The Proceedings of the 9th Annual Computer Science Conference. Made possible in part by… Organized by the School of Computer Science, University of Windsor. Held on Friday, March 27, 2015. Student Life Enhancement Fund Faculty of Science School of Computer Science ComCom 1 This is not meant as an official document for citation purposes, but as a reference for participation for those involved. Like past years, work presented as this conference is not published outside of the School of Computer Science. 14 students showcased their presentations during the event. 13 students submitted videos to a new session called “Cool, Clever, Creative Computing” (or “4C”), requiring videos up to 60 seconds long. These two types of submissions were judged for prizes, to be announced at the end of the event. Winners for the event can be seen on the conference website at conference.cs.uwindsor.ca . The judges for the presentations were Dr. Stephanos Mavromoustakos, Dr. Satish Panigrahi, Pooya Moradian Zadeh, and Supriya Supriya. The judges for the 4C video competition were Nikolai Momot, Ryan Lawson, and Denis Alam, from student club “Developer Confederation.” The event was generously sponsored by EPICentre (for food and location), Student Life Enhancement Fund, Faculty of Science, School of Computer Science and GSS (all for providing funding for awards). The event was organized by Andrew Hlynka, Jay Raichandami, Supriya Supriya, and Santosh Upadhyayula, led by faculty member Dr. Imran Ahmad. Additional thanks to Dr. Scott Goodwin, Dr. Boubakeur Boufama, Dr. Ziad Kobti, and a very special thank you to Karen Bourdeau, Margaret Cookson Garabon, and Stephen Karamatos. 2 9:00 9:20 BREAKFAST / REIGSTRATION Dr. Imran Ahmad Opening / Welcome Speaker Presentation #1 (Poster) Presentation #2 (Poster) "Prediction of Human Emergency Behavior and Their Mobility Following Large-Scale Disaster" Sravya Vangala 9:50 Presentation #3 (Poster) "Logic and Reasoning Using Subjective Logic" Jeffrey Drake 10:00 Presentation #4 (Poster) "5 Pen PC Technology" J Raghavendra Kumar 10:10 Presentation #5 (Oral) "Data Storage Methods in Acquiring Information From Systematic Reviews" Jeffrey Drake 10:30 Presentation #6 (Oral) "Sums Are Something, Tag You're It!" Eric Brisco 10:50 10 MINUTE BREAK 11:00 4C Video Competition "Cool, Clever, Creative Computing" A collection of 60-second videos showing art, apps, game development and more by University of Windsor students! Submissions by David Bergeron, Chris Brogly, Anthony Cavallro, Sam Burton, Jonathon Donais, Valerie St. Gelais, Scott Goodwin, Andrew Hlynka, Jssamyn Medler, Justin Moore, Ryan Scott, Colin Totten, Halen Whiston. 11:10 External Keynote Speaker "Bridging Modern Theory with Modern Practice" Aaron Mavrinac 9:30 9:40 "Overlapping Communities in Dynamic Networks: Their Detection and Mobile Applications" Mukund Pandey 11:50 LUNCH 12:00 External Group Speaker 12:20 10 MINUTE BREAK 12:30 Presentation #7 (Oral) "Automated Vehicle Detection and Recognition" Iqbal Singh 12:50 Presentation #8 (Oral) "New Approach For Automated Human Actibity Recognition" Pejman P.H. Habashi 1:10 Presentation #9 (Oral) "Aspect-Based Sentiment Analysis in Microblogs" Chukwuma O Ejieh 1:30 Presentation #10 (Oral) "Strategic Decision Making in Healthcare Decision Support Systems" Numanual H. Subhani 1:50 10 MINUTE BREAK 2:00 Presentaiton #11 (Oral) "Pixel Matching on Zoomed Images" Dominik Jaworski 2:20 Presentation #12 (Oral) "An Agent-Interaction Machanism Framework Based On 'Near-Term Analysis' Framework" Anivesh R .Minipuri 2:40 Presentation #13 (Oral) "An Autonomous Frontier Based Multi Robot Approach for Dynamic Unknown Environment Coverage" Raja Sankar Dileep Muddu 3:00 Presentation #14 (Oral) "Using EcoSim To Discover The Benefits of Using Different Mating Modes" Ryan D. Scott 3:20 10 MINUTE BREAK 3:30 Closing Speaker / Winner Announcements 4:00 End Session 1 9:30 - 11:00 Session 2 11:00 - 1:00 "Path to Entrepreneurship" Brad Colthurst, EPICentre Session 3 12:00 - 2:00 Session 4 2:00 - 3:30 Dr. Ziad Kobti 3 "Overlapping Communities in Dynamic Networks: Their Detection and Mobile Applications" Mukund Pandey Title Overlapping Communities in Dynamic Networks: their detection and mobile applications Author(s) Nam P. Nguyen, Thang N. Dinh, Sindhura Tokala, My T. Thai Author Location(s) University of Florida, Gainesville, FL, USA Abstract Many real-world problems related to the mobile networks possess the involvement of community structures and their detection. Knowledge of the network gives information not only about the principles on which the network is structured but also an insight about how to create other efficient algorithms. Authors in this paper are concentrating on- first, detection of communities which overlap with one or more other communities in the same social network, the second is if it's possible to update and configure the new structure of the network