Search Results

2021 GenCyber Grant Program University of North Texas
Data management plan for the University of North Texas GenCyber Academy grant. The GenCyber Cybersecurity Program at the University of North Texas is part of the GenCyber program. The program is hosted by the Department of Computer Science and Engineering. The mission as part of the GenCyber program is to engage students at an early age in cybersecurity field and inspire them to become skilled cybersecurity professionals. This is provided by free summer cybersecurity camps for North Texas middle and high school students (7th-11th grade). The goals of the summer camps are to help students at an early age to understand correct and safe on-line behavior, increase students' interest in cybersecurity careers and improve diversity in the cybersecurity workforce of the nation.
2021 NCAE-C-002 University of North Texas
Data management plan for the grant "2021 NCAE-C-002 University of North Texas."
2023-GenCyber-University of North Texas
Data management plan for the grant, "2023-GenCyber-University of North Texas."
Attention-Based Dense Point Cloud Reconstruction From a Single Image
Article proposes a two-stage training dense point cloud generation network.
Call Admission Control Scheme for Arbitrary Traffic Distribution in CDMA Cellular Systems
This presentation discusses call admission control (CAC). The authors define a set of feasible call configurations that results in a CAC algorithm that captures the effect of having an arbitrary traffic distribution and whose complexity scales linearly with the number of cells.
Cell Placement in a CDMA Network
This presentation discusses research on cell placement in a CDMA network. In order to enable iterative cell placement the authors use a computationally efficient iterative process to calculate the inter-cell and intra-cell interferences as a function of pilot-signal power and base station location.
Co-Training for Topic Classification of Scholarly Data
This paper describes a co-training approach that uses the text and citation information of a research article as two different views to predict the topic of an article.
Collaborative Research: Framework Implementations: CSSI: CANDY: Cyberinfrastructure for Accelerating Innovation in Network Dynamics
Data management for the grant, "Collaborative Research: Framework Implementations: CSSI: CANDY: Cyberinfrastructure for Accelerating Innovation in Network Dynamics." Research addressing the lack of a comprehensive cyberinfrastructure that supports innovative research challenges in large-scale, complex, dynamic networks by developing a novel platform, called CANDY (Cyberinfrastructure for Accelerating Innovation in Network Dynamics), based on efficient, scalable parallel algorithm design for dynamic networks and high-performance software development with performance optimization.
Deriving Theorems in Implicational Linear Logic, Declaratively
This article aims to generate all theorems of a given size in the implicational fragment of propositional intuitionistic linear logic. It was presented at the 36th International Conference on Logic Programming (ICLP).
Dynamic intimate contact social networks and epidemic interventions
This article discusses dynamic intimate contact social networks and epidemic interventions.
An Efficient Non-Preemptive Real-Time Scheduling
This paper discusses non-preemptive, real-time scheduling.
Electroencephalogram Signals for Detecting Confused Students in Online Education Platforms with Probability-Based Features
Article discusses how despite the advantages of online education, it lacks face-to-face settings, which makes it very difficult to analyze the students’ level of interaction, understanding, and confusion. This study proposes a novel engineering approach that uses probability-based features (PBF) for increasing the efficacy of machine learning models.
Energy-Aware Routing and Hybrid Synchronization in Sensor Networks
This presentation discusses the research of sensor synchronization, sensor grid routing, and voice over internet protocol (VoIP).
Exploiting Agreement and Disagreement of Human Annotators for Word Sense Disambiguation
This paper discusses word sense disambiguation.
Finding Patterns in Noisy Crowds: Regression-based Annotation Aggregation for Crowdsourced Data
This paper presents an aggregation approach that learns a regression model from crowdsourced annotations to predict aggregated labels for instances that have no expert adjudications.
Graduate Research Fellowship Program (GRFP): Ali Yar Khan
Data management plan for the grant, "Graduate Research Fellowship Program (GRFP)" for Ali Yar Khan.
Hybrid Energy-Aware Synchronization Algorithm in Wireless Sensor Networks
This paper discusses a time synchronization scheme for wireless sensor networks that aims to conserve sensor battery power while maintaining network connectivity for as long as possible.
