Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 9 of 9

Full-Text Articles in Engineering

Inverse Engineering Of Absorption And Scattering In Nanoparticles: A Machine Learning Approach, Alex Vallone, Nooshin M. Estakhri, Nasim Mohammadi Estrakhri Nov 2023

Inverse Engineering Of Absorption And Scattering In Nanoparticles: A Machine Learning Approach, Alex Vallone, Nooshin M. Estakhri, Nasim Mohammadi Estrakhri

Engineering Faculty Articles and Research

We use a region-specified machine learning approach to inverse design highly absorptive multilayer plasmonic nanoparticles. We demonstrate the design of particles with a wide range of absorption to scattering ratios (i.e., cloaked absorbers and bright absorbers) and for different visible wavelengths.


Infrared Imaging Segmentation Employing An Explainable Deep Neural Network, Xinfei Liao, Dan Wang, Zairan Li, Nilanjan Dey, Rs Simon, Fuqian Shi Oct 2023

Infrared Imaging Segmentation Employing An Explainable Deep Neural Network, Xinfei Liao, Dan Wang, Zairan Li, Nilanjan Dey, Rs Simon, Fuqian Shi

Turkish Journal of Electrical Engineering and Computer Sciences

Explainable AI (XAI) improved by a deep neural network (DNN) of a residual neural network (ResNet) and long short-term memory networks (LSTMs), termed XAIRL, is proposed for segmenting foot infrared imaging datasets. First, an infrared sensor imaging dataset is acquired by a foot infrared sensor imaging device and preprocessed. The infrared sensor image features are then defined and extracted with XAIRL being applied to segment the dataset. This paper compares and discusses our results with XAIRL. Evaluation indices are applied to perform various measurements for foot infrared image segmentation including accuracy, precision, recall, F1 score, intersection over union (IoU), Dice …


Precision Spraying Using Variable Time Delays And Vision-Based Velocity Estimation, Paolo Rommel Sanchez, Hong Zhang Oct 2023

Precision Spraying Using Variable Time Delays And Vision-Based Velocity Estimation, Paolo Rommel Sanchez, Hong Zhang

Henry M. Rowan College of Engineering Faculty Scholarship

Traditionally, precision farm equipment often relies on real-time kinematics and global positioning systems (RTK-GPS) for accurate position and velocity estimates. This approach proved effective and widely adopted in developed regions where RTK-GPS satellite and base station availability and visibility are not limited. However, RTK-GPS signal can be limited in farm areas due to topographic and economic constraints. Thus, this study developed a precision sprayer that estimated the travel velocity locally by tracking the relative motion of plants using a deep-learning-based machine vision system. Sprayer valves were then controlled by variable time delay (VTD) queuing and dynamic filtering. The proposed velocity …


Detecting Alzheimer's Disease Using Artificial Neural Networks, Sally Lee, Mia Keegan Jun 2023

Detecting Alzheimer's Disease Using Artificial Neural Networks, Sally Lee, Mia Keegan

Electrical Engineering

This project aims to use artificial neural networks (ANN) in order to detect Alzheimer’s disease. More specifically, convolutional neural networks (CNN) will be utilized as this is the most common ANN and has been used in many different image processing applications. The purpose of using artificial neural networks as a detect method is so that an intelligent way for image and signal analysis can be used. A software that implements CNN will be developed so that users in medical settings can utilize this software to detect Alzheimer’s in patients. The input for this software will be the patient’s MRI scans. …


An Efficient Deep Learning Architecture For Turkish Lira Recognition And Counterfeit Detection, Burak İyi̇kesi̇ci̇, Ergun Erçelebi̇ May 2023

An Efficient Deep Learning Architecture For Turkish Lira Recognition And Counterfeit Detection, Burak İyi̇kesi̇ci̇, Ergun Erçelebi̇

Turkish Journal of Electrical Engineering and Computer Sciences

Banknote counterfeiting is a common practice worldwide. Due to the recent developments in technology, banknote imitation has become easier than before. There are different kinds of algorithms developed for the detection of counterfeit banknotes for different countries in the literature. The earlier algorithms utilized classical image processing techniques where the implementations of machine learning and deep learning algorithms appeared with the developments in the artificial intelligence field as well as the computer hardware. In this study, a novel convolutional neural networks-based deep learning algorithm has been developed that detects counterfeit Turkish Lira banknotes and their denominations using the banknote images …