without starting from the scratch. And, the third question which authors are willing to solve is how the detection of the overlapping network communities help mobile applications. For this, authors have proposed a two-phase framework called AFCOS (Adaptive Finding Overlapping Community Structure), which not only detects network’s overlapping community structure but also tracks their evolution in dynamic mobile networks. "Prediction of Human Emergency Behavior and Their Mobility Following Large-Scale Disaster" Sravya Vangala Title Prediction of Human Emergency Behavior and their Mobility following Large-scale Disaster Author(s) Xuan Song, Quanshi Zhang, Yoshihide Sekimoto and Ryosuke Shibasaki Author Location(s) Center for Spatial Information Science, The University of Tokyo, Japan Abstract The frequency and intensity of natural disasters has significantly increased over the past decades and this trend is predicted to continue. Facing these possible and unexpected disasters, accurately predicting human emergency behavior and their mobility will become the critical issue for planning effective humanitarian relief, disaster management, and long-term societal reconstruction. In this paper, authors tried to build up a large human mobility database (GPS records of 1.6 million users over one year) and several different datasets to capture and analyze human emergency behavior and their mobility following the Great East Japan Earthquake and Fukushima nuclear accident. Based on our empirical analysis through these data, we find that human behavior and their mobility following large-scale disaster sometimes correlate with their mobility patterns during normal times, and are also highly impacted by their social relationship, intensity of disaster, damage level, government appointed shelters, news reporting, large population flow and etc. On the basis of these findings, authors developed a model of human behavior that takes into account these factors for accurately predicting human emergency behavior and their mobility following large-scale disaster. The experimental results and validations demonstrate the efficiency of behavior model, and suggest that human behavior and their movements during disasters may be significantly more predictable than previously thought 4 "Logic and Reasoning Using Subjective Logic" Jeffrey Drake Title Logic and Reasoning using Subjective Logic Author(s) Jeffrey Drake Dr. Kent et al. Author Location(s) Windsor Abstract We have been looking into the use of Subjective Logic to analyze and reason about data. This system represents work towards that. "5 Pen PC Technology" J Raghavendra Kumar Title 5 PEN PC TECHNOLOGY Author(s) J RAGHAVENDAR KUMAR Author Location(s) UNIVERSITY OF WINDSOR, WINDSOR Abstract Five pen pc shortly called as P- ISM (Pen -style Personal Networking Gadget Package) is a new discovery in the field of pen computing. It is under developing stage by NEC Corporation. Pen computing is a field that outlines computer like user interface that makes use of pen like devices that will be convenient to use in comparison to contemporary systems (such as laptops, desktops etc.). 5 pen pc technology with digital pen makes it possible to obtain a digital copy of handwritten information, and have it transferred to digital devices via wireless technologies, which operates as the main interconnecting device between different peripherals. The whole set is also coupled to the Internet which makes the communication even more easy and efficient. P- ISM is a gadget package including five functions: a CPU pen, communication pen with a cellular phone function, virtual keyboard, a very small projector, and a camera. All the 5 pens are connected to each other via wireless technology preferably Bluetooth,i.e, 802.11 BG. P- ISM’s are connected with one another through short-range wireless technology. The whole set is also connected to the Internet through the cellular phone function. This personal gadget in a minimalist pen style enables the ultimate ubiquitous computing. This technology can be used for various purposes. It can be utilized for multimedia functions. All the web related tasks can be performed by the user. Additionally, it can perform all the tasks similar to a dual core processor system. Also, it adds a layer of security. 