Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- University of Nebraska - Lincoln (72)
- Singapore Management University (44)
- Technological University Dublin (41)
- Marquette University (32)
- University of South Carolina (21)
-
- Florida International University (11)
- City University of New York (CUNY) (10)
- Old Dominion University (10)
- Portland State University (10)
- Chapman University (9)
- Embry-Riddle Aeronautical University (9)
- Purdue University (9)
- University of Louisville (9)
- University of New Haven (9)
- Washington University in St. Louis (8)
- Loyola University Chicago (5)
- Western University (5)
- Fordham University (4)
- Santa Clara University (4)
- University of Kentucky (4)
- Edith Cowan University (3)
- Nova Southeastern University (3)
- Tennessee State University (3)
- University of Georgia School of Law (3)
- University of Nevada, Las Vegas (3)
- University of New Mexico (3)
- University of Texas at El Paso (3)
- Manipal Academy of Higher Education (2)
- Morehead State University (2)
- Munster Technological University (2)
- Keyword
-
- Deep learning (14)
- Machine learning (14)
- Machine Learning (13)
- Robotics (8)
- Artificial intelligence (7)
-
- Deep Learning (7)
- Security (7)
- Internet of Things (6)
- Neural networks (6)
- Big data (5)
- Classification (5)
- Digital Agriculture (5)
- Image processing (5)
- Internet of Underground Things (5)
- Twitter (5)
- Underground Communications (5)
- Wireless Underground Channel (5)
- Android (4)
- Artificial Intelligence (4)
- Authentication (4)
- Clustering (4)
- Convolutional neural network (4)
- Feature extraction (4)
- IoT (4)
- Long short-term memory (4)
- Reinforcement learning (4)
- Social media (4)
- Telecommunications (4)
- Virtual reality (4)
- Accessibility (3)
- Publication
-
- Research Collection School Of Computing and Information Systems (40)
- Department of Electrical and Computer Engineering: Faculty Publications (33)
- Electrical and Computer Engineering Faculty Research and Publications (32)
- Faculty Publications (31)
- Dissertations (20)
-
- Department of Computer Science and Engineering: Dissertations, Theses, and Student Research (16)
- Publications (14)
- FIU Electronic Theses and Dissertations (11)
- Electrical & Computer Engineering and Computer Science Faculty Publications (9)
- Faculty Scholarship (9)
- Library Philosophy and Practice (e-journal) (9)
- All Computer Science and Engineering Research (8)
- Conference papers (8)
- Department of Electrical and Computer Engineering: Dissertations, Theses, and Student Research (8)
- Publications and Research (8)
- Computer Science Faculty Publications (7)
- Undergraduate Research & Mentoring Program (6)
- Articles (5)
- Electrical and Computer Engineering Publications (5)
- Engineering Faculty Articles and Research (5)
- Computer Science Faculty Research (4)
- Computer Science and Engineering (4)
- Computer Science: Faculty Publications and Other Works (3)
- Departmental Technical Reports (CS) (3)
- Doctoral (3)
- Engineering Technology Faculty Publications (3)
- Presentations (3)
- Research outputs 2014 to 2021 (3)
- Student Scholar Symposium Abstracts and Posters (3)
- All Faculty Scholarship (2)
Articles 61 - 90 of 391
Full-Text Articles in Engineering
An Open-Source Integration Platform For Multiple Peripheral Modules With Kuka Robots, Mahyar Abdeetedal, Mehrdad Kermani Ph.D., P.Eng.
An Open-Source Integration Platform For Multiple Peripheral Modules With Kuka Robots, Mahyar Abdeetedal, Mehrdad Kermani Ph.D., P.Eng.
Electrical and Computer Engineering Publications
This paper presents an open-source software interface for the integration of a Kuka robot with peripheral tools and sensors, KUI: Kuka User Interface. KUI is developed based on Kuka Fast Research Interface (FRI) which enables soft real-time control of the robot. Simulink Desktop Real-Time™ or any User Datagram Protocol (UDP) client can send real-time commands to Kuka robot via KUI. In KUI, third-party tools can be added and controlled synchronously with Kuka light-weight robot (LWR). KUI can send the control commands via serial communication to the attached devices. KUI can generate low-level commands using data acquisition (DAQ) boards. This feature …
The Stability Analysis For Wind Turbines With Doubly Fed Induction Generators, Baohua Dong
The Stability Analysis For Wind Turbines With Doubly Fed Induction Generators, Baohua Dong
Department of Electrical and Computer Engineering: Dissertations, Theses, and Student Research
The quickly increasing, widespread use of wind generation around the world reduces carbon emissions, decreases the effects of global warming, and lowers dependence on fossil fuels. However, the growing penetration of wind power requires more effort to maintain power systems stability.
