Search Results

open access

2021 GenCyber Grant Program University of North Texas

Description: Data management plan for the University of North Texas GenCyber Academy grant. The GenCyber Cybersecurity Program at the University of North Texas is part of the GenCyber program. The program is hosted by the Department of Computer Science and Engineering. The mission as part of the GenCyber program is to engage students at an early age in cybersecurity field and inspire them to become skilled cybersecurity professionals. This is provided by free summer cybersecurity camps for North Texas middl… more
Date: 2021-09-13/2024-12-31
Creator: Fu, Song
open access

3D-FHNet: Three-Dimensional Fusion Hierarchical Reconstruction Method for Any Number of Views

Description: Article proposes a three-dimensional fusion hierarchical reconstruction method that utilizes a multi-view feature combination method and a hierarchical prediction strategy to unify the single view and any number of multiple views 3D reconstructions.
Date: November 22, 2019
Creator: Lu, Qiang; Lu, Yiyang; Xiao, Mingjie; Yuan, Xiaohui & Jia, Wei
open access

Accelerometer-Based Automated Counting of Ten Exercises without Exercise-Specific Training or Tuning

Description: Article presents research that creates an automatic repetition counting system that is flexible enough to measure multiple distinct and repeating movements during physical therapy without being trained on the specific motion.
Date: October 10, 2020
Creator: Zelman, Samuel; Dow, Michael; Tabashum, Thasina; Xiao, Ting & Albert, Mark
open access

Accuracy-Constrained Efficiency Optimization and GPU Profiling of CNN Inference for Detecting Drainage Crossing Locations

Description: Article describes how the accurate and efficient determination of hydrologic connectivity has garnered significant attention from both academic and industrial sectors due to its critical implications for environment management. To address these challenges, the focus of the author's study is on detecting drainage crossings through the application of advanced convolutional neural networks.
Date: November 12, 2023
Creator: Zhang, Yicheng; Pandey, Dhroov; Wu, Di; Kundu, Turja; Li, Ruopu & Shu, Tong
open access

Action unit classification for facial expression recognition using active learning and SVM

Description: Article utilizing active learning and support vector machine (SVM) algorithms to classify facial action units (AU) for human facial expression recognition. Experimental results show that the proposed algorithm can effectively suppress correlated noise and achieve higher recognition rates than principal component analysis and a human observer on seven different facial expressions.
Date: April 4, 2021
Creator: Yao, Li; Wan, Yan & Xu, Bugao
open access

agroString: Visibility and Provenance through a Private Blockchain Platform for Agricultural Dispense towards Consumers

Description: Article discusses the large quantities of farm and meat products that rot and are wasted if correct actions are not taken leading to serious health concerns if consumed. Because there is no proper system for tracking and communicating the status of goods to consumers, a right which according to the authors should be a given, they propose a method of increased communication using Corda private blockchain.
Date: October 27, 2022
Creator: Vangipuram, Sukrutha L. T.; Mohanty, Saraju P.; Kougianos, Elias & Ray, Chittaranjan
open access

Amazon Mechanical Turk for Subjectivity Word Sense Disambiguation

Description: In this paper, the authors discuss research on whether they can use Mechanical Turk (MTurk) to acquire good annotations with respect to gold-standard data, whether they can filter out low-quality workers (spammers), and whether there is a learning effect associated with repeatedly completing the same kind of task.
Date: June 2010
Creator: Akkaya, Cem; Conrad, Alexander; Wiebe, Janyce M. & Mihalcea, Rada, 1974-
open access

Anchor Nodes Placement for Effective Passive Localization

Description: This paper discusses anchor nodes placement for effective passive localization. The authors show that, for effective passive localization, the optimal placement of the anchor nodes is at the center of the network in such a way that no three anchor nodes share linearity.
Date: 2011
Creator: Akl, Robert G.; Pasupathy, Karthikeyan & Haidar, Mohamad
open access

Annotating If Authors of Tweets are Located in the Locations They Tweet About

Description: Article presented at the Eleventh International Conference on Language Resources and Evaluation (LREC 2018). The study investigates spatial information of tweets whereby the authors present a corpus of tweets annotated with temporally-anchored spatial information involving the author.
Date: May 2018
Creator: Doudagiri, Vivek; Vempala, Alakananda & Blanco, Eduardo
Back to Top of Screen