Nipuna: A Novel Optimizer Activation Function For Deep Neural Networks, Golla Madhu, Sandeep Kautish, Khalid Abdulaziz Alnowibet, Hossam Zawbaa, Ali Wagdy Mohamed Jan 2023

Nipuna: A Novel Optimizer Activation Function For Deep Neural Networks, Golla Madhu, Sandeep Kautish, Khalid Abdulaziz Alnowibet, Hossam Zawbaa, Ali Wagdy Mohamed

Articles

In recent years, various deep neural networks with different learning paradigms have been widely employed in various applications, including medical diagnosis, image analysis, self-driving vehicles and others. The activation functions employed in deep neural networks have a huge impact on the training model and the reliability of the model. The Rectified Linear Unit (ReLU) has recently emerged as the most popular and extensively utilized activation function. ReLU has some flaws, such as the fact that it is only active when the units are positive during back-propagation and zero otherwise. This causes neurons to die (dying ReLU) and a shift in …


Setransformer: A Transformer-Based Code Semantic Parser For Code Comment Generation, Zheng Li, Yonghao Wu, Bin Peng, Xiang Chen, Zeyu Sun, Yong Liu, Paul Doyle Jan 2023

Setransformer: A Transformer-Based Code Semantic Parser For Code Comment Generation, Zheng Li, Yonghao Wu, Bin Peng, Xiang Chen, Zeyu Sun, Yong Liu, Paul Doyle

Conference Papers

Automated code comment generation technologies can help developers understand code intent, which can significantly reduce the cost of software maintenance and revision. The latest studies in this field mainly depend on deep neural networks, such as convolutional neural networks and recurrent neural network. However, these methods may not generate high-quality and readable code comments due to the long-term dependence problem, which means that the code blocks used to summarize information are far from each other. Owing to the long-term dependence problem, these methods forget the previous input data’s feature information during the training process. In this article, to solve the …


Gated Deep Reinforcement Learning With Red Deer Optimization For Medical Image Classification, Narayanan Ganesh, Sambandan Jayalakshmi, Rama Chandran Narayanan, Miroslav Mahdal, Hossam Zawbaa, Ali Wagdy Mohamed Jan 2023

Gated Deep Reinforcement Learning With Red Deer Optimization For Medical Image Classification, Narayanan Ganesh, Sambandan Jayalakshmi, Rama Chandran Narayanan, Miroslav Mahdal, Hossam Zawbaa, Ali Wagdy Mohamed

Articles

The brain is one of the most important and complex organs in the body, consisting of billions of individual cells. Uncontrolled growth and expansion of aberrant cell populations within or around the brain are the main causes of brain tumors. These cells have the potential to harm healthy cells and impair brain function [1]. Tumors can be detected using medical imaging techniques, which are considered the most popular and accurate way to classify different types of cancer, and this procedure is even more crucial as it is noninvasive [2]. Magnetic resonance imaging (MRI) is one such medical imaging technique that …


Light Auditor: Power Measurement Can Tell Private Data Leakage Through Iot Covert Channels, Woosub Jung, Kailai Cui, Kenneth Koltermann, Junjie Wang, Chunsheng Xin, Gang Zhou Jan 2023

Light Auditor: Power Measurement Can Tell Private Data Leakage Through Iot Covert Channels, Woosub Jung, Kailai Cui, Kenneth Koltermann, Junjie Wang, Chunsheng Xin, Gang Zhou

Electrical & Computer Engineering Faculty Publications

Despite many conveniences of using IoT devices, they have suffered from various attacks due to their weak security. Besides well-known botnet attacks, IoT devices are vulnerable to recent covert-channel attacks. However, no study to date has considered these IoT covert-channel attacks. Among these attacks, researchers have demonstrated exfiltrating users' private data by exploiting the smart bulb's capability of infrared emission.

In this paper, we propose a power-auditing-based system that defends the data exfiltration attack on the smart bulb as a case study. We first implement this infrared-based attack in a lab environment. With a newly-collected power consumption dataset, we pre-process …