This dissertation focuses on developing a novel algorithm which dynamically optimizes the proportional-integral (PI) controllers of a doubly fed induction generator (DFIG) driven by a wind turbine to increase the transient performance based on small signal stability analysis.
Firstly, the impact of wind generation is introduced. The stability of power systems with wind generation is described, including the different …
Secure Virtual Machine Placement In Cloud Data Centers, Amit Agarwal, Nguyen Binh Duong Ta
Secure Virtual Machine Placement In Cloud Data Centers, Amit Agarwal, Nguyen Binh Duong Ta
Research Collection School Of Computing and Information Systems
Due to an increasing number of avenues for conducting cross-VM side-channel attacks, the security of multi-tenant public IaaS cloud environments is a growing concern. These attacks allow an adversary to steal private information from a target user whose VM instance is co-located with that of the adversary. In this paper, we focus on secure VM placement algorithms which a cloud provider can use for the automatic enforcement of security against such co-location based attacks. To do so, we first establish a metric for evaluating and quantifying co-location security of multi-tenant public IaaS clouds, and then propose a novel VM placement …
Stressmon: Scalable Detection Of Perceived Stress And Depression Using Passive Sensing Of Changes In Work Routines And Group Interactions, Nur Camellia Binte Zakaria, Rajesh Balan, Youngki Lee
Stressmon: Scalable Detection Of Perceived Stress And Depression Using Passive Sensing Of Changes In Work Routines And Group Interactions, Nur Camellia Binte Zakaria, Rajesh Balan, Youngki Lee
Research Collection School Of Computing and Information Systems
Stress and depression are a common affliction in all walks of life. When left unmanaged, stress can inhibit productivity or cause depression. Depression can occur independently of stress. There has been a sharp rise in mobile health initiatives to monitor stress and depression. However, these initiatives usually require users to install dedicated apps or multiple sensors, making such solutions hard to scale. Moreover, they emphasise sensing individual factors and overlook social interactions, which plays a significant role in influencing stress and depression while being a part of a social system. We present StressMon, a stress and depression detection system that …
How To Create And Maintain An Effective Information Architecture And Navigation System For Science Gateway Websites, Noreen Y. Whysel, Omni Marketing Interactive
How To Create And Maintain An Effective Information Architecture And Navigation System For Science Gateway Websites, Noreen Y. Whysel, Omni Marketing Interactive
Publications and Research
Whether you have an existing Science Gateway website or are creating your first one, this hands-on tutorial will show you, step by step, how to create and update gateway websites so that their content is easier to find and easier to use.
As a Science Gateway provides its web-based tools and resources, it is essential that these sites utilize specific usability tests and other research methods to ensure positive and productive experiences with the sites. Successful information architecture (IA), intuitive site navigation, and clear user interfaces (UIs) all rely on knowing where various users expect to find needed information.
Since …
Automated Dynamic Detection Of Self-Hiding Behavior In Android Apps, Luke Baird, Seth Rodgers
Automated Dynamic Detection Of Self-Hiding Behavior In Android Apps, Luke Baird, Seth Rodgers
Student Works
Android applications that conceal themselves from a user, defined as exhibiting a “self-hiding behavior,” pose a threat to the user’s privacy, as these applications can live on a device undetected by the user. Malicious applications can do this to execute without being found by the user. Three lists are analyzed in particular—the home, running, and installed lists—as they are directly related to the typical Android app life cycle. Additionally, self-hiding behavior in the device admin list is analyzed due to the potential for catastrophic actions to be taken by device admin malware. This research proposes four dynamic analysis tools that …
A Deep Learning Approach For Final Grasping State Determination From Motion Trajectory Of A Prosthetic Hand, Cihan Uyanik, Syed F. Hussaini, Erdem Erdemir, Erkan Kaplanoglu, Ali Sekmen
A Deep Learning Approach For Final Grasping State Determination From Motion Trajectory Of A Prosthetic Hand, Cihan Uyanik, Syed F. Hussaini, Erdem Erdemir, Erkan Kaplanoglu, Ali Sekmen
Computer Science Faculty Research
Deep Learning has been gaining popularity due to its numerous implementations and continuous growing capabilities, including the prosthetics industry which has trend of evaluation towards the smart operational decision. The aim of this study is to develop a reliable decision-making system for prosthetic hands which is responsible to grasp or point an object located in the interaction area. In order to achieve this goal, we have exploited the measurements taken from a low-cost inertial measurement unit (IMU) and proposed a convolutional neural network-based decision-making system, which utilizes 9 distinct measurement variables as input, 3 axis accelerometer, 3 axis gyroscope and …
