Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Chapman University (10)
- California Polytechnic State University, San Luis Obispo (7)
- Purdue University (7)
- West Virginia University (6)
- Louisiana State University (5)
-
- American University in Cairo (4)
- Clemson University (4)
- Technological University Dublin (4)
- Western University (4)
- City University of New York (CUNY) (3)
- Rochester Institute of Technology (3)
- University of Central Florida (3)
- University of Nebraska - Lincoln (3)
- California State University, San Bernardino (2)
- Embry-Riddle Aeronautical University (2)
- Michigan Technological University (2)
- Penn State Dickinson Law (2)
- The University of Akron (2)
- Universidad de Cundinamarca (2)
- University of Kentucky (2)
- University of South Florida (2)
- Association of Arab Universities (1)
- CentraCare Health (1)
- Dartmouth College (1)
- Eastern Washington University (1)
- Harrisburg University of Science and Technology (1)
- Kennesaw State University (1)
- Marshall University (1)
- Mississippi State University (1)
- Morehead State University (1)
- Keyword
-
- Deep learning (8)
- Machine Learning (8)
- Machine learning (7)
- Cybersecurity (5)
- Computer Science (4)
-
- Deep Learning (4)
- Empirical software engineering (4)
- Blockchain (3)
- Neural networks (3)
- 3D Printing (2)
- Additive Manufacturing (2)
- Bug Localization (2)
- China (2)
- Computer Vision (2)
- Data Science (2)
- Diagnosis (2)
- Drones (2)
- Forensics (2)
- Human-machine communication (2)
- Internet of things (2)
- LSTM (2)
- Metaverse (2)
- Natural language processing (2)
- Random forest (2)
- Simulation (2)
- Smartphone (2)
- Software Engineering (2)
- U.S. government (2)
- USG (2)
- Virtual reality (2)
- Publication
-
- Engineering Faculty Articles and Research (8)
- Department of Electrical and Computer Engineering Faculty Publications (6)
- Graduate Theses, Dissertations, and Problem Reports (6)
- Honors Theses (6)
- Theses and Dissertations (5)
-
- Electronic Thesis and Dissertation Repository (4)
- Conference papers (3)
- Dissertations, Theses, and Capstone Projects (3)
- Frameless (3)
- Human-Machine Communication (3)
- LSU Doctoral Dissertations (3)
- Master's Theses (3)
- All Dissertations (2)
- All Theses (2)
- Computer Engineering (2)
- Dickinson Law Review (2017-Present) (2)
- Dissertations, Master's Theses and Master's Reports (2)
- Electronic Theses, Projects, and Dissertations (2)
- LSU Master's Theses (2)
- Military Cyber Affairs (2)
- Williams Honors College, Honors Research Projects (2)
- Art Faculty Articles and Research (1)
- Computer Science Graduate Research Workshop (1)
- Computer Science and Engineering Theses and Dissertations (1)
- Dartmouth College Master’s Theses (1)
- Doctoral Dissertations (1)
- Doctoral Dissertations and Master's Theses (1)
- EWU Masters Thesis Collection (1)
- Electrical Engineering (1)
- Electronic Theses and Dissertations (1)
- Publication Type
Articles 1 - 30 of 102
Full-Text Articles in Engineering
30 Años De Transformación Regional. Chía Y Zipaquirá, José Zacarías Mayorga Sánchez, Luz Deicy Flórez Espinal, Viviana Andrea Caballero Moreno, Luz Mireya Rincón Mora, John Jairo Zambrano Rocha, Eduard Neftali Gutiérrez, Carlos Augusto Trujillo Padilla, Carlos Germán González Pedraza, Juan Manuel Urrego Laurin, León Fabio Salcedo Ortiz, Ana Betina Morgante Combariza, Eduardo Ernesto Castro Neira
30 Años De Transformación Regional. Chía Y Zipaquirá, José Zacarías Mayorga Sánchez, Luz Deicy Flórez Espinal, Viviana Andrea Caballero Moreno, Luz Mireya Rincón Mora, John Jairo Zambrano Rocha, Eduard Neftali Gutiérrez, Carlos Augusto Trujillo Padilla, Carlos Germán González Pedraza, Juan Manuel Urrego Laurin, León Fabio Salcedo Ortiz, Ana Betina Morgante Combariza, Eduardo Ernesto Castro Neira
Institucional
En el trigésimo aniversario de vida universitaria de nuestro claustro académico, la Extensión Chía, recordamos con agrado el proceso desarrollado en esta corta pero muy exitosa actividad universitaria. Conocida como la ciudad de La Luna, el municipio de Chía es un importante centro empresarial e industrial del departamento de Cundinamarca, sede de varias instituciones de educación superior. Hoy es un referente de primer orden el proceso de desarrollo económico y social que ha atravesado la provincia Sabana Centro, en especial, debido a la cercanía a la capital del país. Es un centro cultural y turístico por excelencia con una rica …
