Search Results

Genome-Resolved Proteomic Stable Isotope Probing of Soil Microbial Communities Using 13CO2 and 13C-Methanol
Article describes experiment where proteomic sable isotope probing (SIP) was combined with targeted metagenomic binning to reconstruct metagenome-assembled genomes (MAGs) of the microorganisms producing labeled proteins. Carbon flows were tracked from 13CO2 to the rhizosphere communities of Zea mays, Triticum aestivum, and Arabidopsis thaliana.
3D-FHNet: Three-Dimensional Fusion Hierarchical Reconstruction Method for Any Number of Views
Article proposes a three-dimensional fusion hierarchical reconstruction method that utilizes a multi-view feature combination method and a hierarchical prediction strategy to unify the single view and any number of multiple views 3D reconstructions.
Attention-Based Dense Point Cloud Reconstruction From a Single Image
Article proposes a two-stage training dense point cloud generation network.
Incorporating Emoji Descriptions Improves Tweet Classification
Article presenting a simple strategy to process emojis in Tweets: replace them with their natural language description and use pretrained word embeddings as normally done with standard words. Results show that this strategy is more effective than using pretrained emoji embeddings for tweet classification.
Fabric Defect Detection Using Activation Layer Embedded Convolutional Neural Network
This article develops a deep-learning algorithm for an on-loom fabric defect inspection system by combining the techniques of image pre-processing, fabric motif determination, candidate defect map generation, and convolutional neural networks (CNNs).
Bayesian analysis of complex mutations in HBV, HCV, and HIV studies
This article provides a review of the Bayesian-inference-based methods applied to Hepatitis B Virus (HBV), Hepatitis C Virus (HCV), and Human Immunodeficiency Virus (HIV) studies with a focus on the detection of the viral mutations and various problems which are correlated to these mutations. The authors also provide a summary of the Bayesian methods' applications toward these viruses' studies, where several important and useful results have been discovered.
Automated extraction of attributes from natural language attribute-based access control (ABAC) Policies
Article (1) developing a practical framework to extract authorization attributes of hierarchical ABAC system from natural language artifacts, and (2) generating a set of realistic synthetic natural language access control policies (NLACPs) to evaluate the proposed framework.
The Application of BP Neural Networks to Analysis the National Vulnerability
Article uses the analytic hierarchy process (AHP) and natural breakpoint method (NBM) to implement an AHP-NBM comprehensive evaluation model to assess the national vulnerability to climate change.
A Lightweight Three-Factor User Authentication Protocol for the Information Perception of IoT
Article proposes a lightweight authentication protocol based on password, smart card and biometric identification that achieves mutual authentication among User, GWN and sensor node.
Context-Aware Testing for Android Applications
Video from the Fall 2018 3 Minute Thesis (3MT®) Final Competition. In this video, Shraddha Piparia presents her research methods, findings, and its significance in non-technical language.
Skin Detection in Image and Video
Video from the Fall 2018 3 Minute Thesis (3MT®) Final Competition. In this video, ABM Rezbaul Islam presents his research methods, findings, and its significance in non-technical language.
Dynamic Taxi Service Planning by Minimizing Cruising Distance Without Passengers
This article studies route recommendation to a group of taxis by minimizing the overall mileage spent without customers.
A Performance Conserving Approach for Reducing Memory Power Consumption in Multi-Core Systems
Article proposes a strategy called Dynamic Bank Partitioning (DBP), which allocates memory banks to different applications based on their memory access characteristic, and also proposes an adaptive method to dynamically select an optimal page policy for each bank according to the characteristics of memory accesses that each bank receives to further reduce power consumption.
Modeling the 2013 Zika Outbreak in French Polynesia: Intervention Strategies
Paper presents a model that simulates the 2013–2014 French Polynesia Zika outbreak, incorporating the temperature dependent mosquito ecology and the local transit network (flights and ferries), highlighting the importance of human travel patterns and mosquito population dynamics in a disease outbreak.