A Deep Learning Approach For Motion Segment Estimation For Pipe Leak Detection Robot, Cihan Uyanik, Erdem Erdemir, Erkan Kaplanoglu, Ali Sekmen
A Deep Learning Approach For Motion Segment Estimation For Pipe Leak Detection Robot, Cihan Uyanik, Erdem Erdemir, Erkan Kaplanoglu, Ali Sekmen
Computer Science Faculty Research
The trajectory motion of a robot can be a valuable information to estimate the localization of an autonomous robotic system, especially in a very dynamic but structurally-known environments like water pipes where the sensor readings are not reliable. The main focus of this research is to estimate the location of meso-scale robots using a deep-learning-based motion trajectory segment detection system from recorded sensory measurements while the robot travels through a pipe system. The idea is based on the classification of the motion measurements, acquired by inertial measurement unit (IMU), by exploiting the deep learning approach. Proposed idea and utilized methodology …
A Privacy Framework For Decentralized Applications Using Blockchains And Zero Knowledge Proofs, David Gabay
A Privacy Framework For Decentralized Applications Using Blockchains And Zero Knowledge Proofs, David Gabay
FIU Electronic Theses and Dissertations
With the increasing interest in connected vehicles along with electrification opportunities, there is an ongoing effort to automate the charging process of electric vehicles (EVs) through their capabilities to communicate with the infrastructure and each other. However, charging EVs takes time and thus in-advance scheduling is needed. As this process is done frequently due to limited mileage of EVs, it may expose the locations and charging pattern of the EV to the service providers, raising privacy concerns for their users. Nevertheless, the EV still needs to be authenticated to charging providers, which means some information will need to be provided …
Work-In-Progress: Iot Device Signature Validation, Jeffrey Hemmes
Work-In-Progress: Iot Device Signature Validation, Jeffrey Hemmes
Regis University Faculty Publications
Device fingerprinting is an area of security that has received renewed attention in recent years, with a number of classification methods proposed that rely on characteristics unique to a particular vendor or device type. Current works are limited to determining device type for purposes of access control and MAC address spoof prevention. This work synthesizes multiple sources of information to verify device capabilities in a device profile, which can be used in a number of applications not limited to authentication and authorization. The approach proposed in this paper relies on existing protocols and methods proposed in the literature, using a …
Vrsensory: Designing Inclusive Virtual Games With Neurodiverse Children, Ben Wasserman, Derek Prate, Bryce Purnell, Alex Muse, Kaitlyn Abdo, Kendra Day, Louanne Boyd
Vrsensory: Designing Inclusive Virtual Games With Neurodiverse Children, Ben Wasserman, Derek Prate, Bryce Purnell, Alex Muse, Kaitlyn Abdo, Kendra Day, Louanne Boyd
Engineering Faculty Articles and Research
We explore virtual environments and accompanying interaction styles to enable inclusive play. In designing games for three neurodiverse children, we explore how designing for sensory diversity can be understood through a formal game design framework. Our process reveals that by using sensory processing needs as requirements we can make sensory and social accessible play spaces. We contribute empirical findings for accommodating sensory differences for neurodiverse children in a way that supports inclusive play. Specifically, we detail the sensory driven design choices that not only support the enjoyability of the leisure activities, but that also support the social inclusion of sensory-diverse …
High-Sensitivity Magnetic Sensors Based On Gmi Microwire-Saw Idt Design, Akila Khatun, Florian Bender, Fabien Josse Phd, Arnold Kweku Mensah-Brown, R. Dyche Anderson
High-Sensitivity Magnetic Sensors Based On Gmi Microwire-Saw Idt Design, Akila Khatun, Florian Bender, Fabien Josse Phd, Arnold Kweku Mensah-Brown, R. Dyche Anderson
Electrical and Computer Engineering Faculty Research and Publications
This work presents a design approach for a highly sensitive, miniaturized magnetic sensor. The design makes use of GMI microwires and a multi-electrode SAW IDT. The use of SAW IDTs allows for the magnetic effect of the GMI microwire to be measured through the transduction process. This approach permits simultaneous measurement at different frequencies of operation, enabling highly sensitive measurement over a wide range of magnetic fields. This technique may find application in magnetic sensing for non-invasive battery SOC measurement.