5 "Data Storage Methods in Acquiring Information From Systematic Reviews" Jeffrey Drake Title Data storage methods in acquiring information from systematic reviews. Author(s) Jeffrey Drake Dr. Kent et al. Author Location(s) Windsor Abstract In a research project into traffic road injury prevention, our research group has been engaged in acquiring results from previous systematic reviews, and adding to the data. A tool has been developed to help store the data. "Sums Are Something, Tag You're It!" Eric Brisco Title Sums are something, tag you're it! Author(s) Eric Brisco Author Location(s) Windsor, Ontario Abstract I can give a talk on implementing and using ADTs in languages without native support for them. I will use Java as a primary example because it is probably most applicable to the audience. This talk is focused on applied computer science and not theoretical definitions or theoretical implications. What is an ADT? (brief summary) Implementing ADTs in Java Using Maybe and Either (case examples) Extra considerations 6 "Bridging Modern Theory with Modern Practice" Aaron Mavrinac Title Bridging Modern Theory with Modern Practice Author(s) Dr. Aaron Mavrinac Author Location(s) Windsor, Ontario Abstract I spoke with Dr. Boufama about giving a talk on putting state-of-the-art research and theory into practice in a production environment. I got my best exposure to this as a recent PhD graduate working as a research engineer at Bosch on their automated driving project, and I have since left that position to focus on building a small business (in part) around experiential education here in Windsor. The talk should speak to graduate students (specifically in CS), who acquire formidable theoretical knowledge but often don't have much chance to develop practical implementation skills up to modern industry standards; it will also cover the entrepreneurship base as a bonus. I'd like to entitle the talk "Bridging Modern Theory with Modern Practice" to emphasize an approach to leveraging the benefits of both ivory tower and hard-nosed industry in the computing world. "Automated Vehicle Detection and Recognition" Iqbal Singh Title Automated Vehicle Detection and Recognition Author(s) Iqbal Singh Author Location(s) Windsor, ON Abstract Vehicle Identification is important in many applications e.g. Border Security, Automated Toll Collection etc. Vehicles can be recognised by many features. Some of these features are unique such as license plate and others such as color and shape are not unique. Machine vision can be used to extract such features such as color, shape, license plate etc. Vehicle identification involves many aspects, primary aspect being license plate. However, in number of cases this feature alone can be misleading. Conversely, it can be tampered with and can be switched to different vehicle easily. Using machine learning paradigm, we propose a new vehicle identification model that is based on automatic plate recognition and vehicle type identification. 7 "New Approach For Automated Human Actibity Recognition" Pejman P.H. Habashi Title New Approach for Automated Human Activity Recognition Author(s) Pejman Habashi, Dr. Boubakeour Boufama, Dr. Imran Ahmad Author Location(s) Visual Processing Lab, Computer Science department, University Of Windsor Abstract Automatic Human activity recognition (HAR) is a very active and challenging area of computer vision. The main goal of HAR is to detect the type of activity which is currently being done by the human subject in a sequence of images aka videos. Many different methods have been proposed during the last two decades, but, due to difficult nature of the problem, the performance of those methods is far from optimum. Each video has a lot of information and most of them are irrelevant for recognition of human activity, for example the color and texture of the actor clothes or the distance of actor to camera usually is not related to the type of activity which is performing. For this reason, each HAR system uses an intermediate representation for the activities. This representation is the heart of any HAR system. A good representation should eliminates the non-related information while keeping the related information as much as possible. One of the most successful representation methods proposed in the literature is the bag of features (BoF). In this method, each activity is represented as a sparse set of feature points. Traditionally the feature points are extracted based on appearance based information (i.e. pixel values in a neighbourhood). These methods usually look for most informative local points in a video (feature points or interest points) and define a descriptor around those points (feature descriptor). Despite the simple nature of BoF methods, their result on actual data is relatively good. To best of our knowledge all of the descriptors proposed in the literature benefited only from visual information (i.e. pixel values, their derivatives and etc.) in a small neighbourhood. This way all movement clues (which we believe are informative for activity detection) are eliminated. Tracking of feature points is relatively simple. For example Lucas and Kanade Tracking (KLT) is one of the first and simplest methods for tracking feature points. Event though this simple method can be used to capture the movements of feature points in the video, the amount of movement in the real environment depend on the depth of those point. Thus, this value need to be normalized relative to the depth of feature point. In order to incorporate movement clues in HAR, we proposed a new descriptor calculation method. We captured two videos of the same event using stereo cameras. In each step we found the corners in left and right frames. Then we extracted SIFT feature descriptors for each of them. Then we matched left feature points with right counterparts and calculated the disparity for each feature point. Then we tracked the movement of these points in few next frames. This produced a spatio-temporal trajectory for each feature point in 3D XYD space. (X and Y represent the pixel location spatial domain and D represents the disparity domain (not Depth)). Since disparity is proportional to the reverse of depth, we have normalized our movement descriptors with disparity. 