Search Results

Channel Assignment and Load Distribution in a Power-Managed WLAN
This paper discusses a proposed algorithm.
Channel Assignment in an IEEE 802.11 WLAN Based on Signal-to-Interference Ratio
This article discusses channel assignment in an IEEE 802.11 WLAN based on signal-to-interference ratio.
Characterizing Humour: An Exploration of Features in Humorous Texts
This paper investigates the problem of automatic humor recognition, and provides an in-depth analysis of two of the most frequently observed features of humorous text: human-centeredness and negative polarity. Through experiments performed on two collections of humorous texts, the authors show that these properties of verbal humor are consisted across different data sets.
Citation-Enhanced Keyphrase Extraction from Research Papers: A Supervised Approach
This paper proposes a supervised model for keyphrase extraction from research papers, which are embedded in citation networks.
Classification Errors in a Domain-Independent Assessment System
This paper presents a domain-independent technique for assessing learners' constructed responses.
Classification of Attributes and Behavior in Risk Management Using Bayesian Networks
This paper discusses issues in security.
Classifier Stacking and Voting for Text Filtering
This article discusses classifier stacking and voting for text filtering.
Classifying Abdominal Fat Distribution Patterns by Using Body Measurement Data
This article aims to explore new categorization that characterizes the distribution clusters of visceral and subcutaneous adipose tissues (VAT and SAT) measured by magnetic resonance imaging (MRI), to analyze the relationship between the VAT-SAT distribution patterns and the novel body shape descriptors (BSDs), and to develop a classifier to predict the fat distribution clusters using the BSDs.
Classifying Drug Resistance in the NCI60 Cancer Cell Lines Based on the mRNA Expression Levels of the 48 ABC Transporters
Poster for the 2014 MCBIOS Conference. This poster discusses classifying drug resistance in the NCI60 cancer cell lines based on the mRNA expression levels of the 48 ABC transporters.
Classifying genes to the correct Gene Ontology Slim term in Saccharomyces cerevisiae using neighbouring genes with classification learning
Article discussing research on classifying genes to the correct gene ontology slim term in Saccharomyces cerevisiae using neighbouring genes with classification learning.
Classifying Scientific Publications Using Abstract Features
Article discussing classifying scientific publications using abstract features.
Co-training and Self-training for Word Sense Disambiguation
This paper investigates the application of co-training and self-training to word sense disambiguation. Optimal and empirical parameter selection methods for co-training and self-training are investigated, with various degrees of error reduction. A new method that combines co-training with majority voting is introduced, with the effect of smoothing the bootstrapping learning curves, and improving the average performance.
Co-Training for Topic Classification of Scholarly Data
This paper describes a co-training approach that uses the text and citation information of a research article as two different views to predict the topic of an article.
Co-training over Domain-independent and Domain-dependent Features for Sentiment Analysis of an Online Cancer Support Community
Paper on co-training over domain-independent and domain-dependent features for sentiment analysis of an online cancer support community.
Combining Hashing and Abstraction in Sparse High Dimensional Feature Spaces
Article on combining hashing and abstraction in sparse high dimensional feature spaces.
Combining Lexical Resources for Contextual Synonym Expansion
This paper discusses combining lexical resources for contextual synonym expansion.
Comparison of Machine Learning Algorithms for Identifying Cancer Types
Poster for the 2014 MidSouth Computational Biology and Bioinformatics Society (MCBIOS) Annual Conference. This poster discusses a comparison of machine learning algorithms for identifying cancer types.
Computational Laughing: Automatic Recognition of Humorous One-liners
This paper discusses automatic recognition of humor.
Computational Models for Incongruity Detection in Humour
In this paper, the authors explore several computational models for incongruity resolution.
Computing microRNA-gene interaction networks in pan-cancer using miRDriver
This article is a study where the authors integrated the multi-omics datasets such as copy number aberration, DNA methylation, gene and microRNA expression to identify the signature microRNA-gene associations from frequently aberrated DNA regions across pan-cancer utilizing a LASSO-based regression approach.
Context-Aware Testing for Android Applications
Video from the Fall 2018 3 Minute Thesis (3MT®) Final Competition. In this video, Shraddha Piparia presents her research methods, findings, and its significance in non-technical language.
Corpus-based and Knowledge-based Measures of Text Semantic Similarity
This article discusses corpus-based and knowledge-based measures of text semantic similarity.
A Corpus-based Approach to Finding Happiness
This paper discusses how to locate emotions.
A Corpus of Fine-Grained Entailment Relations
This paper describes on-going efforts to annotate a corpus of almost 16,000 answer pairs with an estimated 69,000 fine-grained entailment relationships.
A Corpus of Metaphor Novelty Scores for Syntactically-Related Word Pairs
Article introduces a large corpus of metaphor novelty scores for syntactically related word pairs, and releases it freely to the research community. This article describes the corpus, includes an analysis of its score distribution and the types of word pairs included in the corpus, and provides a brief overview of standard metaphor detection corpora.
COS: A new MeSH term embedding incorporating corpus, ontology, and semantic predications
Article studying the problem of incorporating corpus, ontology, and semantic predications to learn the embeddings of MeSH terms. The authors propose a novel framework, Corpus, Ontology, and Semantic predications-based MeSH term embedding (COS), to generate high-quality MeSH term embeddings.