Infusing NLU into Automatic Question Generation
This paper presents an approach to automatic question generation that significantly increases the percentage of acceptable questions compared to prior state-of-the-art systems.
Letter Level Learning for Language Independent Diacritics Restoration
This paper discusses letter level learning for language independent diacritics restoration.
A Logic Programming Framework for Semantic Interpretation with WordNet and PageRank
This paper discusses a logic programming framework for semantic interpretation with WordNet and PageRank.
Measuring the impact of suspending Umrah, a global mass gathering in Saudi Arabia on the COVID‑19 pandemic
This article uses a stratified SEIR epidemic model to evaluate the impact of Umrah, a global Muslim pilgrimage to Mecca, on the spread of the COVID-19 pandemic during the month of Ramadan, the peak of the Umrah season. The analyses provide insights into the effects of global mass gatherings on the progression of the COVID-19 pandemic locally and globally.
Modelling HIV Intervention among Most-at-Risk/Key Population: Case Study of FWSS in Nigeria
This article discusses a novel risk equation for estimating new infections among Females who Sell Sex (FWSS), their clients, and communities.
Multi-Objective Response to Co-Resident Attacks in Cloud Environment
This article introduces a novel multi-objective attack response system.
Natlog: a Lightweight Logic Programming Language with a Neuro-symbolic Touch
Article that introduces Natlog, a lightweight Logic Programming language, sharing Prolog's unification-driven execution model, but with a simplified syntax and semantics. The authors' proof-of-concept Natlog implementation is tightly embedded in the Python-based deep-learning ecosystem with focus on content-driven indexing of ground term datasets. As an overriding of the authors symbolic indexing algorithm, the same function can be delegated to a neural network, serving ground facts to Natlog's resolution engine. The open-source implementation is available as a Python package at t https://pypi.org/project/natlog/.
Networks and Natural Language Processing
Article discussing networks and natural language processing. The authors present some of the most successful graph-based representations and algorithms used in language processing and try to explain how and why they work.
Parallel Texts
Article discussing parallel texts and natural language processing.
Parity Assisted Decision Making for QAM Modulation
This paper discusses parity assisted decision making for QAM modulation.
Random-Walk Term Weighting for Improved Text Classification
This paper describes a new approach for estimating term weights in a document, and shows how the new weighting scheme can be used to improve the accuracy of a text classifier.
REBEL: Reconfigurable Block Encryption Logic
This paper discusses reconfigurable block encryption logic. Existing block cipher function designs have tended to deploy the secret bits in a specific and limited way. The authors generalize the role of the secret as truth tables of Boolean gates in a carefully designed logic schema.
Role of Artificial Intelligence for Analysis of COVID-19 Vaccination-Related Tweets: Opportunities, Challenges, and Future Trends
Article states that vaccines, though reliable preventative measures for diseases, also raise public concerns; public apprehension and doubts challenge the acceptance of new vaccines including the COVID-19 vaccines. This study is the first attempt to review the role of AI approaches in COVID-19 vaccination-related sentiment analysis.
The Role of Non-Ambiguous Words in Natural Language Disambiguation
This article discusses the role of non-ambiguous words in natural language disambiguation.
Simulation of Throughput in UMTS Networks with Different Spreading Factors
In this paper, the authors design and implement a local session admission control (SAC) algorithm for third-generation wireless networks which allows for the simulation of network throughput for different spreading factors and various mobility scenarios.
Text Semantic Similarity, with Applications
In this paper, the authors present a knowledge-based method for measuring the semantic-similarity of texts. Through experiments performed on two different applications: (1) paraphrase and entailment identification, and (2) word sense similarity, the authors show that this method outperforms the traditional text similarity metrics based on lexical matching.
Unsupervised Graph-based Word Sense Disambiguation Using Measures of Word Semantic Similarity
This paper describes an unsupervised graph-based method for word sense disambiguation, and presents comparative evaluations using several measures of word semantic similarity and several algorithms for graph centrality. The results indicate that the right combination of similarity metrics and graph centrality algorithms can lead to a performance competing with the state-of-the-art in unsupervised word sense disambiguation, as measured on standard data sets.
Using the Essence of Texts to Improve Document Classification
This article discusses using the essence of texts to improve document classification.
Back to Top of Screen