The Evolution Of Gendered Software: Products, Scientific Reasoning, Criticism, And Tools, Victoria A. E. Kratel
The Evolution Of Gendered Software: Products, Scientific Reasoning, Criticism, And Tools, Victoria A. E. Kratel
Human-Machine Communication
Over the past 7 decades, gendered software has become globally established. In this theoretical distribution, I outline the evolution of gendered software. The journey of gendered software started with the raw idea fueled by Alan Turing’s imitation game in the 1950s. And only shortly thereafter, in the 1960s and 1970s, the first gendered software products like Joseph Weizenbaum’s ELIZA were developed. Thus, academia took its time to not only explore technological aspects, but to further investigate the matter of gender in the 1990s CASA-paradigm (Nass et al., 1994) and Media Equation (Reeves & Nass, 1996). As these theories reasoned the …
Do People Perceive Alexa As Gendered? A Cross-Cultural Study Of People’S Perceptions, Expectations, And Desires Of Alexa, Leopoldina Fortunati, Autumn P. Edwards, Anna Maria Manganelli, Chad Edwards, Federico De Luca
Do People Perceive Alexa As Gendered? A Cross-Cultural Study Of People’S Perceptions, Expectations, And Desires Of Alexa, Leopoldina Fortunati, Autumn P. Edwards, Anna Maria Manganelli, Chad Edwards, Federico De Luca
Human-Machine Communication
Mainly, the scholarly debate on Alexa has focused on sexist/anti-woman gender representations in the everyday life of many families, on a cluster of themes such as privacy, insecurity, and trust, and on the world of education and health. This paper takes another stance and explores via online survey methodology how university student respondents in two countries (the United States, n = 333; and Italy, n = 322) perceive Alexa’s image and gender, what they expect from this voice-based assistant, and how they would like Alexa to be. Results of a free association exercise showed that Alexa’s image was scarcely embodied …
Machine Learning Approach To Investigate Ev Battery Characteristics, Shayan Falahatdoost
Machine Learning Approach To Investigate Ev Battery Characteristics, Shayan Falahatdoost
Major Papers
The main factor influencing an electric vehicle’s range is its battery. Battery electric vehicles experience driving range reduction in low temperatures. This range reduction results from the heating demand for the cabin and recuperation limits by the braking system. Due to the lack of an internal combustion engine-style heat source, electric vehicles' heating system demands a significant amount of energy. This energy is supplied by the battery and results in driving range reduction. Moreover, Due to the battery's low temperature in cold weather, the charging process through recuperation is limited. This limitation of recuperation is caused by the low reaction …
Towards Multipronged On-Chip Memory And Data Protection From Verification To Design And Test, Senwen Kan, Jennifer Dworak
Towards Multipronged On-Chip Memory And Data Protection From Verification To Design And Test, Senwen Kan, Jennifer Dworak
Computer Science and Engineering Theses and Dissertations
Modern System on Chips (SoCs) generally include embedded memories, and these memories may be vulnerable to malicious attacks such as hardware trojan horses (HTHs), test access port exploitation, and malicious software. This dissertation contributes verification as well as design obfuscation solutions aimed at design level detection of memory HTH circuits as well as obfuscation to prevent HTH triggering for embedded memory during functional operation. For malicious attack vectors stemming from test/debug interfaces, this dissertation presents novel solutions that enhance design verification and securitization of an IJTAG based test access interface. Such solutions can enhance SoC protection by preventing memory test …
Behavioral Biometrics-Based Continuous User Authentication, Sanket Vilas Salunke
Behavioral Biometrics-Based Continuous User Authentication, Sanket Vilas Salunke
Electronic Thesis and Dissertation Repository