COVID-19 Vaccination-Related Sentiments Analysis: A Case Study Using Worldwide Twitter Dataset
Article is a study analyzing the global perceptions and perspectives towards COVID-19 vaccination using a worldwide Twitter dataset, natural language processing, and machine learning.
Creating a Testbed for the Evaluation of Automatically Generated Back-of-the-book Indexes
This paper discusses automatic generating of back-of-the-book indexes.
Creating Large Annotated Data Collections with Web Users' Help
This paper discusses creating annotated data collections.
Crinet: A computational tool to infer genome-wide competing endogenous RNA (ceRNA) interactions
This article develops a computational tool named Crinet to infer genome-wide ceRNA networks addressing critical drawbacks. Crinet-inferred ceRNA groups that were consistently involved in the immune system related processes could be important assets in the light of the studies confirming the relation between immunotherapy and cancer. The source code of Crinet is in R and available at https://github.com/bozdaglab/crinet.
Cross-lingual Semantic Relatedness Using Encyclopedic Knowledge
This paper discusses cross-lingual semantic relatedness using encyclopedic knowledge.
Current Research in Wireless at UNT
This presentation discusses wireless networks, access point selections, traffic balancing, multi-cell CDMA, user distribution modeling, and call admission control.
Data Mining Techniques for Predicting Breast Cancer Survivability Among Women in the United States
Poster for the 2014 UNT Graduate Exhibition in the Computer Science and Information Technology category. This poster discusses data mining techniques for predicting breast cancer survivability among women in the United States.
The Decomposition of Human-Written Book Summaries
In this paper, the authors evaluate the extent to which human-written book summaries can be obtained through cut-and-paste operations from the original book. The authors analyze the effect of the parameters involved in the decomposition algorithm, and highlight the distinctions in coverage obtained for different summary types.
Deep learning for peptide identification from metaproteomics datasets
This article explores a proposed deep-learning-based algorithm called DeepFilter for improving peptide identifications from a collection of tandem mass spectra. The authors find that DeepFilter is believed to generalize properly to new, previously unseen peptide-spectrum-matches and can be readily applied in peptide identification from metaproteomics data.
Deriving Theorems in Implicational Linear Logic, Declaratively
This article aims to generate all theorems of a given size in the implicational fragment of propositional intuitionistic linear logic. It was presented at the 36th International Conference on Logic Programming (ICLP).
Detecting Covid-19 chaos driven phishing/malicious URL attacks by a fuzzy logic and data mining based intelligence system
Article analyses the impact of Covid-19 on various cyber-security related aspects.
Detecting Negation Cues and Scopes in Spanish
Article addresses the processing of negation in Spanish by presenting a machine learning system that processes negation in Spanish and providing a qualitative error analysis aimed at understanding the limitations of the system and showing which negation cues and scopes are straightforward to predict automatically, and which ones are challenging.
Detecting Sarcasm is Extremely Easy ;-)
This paper analyzes the performance of a domain-general sarcasm detection system on datasets from two different domains: Twitter and Amazon product reviews.
Detection of DDoS Attack in Software-Defined Networking Environment and Its Protocol-wise Analysis using Machine Learning
Article describes how distributed-denial-of-service (DDoS) attacks can cause a great menace to numerous organizations and their stakeholders. The authors assert that the objective of this research work is to take into account a DDoS afflicted SDN specific dataset and detect the malicious traffic by using various machine learning algorithms namely., K-Nearest Neighbours, Logistic Regression, Multilayer Perceptron, Iterative Dichotomiser 3, and Stochastic Gradient Descent.
Detection of Parkinson's Disease Through Automated Pupil Tracking of the Post-illumination Pupillary Response
This article describes a system for pupil size estimation with a user interface to allow rapid adjustment of parameters and extraction of pupil parameters of interest in order to identify Parkinson's disease (PD) as early as possible.
Determining Event Outcomes: The Case of #fail
Article presents research determining event outcomes in social media.
Determining Whether and When People Participate in the Events They Tweet About
This paper describes an approach to determine whether people participate in the events they tweet about.
Dialogue Act Classification in Domain-Independent Conversations Using a Deep Recurrent Neural Network
This paper applies a deep long-short term memory (LSTM) structure to classify dialogue acts in open-domain conversations.
Document Indexing using Named Entities
This article discusses document indexing using named entities.
Dynamic Agent Population in Agent-Based Distance Vector Routing
This paper discusses dynamic agent population in agent-based distance vector routing.
Dynamic Channel Assignment in IEEE 802.11 Networks
This paper discusses dynamic channel assignment in IEEE 802.11 networks.
Dynamic intimate contact social networks and epidemic interventions
This article discusses dynamic intimate contact social networks and epidemic interventions.
Dynamic Taxi Service Planning by Minimizing Cruising Distance Without Passengers
This article studies route recommendation to a group of taxis by minimizing the overall mileage spent without customers.
The Effect of an Enhanced Channel Assignment Algorithm on an IEEE 802.11 WLAN
This article discusses the effect of an enhanced channel assignment algorithm on an IEEE 802.11 WLAN.
Back to Top of Screen