workers (spammers), and whether there is a learning effect associated with repeatedly completing the same kind of task.
An Analysis of Natural Language Inference Benchmarks through the Lens of Negation
Article presents a new benchmark for natural language inference in which negation plays a critical role and shows that state-of-the-art transformers struggle making inference judgments with the new pairs.
Anchor Nodes Placement for Effective Passive Localization
This paper discusses anchor nodes placement for effective passive localization. The authors show that, for effective passive localization, the optimal placement of the anchor nodes is at the center of the network in such a way that no three anchor nodes share linearity.
Annotating and Identifying Emotions in Text
This book chapter discusses annotating and identifying emotions in text.
Annotating Educational Questions for Student Response Analysis
Article introduces the first taxonomy and annotated educational corpus of questions that aims to help with the analysis of student responses.
Annotating If Authors of Tweets are Located in the Locations They Tweet About
Article presented at the Eleventh International Conference on Language Resources and Evaluation (LREC 2018). The study investigates spatial information of tweets whereby the authors present a corpus of tweets annotated with temporally-anchored spatial information involving the author.
Annotating Temporally-Anchored Spatial Knowledge by Leveraging Syntactic Dependencies
Article presenting a two-step methodology to annotate temporally-anchored spatial knowledge on top of OntoNotes.
Answering complex, list and context questions with LCC's Question-Answering Server
This paper presents the architecture of the Question-Answering server (QAS) developed at the Language Computer Corporation (LCC) and used in the TREC-10 evaluations.
Apparatus and Method for Transmitting Secure and/or Copyrighted Digital Video Broadcasting Data over Internet Protocol Network
Patent relating to an apparatus and method for transmitting secure and/or copyrighted digital video broadcasting data over internet protocol network.
The Application of BP Neural Networks to Analysis the National Vulnerability
Article uses the analytic hierarchy process (AHP) and natural breakpoint method (NBM) to implement an AHP-NBM comprehensive evaluation model to assess the national vulnerability to climate change.
Approximating User Distributions in WCDMA Networks Using 2-D Gaussian
This paper discusses approximating user distributions in WCDMA networks using 2-D Gaussian.
Architecture Support for 3D Obfuscation
Article discussing research on architecture support for 3D obfuscation.
Artificial Intelligence for Colonoscopy: Past, Present, and Future
Article summarizing the past and present development of colonoscopy video analysis methods, focusing on two categories of artificial intelligence (AI) technologies used in clinical trials, (1) analysis and feedback for improving colonoscopy quality and (2) detection of abnormalities.
Attention-Based Dense Point Cloud Reconstruction From a Single Image
Article proposes a two-stage training dense point cloud generation network.
Attracting and Retaining Women in Computer Science and Engineering: Evaluating the Results
This paper discusses efforts to attract and retain students in computer science and engineering fields.
Autoencoder Composite Scoring to Evaluate Prosthetic Performance in Individuals with Lower Limb Amputation
Authors of the article created an overall assessment metric using a deep learning autoencoder to directly compare clinical outcomes in a comparison of lower limb amputees using two different prosthetic devices—a mechanical knee and a microprocessor-controlled knee. The proposed methods were used on data collected from ten participants with a dysvascular transfemoral amputation recruited for a prosthetics research study.
Automated extraction of attributes from natural language attribute-based access control (ABAC) Policies
Article (1) developing a practical framework to extract authorization attributes of hierarchical ABAC system from natural language artifacts, and (2) generating a set of realistic synthetic natural language access control policies (NLACPs) to evaluate the proposed framework.
Automated measurement of quality of mucosa inspection for colonscopy
This paper from the International Conference on Computational Science conference proceedings presents new methods that derive a new quality metric for automated scoring of quality of mucosa inspection performed by the endoscopist.
Automatic Extraction of Implicit Interpretations from Modal Constructions
This paper presents an approach to extract implicit interpretations from modal constructions.