The field of cybersecurity is exploring new ways to defend against cyber-attacks, including a technique called continuous user authentication. This method uses keystroke (typing) data to continuously match the user's typing pattern with patterns previously recorded using artificial intelligence (AI) to identify the user. While this approach has the potential to improve security, it also has some challenges, including the time it takes to register a user, the performance of machine learning algorithms on real-world data, and latency within the system. In this study, the researchers proposed solutions to these issues by using transfer learning to reduce user registration time, …
A Comparative Study On Blockchain-Based Electronic Health Record Systems: Performance, Privacy, And Security Between Hyperledger Fabric And Ethereum Frameworks, Md Jobair Hossain Faruk, Hossain Shahriar, Maria Valero, Xia Li
A Comparative Study On Blockchain-Based Electronic Health Record Systems: Performance, Privacy, And Security Between Hyperledger Fabric And Ethereum Frameworks, Md Jobair Hossain Faruk, Hossain Shahriar, Maria Valero, Xia Li
Master of Science in Software Engineering Theses
Traditional data collection, storage, and processing of Electronic Health Records (EHR) utilize centralized techniques that pose several risks of single point of failure and lean the systems to a number of internal and external data breaches that compromise their reliability and availability. Addressing the challenges of conventional database techniques and improving the overall aspects of EHR application, blockchain technology is being evaluated to find a possible solution. Blockchain refers to an emerging distributed technology and incorruptible database of records or digital events which execute, validate, and maintain by a ledger technology to provide an immutable architecture and prevent records manipulation …
Comparing Importance Of Knowledge And Professional Skill Areas For Engineering Programming Utilizing A Two Group Delphi Survey, John F. Hutton
Comparing Importance Of Knowledge And Professional Skill Areas For Engineering Programming Utilizing A Two Group Delphi Survey, John F. Hutton
Theses and Dissertations
All engineering careers require some level of programming proficiency. However, beginning programming classes are challenging for many students. Difficulties have been well-documented and contribute to high drop-out rates which prevent students from pursuing engineering. While many approaches have been tried to improve the performance of students and reduce the dropout rate, continued work is needed. This research seeks to re-examine what items are critical for programming education and how those might inform what is taught in introductory programming classes (CS1). Following trends coming from accreditation and academic boards on the importance of professional skills, we desire to rank knowledge and …
A Study Of Heart Disease Diagnosis Using Machine Learning And Data Mining, Intisar Ahmed
A Study Of Heart Disease Diagnosis Using Machine Learning And Data Mining, Intisar Ahmed
Electronic Theses, Projects, and Dissertations
Heart disease is the leading cause of death for people around the world today. Diagnosis for various forms of heart disease can be detected with numerous medical tests, however, predicting heart disease without such tests is very difficult. Machine learning can help process medical big data and provide hidden knowledge which otherwise would not be possible with the naked eye. The aim of this project is to explore how machine learning algorithms can be used in predicting heart disease by building an optimized model. The research questions are; 1) What Machine learning algorithms are used in the diagnosis of heart …
Large Genomes Assembly Using Mapreduce Framework, Yuehua Zhang
Large Genomes Assembly Using Mapreduce Framework, Yuehua Zhang
All Dissertations
Knowing the genome sequence of an organism is the essential step toward understanding its genomic and genetic characteristics. Currently, whole genome shotgun (WGS) sequencing is the most widely used genome sequencing technique to determine the entire DNA sequence of an organism. Recent advances in next-generation sequencing (NGS) techniques have enabled biologists to generate large DNA sequences in a high-throughput and low-cost way. However, the assembly of NGS reads faces significant challenges due to short reads and an enormously high volume of data. Despite recent progress in genome assembly, current NGS assemblers cannot generate high-quality results or efficiently handle large genomes …