8 "Aspect-Based Sentiment Analysis in Microblogs" Chukwuma O Ejieh Title Aspect-based Sentiment Analysis in Microblogs Author(s) Chukwuma EJIEH Author Location(s) University of Windsor Abstract One of the important reasons for information gathering is to know what people think about. The rise of social websites in the past decade has presented us with new avenues to explore what people think and gather their opinions about diverse topics of discussion. Such gathering of sentiments and opinion is useful to businesses to know what their customers think about their product and services and also by politicians and lawmakers to gather public opinion about a certain policy. Although, sentiment analysis and opinion mining has a lot of application areas apart from the business and political world, its domain of operation has been limited to news streams, blogs and reviews. Due to the rise in usage of microblogging sites like Twitter in past few years, some research has been going on in exploring microblogging sites as domains for sentiment analysis and opinion mining. Mining sentiments in microblogging sites is a challenging task because microblog posts are short (a Tweet is a maximum of 140 characters), the use of informal language and mis-spelling of words is frequent in microblogs (e.g.“I luuuuuuuuuuv this my new 4one”) and also the volume of unstructured data is does not making it easy to perform some preprocessing tasks and labeling (for classification sake). Researchers have been able to address these problems to a reasonable extent with the help of Machine Learning and Natural Language Processing techniques but they only analyse microblogs at the entity level, not the aspect level. Aspect-based sentiment analysis is a more fine-grained approach in which opinions of an aspect of an entity is mined. For example, consider this tweet “the iPhone6 rocks in sound quality but the display sucks”. The above tweet expresses positive and negative opinions about two different aspects (speaker and screen) of a particular entity (iPhone 6). Current sentiment classifiers used on microblogs would not correctly classify the opinions expressed in this tweet because they do not analyse sentiments at the aspect-based level. Other tweets like “I wish Obama’s policies were as cool as his suits” would be classified as positive sentiment because the tweet did not contain any explicit negative word. A lot of work has been done on aspect-based sentiment analysis in product reviews and movie reviews. Very little work has been done as regards aspect-based analysis in microblogs. A review of the basic approaches to sentiment analysis and aspect-based sentiment analysis would be contained in the presentation. Also challenges and progress on the work being done in the microblog domain would be reviewed and a proposed approach of solving the problem of mining aspects in tweets would be discussed. "Strategic Decision Making in Healthcare Decision Support Systems" Numanual H. Subhani Title Strategic decision making in healthcare decision support systems Author(s) Numanul Hoque Subhani Author Location(s) University of Windsor Abstract In Ontario, the most populous province of Canada, healthcare is expected to represent 66 % of government expenditure in 2017 and close to 100 % in 2026 [1]. Total provincial health spending has grown at an average annual rate of 7.5% over the last ten years, compared to only 5.7% for total available provincial revenue (including federal transfers), and only 5.2% for GDP [2]. Emerging technologies increase the need for personalization of healthcare systems, quantified self, and wearable healthcare devices [3]. Increasing rates of chronic illness and aging population require more technological innovation [4], and self-sustainable healthcare systems that fulfills the demand of healthcare costs, skilled workforces and continuous innovation. In order to achieve a sustainable healthcare system, it is necessary to develop decision support systems that rely on information creation through predictive analytics. This is a priority to support strategic decision making in the realm of Big Data and Business Intelligence (BI). At the core of user-generated analytics is a philosophy and focus for reducing variability in process operations. Defining process and incorporating statistical analytic methods to measure the process performance through various attributes are steps towards developing a methodology. We will present a methodology that combines the available and mined data through analytics to monitor effectiveness of the strategic decision and overall performance of the process. 