Detecting Sarcasm is Extremely Easy ;-)
This paper analyzes the performance of a domain-general sarcasm detection system on datasets from two different domains: Twitter and Amazon product reviews.
Annotating Educational Questions for Student Response Analysis
Article introduces the first taxonomy and annotated educational corpus of questions that aims to help with the analysis of student responses.
Annotating If Authors of Tweets are Located in the Locations They Tweet About
Article presented at the Eleventh International Conference on Language Resources and Evaluation (LREC 2018). The study investigates spatial information of tweets whereby the authors present a corpus of tweets annotated with temporally-anchored spatial information involving the author.
Annotating Temporally-Anchored Spatial Knowledge by Leveraging Syntactic Dependencies
Article presenting a two-step methodology to annotate temporally-anchored spatial knowledge on top of OntoNotes.
A Corpus of Metaphor Novelty Scores for Syntactically-Related Word Pairs
Article introduces a large corpus of metaphor novelty scores for syntactically related word pairs, and releases it freely to the research community. This article describes the corpus, includes an analysis of its score distribution and the types of word pairs included in the corpus, and provides a brief overview of standard metaphor detection corpora.
On the security of the Courtois-Finiasz-Sendrier signature
This article proves that a variant of the Courtois-Finiasz-Sendrier signature is strongly existentially unforgeable under chosen message attack in the random oracle model, assuming hardness of the Permuted Goppa Syndrome Decoding Problem (also known as the Niederreiter problem).
Adaptive and Non Adaptive Long Term Evolution Fractional Frequency Reuse Mechanisms Mobility Performance
Article proposes a performance metric and evaluates an existing adaptation process that dynamically adjusts to optimal network performance determined by Fractional Frequency Reuse (FFR) mechanism with mobile users.
Fine-Grained Emotion Detection in Health-Related Online Posts
This article detects fine-grained emotion types from health-related posts and shows how high-level and abstract features derived from deep neural networks combined with lexicon-based features can be employed to detect emotions.
Security and Privacy in Emerging Wireless Networks
Introduction to a special issue of the journal Security and Communication Networks covering security and privacy in emerging wireless networks.
An experimental design to study decommitment in a collaborative multi-agent system in a scheduling domain
This article describes the theoretical background and experimental design of new research based on previous multi-agent research on collaborative agents. The research extends the concept of agent decommitment into a resource scheduling domain. The problem is no longer time constrained, however, the number of agents is increased dramatically. The actual experimentation is yet to be performed. The authors state that results of the experimentation will be reported in a future article.
Modelling HIV Intervention among Most-at-Risk/Key Population: Case Study of FWSS in Nigeria
This article discusses a novel risk equation for estimating new infections among Females who Sell Sex (FWSS), their clients, and communities.
Multi-Objective Response to Co-Resident Attacks in Cloud Environment
This article introduces a novel multi-objective attack response system.
Finding Patterns in Noisy Crowds: Regression-based Annotation Aggregation for Crowdsourced Data
This paper presents an aggregation approach that learns a regression model from crowdsourced annotations to predict aggregated labels for instances that have no expert adjudications.
Determining Whether and When People Participate in the Events They Tweet About
This paper describes an approach to determine whether people participate in the events they tweet about.
An Efficient Code-Based Threshold Ring Signature Scheme With a Leader-Participant Model
This paper proposes a novel code-based threshold ring signature scheme with a leader-participant model.
PositionRank: An Unsupervised Approach to Keyphrase Extraction from Scholarly Documents
This paper proposes PositionRank, an unsupervised model for keyphrase extraction from scholarly documents that incorporates information from all positions of a word's occurrences into a biased PageRank.