Iot In Smart Communities, Technologies And Applications., Muhammad Zaigham Abbas Shah Syed
Iot In Smart Communities, Technologies And Applications., Muhammad Zaigham Abbas Shah Syed
Electronic Theses and Dissertations
Internet of Things is a system that integrates different devices and technologies, removing the necessity of human intervention. This enables the capacity of having smart (or smarter) cities around the world. By hosting different technologies and allowing interactions between them, the internet of things has spearheaded the development of smart city systems for sustainable living, increased comfort and productivity for citizens. The Internet of Things (IoT) for Smart Cities has many different domains and draws upon various underlying systems for its operation, in this work, we provide a holistic coverage of the Internet of Things in Smart Cities by discussing …
The Effects Of Virtual Reality On Mental Health Software User Satisfaction And Retention, William Hooten
The Effects Of Virtual Reality On Mental Health Software User Satisfaction And Retention, William Hooten
Honors Theses
Mental health issues have become increasingly important in today's society. With that being said, researchers and consumers are looking for new ways to manage and treat mental health using new technologies in labs and the consumer space. This innovation has led to the presence of mobile self-help mental health applications, applications for peoples’ phones that are used to manage symptoms of mental health problems, such as depression and anxiety, track goals, meditate, and more. However, mobile mental health applications, and mobile applications in general, have a problem concerning user satisfaction and overall user retention – studies have shown that 95% …
Digital Forensics For Investigating Control-Logic Attacks In Industrial Control Systems, Nauman Zubair
Digital Forensics For Investigating Control-Logic Attacks In Industrial Control Systems, Nauman Zubair
University of New Orleans Theses and Dissertations
Programmable logic controllers (PLC) are required to handle physical processes and thus crucial in critical infrastructures like power grids, nuclear facilities, and gas pipelines. Attacks on PLCs can have disastrous consequences, considering attacks like Stuxnet and TRISIS. Those attacks are examples of exploits where the attacker aims to inject into a target PLC malicious control logic, which engineering software compiles as a reliable code. When investigating a security incident, acquiring memory can provide valuable insight such as runtime system activities and memory-based artifacts which may contain the attacker's footprints. The existing memory acquisition tools for PLCs require a hardware-level debugging …
Lung Cancer Type Classification, Mohit Ramajibhai Ankoliya
Lung Cancer Type Classification, Mohit Ramajibhai Ankoliya
Electronic Theses, Projects, and Dissertations
Lung cancer is the third most common cancer in the U.S. This research focuses on classifying lung cancer cells based on their tumor cell, shape, and biological traits in images automatically obtained by passing through the
convolutional layers. Additionally, I classify whether the lung cell is adenocarcinoma, large cell carcinoma, squamous cell carcinoma, or normal cell carcinoma. The benefit of this classification is an accurate prognosis, leading to patients receiving proper therapy. The Lung Cancer CT(Computed Tomography) image dataset from Kaggle has been drawn with 1000 CT images of various types of lung cancer. Two state-of-the-art convolutional neural networks (CNNs) …
Effects Of Surface Noise On Printing Artifacts: An Artistic Approach To Hiding Print Artifacts, Samuel New
Effects Of Surface Noise On Printing Artifacts: An Artistic Approach To Hiding Print Artifacts, Samuel New
All Theses
This research focuses on improving the quality of Fused Filament Fabrication (FFF) 3D printing by using fractal noise to mask certain print artifacts (e.g. layer lines and stair-stepping). The use of textures is quite common in digital sculpting for aesthetic reasons. This study focuses on finding specific textures that minimize visible 3D print artifacts.