Automatic Generation and Classification of Minimal Meaningful Propositions in Educational Systems
This paper introduces a new representation of sentences--Minimal Meaningful Propositions (MMPS), which allows significant improvement of the mapping between a learner's answer and the ideal response.
Automatic Generation and Scoring of Positive Interpretations from Negated Statements
This paper presents a methodology to extract positive interpretations from negated statements.
Automatic generation of a coarse grained WordNet
This paper discusses automatic generation of a coarse grained WordNet.
Automatic Identification of Research Articles from Crawled Documents
Paper from the Web-Scale Classification: Classifying Big Data from the Web Workshop. This paper proposes novel features that result in effective and efficient classification models for automatic identification of research articles.
Automatic Keyword Extraction for Learning Object Repositories
This article discusses automatic keyword extraction for learning object repositories.
An Automatic Method for Generating Sense Tagged Corpora
This paper discusses an automatic method for generating sense tagged corpora.
BABYLON Parallel Text Builder: Gathering Parallel Texts for Low-Density Languages
This paper discusses BABYLON parallel text builder.
BAM: A Block-Based Bayesian Method for Detecting Genome-Wide Associations with Multiple Diseases
Article proposes a novel Bayesian method, named BAM, for simultaneously partitioning Single Nucleotide Polymorphisms (SNPs) into Linkage Disequilibrium(LD)-blocks and detecting genome-wide multi-locus epistatic interactions that are associated with multiple diseases. Experimental results on the simulated datasets demonstrate that BAM is powerful and efficient.
Bayesian analysis of complex mutations in HBV, HCV, and HIV studies
This article provides a review of the Bayesian-inference-based methods applied to Hepatitis B Virus (HBV), Hepatitis C Virus (HCV), and Human Immunodeficiency Virus (HIV) studies with a focus on the detection of the viral mutations and various problems which are correlated to these mutations. The authors also provide a summary of the Bayesian methods' applications toward these viruses' studies, where several important and useful results have been discovered.
Beyond Plain Spatial Knowledge: Determining Where Entities Are and Are Not Located, and For How Long
This paper complements semantic role representations with spatial knowledge beyond indicating plain locations.
Blood cancer prediction using leukemia microarray gene data and hybrid logistic vector trees model
Article is a study proposing an approach for blood cancer disease prediction using the supervised machine learning approach to perform blood cancer prediction with high accuracy using microarray gene data.
A Bootstrapping Method for Building Subjectivity Lexicons for Languages with Scarce Resources
This article discusses a bootstrapping method for building subjectivity lexicons for languages with scarce resources.
Building a Sense Tagged Corpus with Open Mind Word Expert
This paper discusses building a sense tagged corpus with Open Mind Word Expert, an implemented active learning system for collecting word sense tagging from the general public over the Web.
Building Multilingual Semantic Networks with Non-Expert Contributions over the Web
This paper discusses building multilingual semantic networks.
Call Admission Control Scheme for Arbitrary Traffic Distribution in CDMA Cellular Systems
This presentation discusses call admission control (CAC). The authors define a set of feasible call configurations that results in a CAC algorithm that captures the effect of having an arbitrary traffic distribution and whose complexity scales linearly with the number of cells.
Capacity Allocations in Multi-cell UMTS Networks for Different Spreading Factors with Perfect and Imperfect Power Control
This paper discusses capacity allocation in multi-cell UMTS networks.
Capacity Allocations in Multi-cell UMTS Networks for Different Spreading Factors with Perfect and Imperfect Power Control [Presentation]
This presentation discusses user and interference models, wideband code division multiple access (WCDMA) capacity with perfect and imperfect power control, and spreading factors with numerical results.
CAREER: Developing a Flexible Serverless Multimedia Streaming Cloud Platform
Data management plan for the grant, "CAREER: Developing a Flexible Serverless Multimedia Streaming Cloud Platform."
Back to Top of Screen