GaussianCpG: a Gaussian model for detection of CpG island in human genome sequences
The article discusses crucial markers in identifying biological elements and processes in mammalian genomes, CpG islands (CGI) that play important roles in DNA methylation, gene regulation, epigenetic inheritance, gene mutation, chromosome inactivation and nuclesome retention. A novel Gaussian model, GaussianCpG, is developed for detection of CpG islands on human genome. Their Gaussian model aims to simplify the complex interaction between nucleotides.
If No Media Were Allowed inside the Venue, Was Anybody Allowed?
This paper presents a framework to understand negation in positive terms.
Impact of Mobility on Convergence Rate in a Wireless Sensor Network
This paper shows that introducing mobility increases the rate of convergence in partially connected and disconnected wireless sensor networks (WSN).
Automatic Generation and Classification of Minimal Meaningful Propositions in Educational Systems
This paper introduces a new representation of sentences--Minimal Meaningful Propositions (MMPS), which allows significant improvement of the mapping between a learner's answer and the ideal response.
Dialogue Act Classification in Domain-Independent Conversations Using a Deep Recurrent Neural Network
This paper applies a deep long-short term memory (LSTM) structure to classify dialogue acts in open-domain conversations.
911 Services and Vital Sign Measurement Utilizing Mobile Phone Sensors and Applications
Patent relating to improved methods for utilizing 911 services and for implementing 911 dispatch protocols by accessing mobile phone sensors and applications.
Automatic Extraction of Implicit Interpretations from Modal Constructions
This paper presents an approach to extract implicit interpretations from modal constructions.
Supervised Keyphrase Extraction as Positive Unlabeled Learning
This paper shows that performance of trained keyphrase extractors approximates a classifier trained on articles labeled by multiple annotators, leading to higher average F₁ scores and better rankings of keyphrases.
Understanding Negation in Positive Terms Using Syntactic Dependencies
This paper presents a two-step procedure to extract positive meaning from verbal negation.
Infusing NLU into Automatic Question Generation
This paper presents an approach to automatic question generation that significantly increases the percentage of acceptable questions compared to prior state-of-the-art systems.
Beyond Plain Spatial Knowledge: Determining Where Entities Are and Are Not Located, and For How Long
This paper complements semantic role representations with spatial knowledge beyond indicating plain locations.
Automatic Generation and Scoring of Positive Interpretations from Negated Statements
This paper presents a methodology to extract positive interpretations from negated statements.
A secure data routing schema for WSN using Elliptic Curve Cryptography and homomorphic encryption
This article proposes a novel encryption schema based on Elliptic Curve Cyrptography (ECC) and homomorphic encryption to secure data transmission in wireless sensor networks.
Co-Training for Topic Classification of Scholarly Data
This paper describes a co-training approach that uses the text and citation information of a research article as two different views to predict the topic of an article.
Solving the (n² - 1)-Puzzle with 8/3 n³ Expected Moves
In this article, it is shown that the greedy algorithm for the (n² - 1)-puzzle makes 8/3 + O(n²) expected moves. This analysis is verified experimentally on 10,000 random instances each of the (n² - 1)-puzzle for 4 ≤ n ≤ 200.
Inferring Temporally-Anchored Spatial Knowledge from Semantic Roles
This paper presents a framework to infer spatial knowledge from verbal semantic role representations.
Intelligent Metamodel Integrated Verilog-AMS for Fast and Accurate Analog Block Design Exploration
Patent relating to a method for modeling a circuit comprising storing a plurality of design variable ranges for a circuit component in a non-transient electronic data memory.
Citation-Enhanced Keyphrase Extraction from Research Papers: A Supervised Approach
This paper proposes a supervised model for keyphrase extraction from research papers, which are embedded in citation networks.
Identifying Emotional and Informational Support in Online Health Communities
This paper analyses user messages on an online cancer support community, Cancer Survivors Network (CSN), to identify the two types of social support present: emotional support and informational support.
A Framework for Health Behavior Change Using Companionable Robots
This paper describes a dialogue system framework for a companionable robot, which aims to guide patients towards health behavior changes via natural language analysis and generation.
Back to Top of Screen