Enabling The Human Perception Of A Working Camera In Web Conferences Via Its Movement, Anish Shrestha
Enabling The Human Perception Of A Working Camera In Web Conferences Via Its Movement, Anish Shrestha
LSU Master's Theses
In recent years, video conferencing has seen a significant increase in its usage due to the COVID-19 pandemic. When casting user’s video to other participants, the videoconference applications (e.g. Zoom, FaceTime, Skype, etc.) mainly leverage 1) webcam’s LED-light indicator, 2) user’s video feedback in the software and 3) the software’s video on/off icons to remind the user whether the camera is being used. However, these methods all impose the responsibility on the user itself to check the camera status, and there have been numerous cases reported when users expose their privacy inadvertently due to not realizing that their camera is …
Device Free Indoor Localization Of Human Target Using Wifi Fingerprinting, Prasanga Neupane
Device Free Indoor Localization Of Human Target Using Wifi Fingerprinting, Prasanga Neupane
LSU Master's Theses
Indoor localization of human objects has many important applications nowadays. Proposed here is a new device free approach where all the transceiver devices are fixed in an indoor environment so that the human target doesn't need to carry any transceiver device with them. This work proposes radio-frequency fingerprinting for the localization of human targets which makes this even more convenient as radio-frequency wireless signals can be easily acquired using an existing wireless network in an indoor environment. This work explores different avenues for optimal and effective placement of transmitter devices for better localization. In this work, an experimental environment is …
An Evaluation Framework For Digital Image Forensics Tools, Zainab Khalid, Sana Qadir
An Evaluation Framework For Digital Image Forensics Tools, Zainab Khalid, Sana Qadir
Journal of Digital Forensics, Security and Law
The boom of digital cameras, photography, and social media has drastically changed how humans live their day-to-day, but this normalization is accompanied by malicious agents finding new ways to forge and tamper with images for unlawful monetary (or other) gains. Disinformation in the photographic media realm is an urgent threat. The availability of a myriad of image editing tools renders it almost impossible to differentiate between photo-realistic and original images. The tools available for image forensics require a standard framework against which they can be evaluated. Such a standard framework can aid in evaluating the suitability of an image forensics …
Towards Qos-Based Embedded Machine Learning, Tom Springer, Erik Linstead, Peiyi Zhao, Chelsea Parlett-Pelleriti
Towards Qos-Based Embedded Machine Learning, Tom Springer, Erik Linstead, Peiyi Zhao, Chelsea Parlett-Pelleriti
Engineering Faculty Articles and Research
Due to various breakthroughs and advancements in machine learning and computer architectures, machine learning models are beginning to proliferate through embedded platforms. Some of these machine learning models cover a range of applications including computer vision, speech recognition, healthcare efficiency, industrial IoT, robotics and many more. However, there is a critical limitation in implementing ML algorithms efficiently on embedded platforms: the computational and memory expense of many machine learning models can make them unsuitable in resource-constrained environments. Therefore, to efficiently implement these memory-intensive and computationally expensive algorithms in an embedded computing environment, innovative resource management techniques are required at the …
Machine Learning And Artificial Intelligence Methods For Cybersecurity Data Within The Aviation Ecosystem, Anna Baron Garcia
Machine Learning And Artificial Intelligence Methods For Cybersecurity Data Within The Aviation Ecosystem, Anna Baron Garcia
Doctoral Dissertations and Master's Theses
Aviation cybersecurity research has proven to be a complex topic due to the intricate nature of the aviation ecosystem. Over the last two decades, research has been centered on isolated modules of the entire aviation systems, and it has lacked the state-of-the-art tools (e.g. ML/AI methods) that other cybersecurity disciplines have leveraged in their fields. Security research in aviation in the last two decades has mainly focused on: (i) reverse engineering avionics and software certification; (ii) communications due to the rising new technologies of Software Defined Radios (SDRs); (iii) networking cybersecurity concerns such as the inter and intra connections of …