9 "Pixel Matching on Zoomed Images" Dominik Jaworski Title Pixel Matching on Zoomed Images Author(s) Dominik Jaworski Dr. Boubaker Boufama Author Location(s) Windsor, Ontario Abstract Stereo vision is the practice of obtaining 3D information from an image pixel. Using stereo images (2 images of a 3D scene), a camera is used to obtain the depth of the scene. Pixel matching operations are used to find matches between points that correspond in two images. Matching images at different zoom levels has it's own set of issues. Stereo images are just off set images which have some constraints that make it easier to locate the corresponding pixel in the other image. Traditional constraints have less use for zoomed images since their is no offset to the side, and the size of objects changes. A program will be built that will perform dense matching on zoomed images. A GUI will be able to load in images at different zoom levels from file, and detect matches between points. After which, user input on one image will show the corresponding match in the other. "An Agent-Interaction Machanism Framework Based On 'Near-Term Analysis' Framework" Anivesh R .Minipuri Title An Agent-Interaction Mechanism Framework based on “Near-term Analysis” Framework. Author(s) Anivesh Reddy Minipuri Author Location(s) Windsor, Ontario Abstract In many domains where situations are dynamically changing “what-if” analysis is a critical situation. To estimate the changes of a particular organization under uncertainity is essential. “What-if” some of employees leave the company. “What-if” some of the officers die in a militry action. To answer this type of questions “Near-term analysis” frame work was introduced. It simulates the social dynamic within an organization and isolates the particular agents in organization and calculates the degree of knowledge diffusion from the simulation over time in a network. However the drawback for above tool is that it cannot produce agent interactions for larger group size(over 100). We propose a new framework based on “Near-term analysis” framework which can handle group size of more than 100 and can able to produce valid interactions. Our main objective is to make the proposed framework suitable to estimate changes of a large and huge organization in an uncertain situation. 10 "An Autonomous Frontier Based Multi Robot Approach for Dynamic Unknown Environment Coverage" Raja Sankar Dileep Muddu Title An Autonomous Frontier Based Multi Robot Approach for Dynamic Unknown Environment Coverage. Author(s) Raja Sankar Dileep Muddu Author Location(s) Windsor, Ontario Abstract With the advent of latest technical advancements in the field of robotics, a stage has arrived where autonomous robots are expected to help the humans in tasks that are either dangerous or too monotonous such as mining, search and rescue, floor cleaning. All these problems are derivatives of coverage problem wherein the motto is complete coverage of the environment in a time effective manner. Coverage can be accomplished in two ways Sensor Based or Map based. Sensor based approaches use the built-in sensors of the robot for coverage. Map based approaches have a onetime fixed cost for map building which can be used later to generate path between two points. Most of the coverage methods developed till date have access to the map prior to exploration and only few of them made use of multiple robots. In view of the drawbacks of the current approaches, we propose a frontier based multi robot approach for coverage of unknown environments where mapping is performed simultaneously while exploration. Frontiers which are the boundaries between explored and unexplored areas are identified using digital image processing techniques provided by ROS and navigated accordingly. Experiments and Simulations will be conducted using the Stage module in ROS framework. "Using EcoSim To Discover The Benefits of Using Different Mating Modes" Ryan D. Scott Title Using EcoSim to Discover the Benefits of Using Different Mating Modes Author(s) Ryan Scott, Brian MacPherson, Robin Gras Author Location(s) University of Windsor Department of Computer Science, University of Windsor Biological Sciences Department, University of Windsor Computer Science Abstract Sexual reproduction comes at a high cost to animals that implement it. There are explicit costs, such as the costs of physically searching for a suitable partner. There are also implicit costs, such as the costs of maintaining sensory