Deception Detection Across Domains, Languages And Modalities, Subhadarshi Panda
Deception Detection Across Domains, Languages And Modalities, Subhadarshi Panda
Dissertations, Theses, and Capstone Projects
With the increase of deception and misinformation especially in social media, it has become crucial to develop machine learning methods to automatically identify deception. In this dissertation, we identify key challenges underlying text-based deception detection in a cross-domain setting, where we do not have training data in the target domain. We analyze the differences between domains and as a result develop methods to improve cross-domain deception detection. We additionally develop approaches that take advantage of cross-lingual properties to support deception detection across languages. This involves the usage of either multilingual NLP models or translation models. Finally, to better understand multi-modal …
Reality Analagous Synthetic Dataset Generation With Daylight Variance For Deep Learning Classification, Thomas Lee, Susan Mckeever, Jane Courtney
Reality Analagous Synthetic Dataset Generation With Daylight Variance For Deep Learning Classification, Thomas Lee, Susan Mckeever, Jane Courtney
Conference papers
For the implementation of Autonomously navigating Unmanned Air Vehicles (UAV) in the real world, it must be shown that safe navigation is possible in all real world scenarios. In the case of UAVs powered by Deep Learning algorithms, this is a difficult task to achieve, as the weak point of any trained network is the reduction in predictive capacity when presented with unfamiliar input data. It is possible to train for more use cases, however more data is required for this, requiring time and manpower to acquire. In this work, a potential solution to the manpower issues of exponentially scaling …
Research On The Development Of Port Digitalization And Swot Analysis For Digital Ports, Ling Dong
Research On The Development Of Port Digitalization And Swot Analysis For Digital Ports, Ling Dong
World Maritime University Dissertations
No abstract provided.
Anonymization & Generation Of Network Packet Datasets Using Deep Learning, Spencer K. Vecile
Anonymization & Generation Of Network Packet Datasets Using Deep Learning, Spencer K. Vecile
Electronic Thesis and Dissertation Repository
Corporate networks are constantly bombarded by malicious actors trying to gain access. The current state of the art in protecting networks is deep learning-based intrusion detection systems (IDS). However, for an IDS to be effective it needs to be trained on a good dataset. The best datasets for training an IDS are real data captured from large corporate networks. Unfortunately, companies cannot release their network data due to privacy concerns creating a lack of public cybersecurity data. In this thesis I take a novel approach to network dataset anonymization using character-level LSTM models to learn the characteristics of a dataset; …
Automated Identification Of Astronauts On Board The International Space Station: A Case Study In Space Archaeology, Rao Hamza Ali, Amir Kanan Kashefi, Alice C. Gorman, Justin St. P. Walsh, Erik J. Linstead
Automated Identification Of Astronauts On Board The International Space Station: A Case Study In Space Archaeology, Rao Hamza Ali, Amir Kanan Kashefi, Alice C. Gorman, Justin St. P. Walsh, Erik J. Linstead
Art Faculty Articles and Research
We develop and apply a deep learning-based computer vision pipeline to automatically identify crew members in archival photographic imagery taken on-board the International Space Station. Our approach is able to quickly tag thousands of images from public and private photo repositories without human supervision with high degrees of accuracy, including photographs where crew faces are partially obscured. Using the results of our pipeline, we carry out a large-scale network analysis of the crew, using the imagery data to provide novel insights into the social interactions among crew during their missions.