equipment necessary to finding a suitable partner. A much more efficient method of reproduction is asexual reproduction. Asexual reproduction does not require a partner, and therefore it foregoes much of the costs of sexual reproduction. However, asexual reproduction essentially produces an exact copy of an organism, which means that genetic variation across an asexual population is extremely low. This has its own costs; a population with low genetic variation is one that is prone to disease, parasitism, mass extinction due to environmental disturbances, or mass extinction due to failure to cope with rapidly changing biotic and abiotic factors within its environment. Sexual reproduction, on the other hand, increases genetic variation within a population through recombination. This allows the population to evolve more rapidly, and increases the odds that at least some members of the population will be able to survive random disturbances, or waves of infection or parasitism. In this study, we aim to test four hypotheses. First, we test the hypothesis that in a stable environment, asexual individuals should fare better. Secondly, in high predation, sexual individuals should perform better. Thirdly, in the presence of pathogens, sexual species will outperform asexual ones. Lastly, with fluctuating resources, sexually reproducing individuals should perform better. In the standard configuration of EcoSim, all individuals are obligated to reproduce sexually. Two new versions of EcoSim were created: one in which prey individuals can only reproduce asexually, and another in which prey individuals can decide to perform either sexual or asexual reproduction. Since the energy dynamics of asexual reproduction (with respect to the simulation) were unknown to us prior to this study, we first set out to determine the point at which asexual and sexual reproduction were equally appealing for prey individuals. We created runs for obligate and facultative asexual reproduction in which the cost of reproducing asexually varied from 20% to 40% of an individual’s total energy. Even with a 40% energy cost, individuals typically still seem to favor asexual reproduction. This study is in its data creation phase. A total of 175 EcoSim runs (75 asexual only, 75 asexual and sexual, and 15 original) are currently running using dedicated high-performance computing resources on Sharcnet. When these runs are complete, we plan to use saved states of these runs to test how populations are affected by random environmental disturbances, such as reduced predation or low resource availability. We also plan to create a pathogen that spreads throughout prey populations, in order to determine the role of sexual reproduction in keeping a population healthy while threatened by pathogens. 11 4C Video Compeititon Name: Andrew Hlynka, School of Computer Science, University of Windsor Voices by Jessica N. Osborne, Max Gonzalez, Casting by Ben-Robert French. Music by "Mee." Title: "Drew and the Floating Labyrinth - Hand-Drawn 3D Platformer Game" Help Drew find her way home in this hand-drawn 3D puzzle-platformer, available now. Andrew Hlynka, School of Computer Science, University of Windsor Title: "Sudoku Solver - Computer VS Man" How fast can a computer solve a Sudoku puzzle? Faster than you can (probably)! Music is "Run Down - Bounty" and "Super Logo - The event" from Adobe Premiere Elements 11.0. Name: Andrew Hlynka, School of Computer Science, University of Windsor Title: "Unfinished - Teaser Trailer" A teaser trailer for a hand-sketched 3D adventure game. Name: Andrew Hlynka, School of Computer Science, University of Windsor Title: "Look At Me When I'm Talking To You" What can you make with the Oculus Rift? I confirm the School of Computer Science and the University of Windsor can reuse this video. Hello, I am David Bergeron, School of Music Project title: Vocolour The video was solely made by me. In the video I introduce myself and my electronic art. Vocolour was coded using the program MAXMSP which is developed by Cycling 74. Name: Jessamyn Medler Computer Science Title: "Bird's Got Your Tongue" Final project for 03-60-350-01, flash video about a curious cat and a curious-er bird. Title: Names: Snapfolio: Making teacher's lives easier. Jon Donais (Computer Science), Sam Burton (Computer Science) Description: Snapfolio is an iOS app for primary teachers that lets them document learning skills, and make report cards easier. Third Party Materials: Made with PowToon, Music https://www.youtube.com/watch?v=LCowFcEXt0Y Name: Ryan Scott, Scott Goodwin, Colin Totten, Justin Moore, Valerie St. Gelais, Anthony Cavallaro Title: "Graspoid - Gameplay Trailer" Gameplay video of physics-platformer for mobile devices. I confirm the School of Computer Science and the University of Windsor can reuse this video. Halen Whiston (late submission, unconfirmed) Chris Brogly (late submission, unconfirmed) 12
© Copyright 2024