Educación Transmoderna Y Translocal Desde El Medit. Visión De La Facultad De Ingeniería, Jairo Eduardo Marquez, Arles Prieto Moreno, Misael Fernando Perilla Benítez, Diana Pilar Quitian Bernal, Dayana Catalina Medina Sandoval, José Manuel Higuera Aparicio
Educación Transmoderna Y Translocal Desde El Medit. Visión De La Facultad De Ingeniería, Jairo Eduardo Marquez, Arles Prieto Moreno, Misael Fernando Perilla Benítez, Diana Pilar Quitian Bernal, Dayana Catalina Medina Sandoval, José Manuel Higuera Aparicio
Ingeniería
La Universidad de Cundinamarca dentro de su quehacer académico e investigativo, busca cambiar el paradigma de la educación superior tradicional a través del Modelo Educativo Digital Transmoderno (MEDIT); el cual está acompañado por diversos elementos que contribuyen a una formación integral del educando, viéndolo como una persona para la vida, inculcando valores democráticos, civilidad y libertad, conjugados con lo que se ha llegado a denominar como campos multidimensionales de aprendizaje; que permiten vislumbrar un sinnúmero de posibilidades formativas para una educación contemporánea vista desde la traslocalidad y transmodernidad. Bajo esta mirada, el presente libro muestra los resultados de la colaboración …
Learning With Limited Labeled Data For Image And Video Understanding, Razieh Kaviani Baghbaderani
Learning With Limited Labeled Data For Image And Video Understanding, Razieh Kaviani Baghbaderani
Doctoral Dissertations
Deep learning-based algorithms have remarkably improved the performance in many computer vision tasks. However, deep networks often demand a large-scale and carefully annotated dataset and sufficient sample coverage of every training category. However, it is not practical in many real-world applications where only a few examples may be available, or the data annotation is costly and require expert knowledge. To mitigate this issue, learning with limited data has gained considerable attention and is investigated thorough different learning methods, including few-shot learning, weakly/semi supervised learning, open-set learning, etc.
In this work, the classification problem is investigated under an open-world assumption to …
A Digital Healthcare Application For Patient Monitoring And Assessment, Brandon Shumin
A Digital Healthcare Application For Patient Monitoring And Assessment, Brandon Shumin
All Theses
The COVID-19 pandemic strained our healthcare resources and exacerbated the existing issues of primary care shortages and burnout rates for healthcare professionals. Due in part to these factors, telehealth has seen more wide-spread use during this time. However, current asynchronous telehealth applications require stable Internet to function fully. Since many medically underserved populations in the United States lack Internet access in their homes, an application that offers patient monitoring and assessment could extend their access to medical resources. This work proposes such a digital healthcare application for iOS devices and evaluates it based on the system requirements of availability, data …
Classifying Toe Walking Gait Patterns Among Children Diagnosed With Idiopathic Toe Walking Using Wearable Sensors And Machine Learning Algorithms, Rahul Soangra, Yuxin Wen, Hualin Yang, Marybeth Grant-Beuttler
Classifying Toe Walking Gait Patterns Among Children Diagnosed With Idiopathic Toe Walking Using Wearable Sensors And Machine Learning Algorithms, Rahul Soangra, Yuxin Wen, Hualin Yang, Marybeth Grant-Beuttler
Physical Therapy Faculty Articles and Research
Idiopathic toe walking (ITW) is a gait abnormality in which children’s toes touch at initial contact and demonstrate limited or no heel contact throughout the gait cycle. Toe walking results in poor balance, increased risk of falling, and developmental delays among children. Identifying toe walking steps during walking can facilitate targeted intervention among children diagnosed with ITW. With recent advances in wearable sensing, communication technologies, and machine learning, new avenues of managing toe walking behavior among children are feasible. In this study, we investigate the capabilities of Machine Learning (ML) algorithms in identifying initial foot contact (heel strike versus toe …
Addressing The "Leaky Pipeline": A Review And Categorisation Of Actions To Recruit And Retain Women In Computing Education, Alina Berry, Susan Mckeever, Brenda Murphy, Sarah Jane Delany
Addressing The "Leaky Pipeline": A Review And Categorisation Of Actions To Recruit And Retain Women In Computing Education, Alina Berry, Susan Mckeever, Brenda Murphy, Sarah Jane Delany
Conference papers
Gender imbalance in computing education is a well-known issue around the world. For example, in the UK and Ireland, less than 20% of the student population in computer science, ICT and related disciplines are women. Similar figures are seen in the labour force in the field across the EU. The term "leaky pipeline"; is often used to describe the lack of retention of women before they progress to senior roles. Numerous initiatives have targeted the problem of the leaky pipeline in recent decades. This paper provides a comprehensive review of initiatives related to techniques used to boost recruitment and improve …