Vibration Alert Bracelet For Notification Of The Visually And Hearing Impaired, Kelsey Conley, Alex Foyer, Patrick Hara, Tom Janik, Jason Reichard, Jon D'Souza, Chandana Tamma, Cristinel Ababei
Vibration Alert Bracelet For Notification Of The Visually And Hearing Impaired, Kelsey Conley, Alex Foyer, Patrick Hara, Tom Janik, Jason Reichard, Jon D'Souza, Chandana Tamma, Cristinel Ababei
Electrical and Computer Engineering Faculty Research and Publications
This paper presents the prototype of an electronic vibration bracelet designed to help the visually and hearing impaired to receive and send emergency alerts. The bracelet has two basic functions. The first function is to receive a wireless signal and respond with a vibration to alert the user. The second function is implemented by pushing one button of the bracelet to send an emergency signal. We report testing on a prototype system formed by a mobile application and two bracelets. The bracelets and the application form a complete system intended to be used in retirement apartment communities. However, the system …
Enginews, Fall 2019, School Of Computer Science & Engineering
Enginews, Fall 2019, School Of Computer Science & Engineering
News, Magazines and Reports
The IDEA Lab at SHU offers a variety of state of the art equipment available for students to use.
Privacidad Digital En Ecuador: El Papel De La Vigilancia, La Jurisprudencia Y Los Derechos Humanos, Giselle Valdez
Privacidad Digital En Ecuador: El Papel De La Vigilancia, La Jurisprudencia Y Los Derechos Humanos, Giselle Valdez
Independent Study Project (ISP) Collection
Este documento es un estudio de caso sobre la privacidad digital en Ecuador, cómo se protege y cómo se debe mejorar las protecciones. Comienzo presentando la falta de privacidad de la persona en Ecuador, a través de la reciente violación de datos y las tecnologías de vigilancia en todo el país desde China. Luego, para analizar la jurisprudencia y la falta de protección de la privacidad en la ley, hago la transición a un análisis legal de la privacidad de datos en Ecuador a través de la Constitución de 2008. Cuando establezco que falta privacidad digital en Ecuador, demuestro una …
Effective Capacity In Wireless Networks: A Comprehensive Survey, Muhammad Amjad, Mubashir Husain Rehmani, Leila Musavian
Effective Capacity In Wireless Networks: A Comprehensive Survey, Muhammad Amjad, Mubashir Husain Rehmani, Leila Musavian
Publications
Low latency applications, such as multimedia communications, autonomous vehicles, and Tactile Internet are the emerging applications for next-generation wireless networks, such as 5th generation (5G) mobile networks. Existing physical layer channel models, however, do not explicitly consider quality of service (QoS) aware related parameters under specific delay constraints. To investigate the performance of low-latency applications in future networks, a new mathematical framework is needed. Effective capacity (EC), which is a link-layer channel model with QoS-awareness, can be used to investigate the performance of wireless networks under certain statistical delay constraints. In this paper, we provide a comprehensive survey on existing …
Explaining Regressions Via Alignment Slicing And Mending, Haijun Wang, Yun Lin, Zijiang Yang, Jun Sun, Yang Liu, Jinsong Dong, Qinghua Zheng, Ting Liu
Explaining Regressions Via Alignment Slicing And Mending, Haijun Wang, Yun Lin, Zijiang Yang, Jun Sun, Yang Liu, Jinsong Dong, Qinghua Zheng, Ting Liu
Research Collection School Of Computing and Information Systems
Regression faults, which make working code stop functioning, are often introduced when developers make changes to the software. Many regression fault localization techniques have been proposed. However, issues like inaccuracy and lack of explanation are still obstacles for their practical application. In this work, we propose a trace-based approach to identifying not only where the root cause of a regression bug lies, but also how the defect is propagated to its manifestation as the explanation. In our approach, we keep the trace of original correct version as reference and infer the faulty steps on the trace of regression version so …
Deep Hashing By Discriminating Hard Examples, Cheng Yan, Guansong Pang, Xiao Bai, Chunhua Shen, Jun Zhou, Edwin Hancock
Deep Hashing By Discriminating Hard Examples, Cheng Yan, Guansong Pang, Xiao Bai, Chunhua Shen, Jun Zhou, Edwin Hancock
Research Collection School Of Computing and Information Systems
This paper tackles a rarely explored but critical problem within learning to hash, i.e., to learn hash codes that effectively discriminate hard similar and dissimilar examples, to empower large-scale image retrieval. Hard similar examples refer to image pairs from the same semantic class that demonstrate some shared appearance but have different fine-grained appearance. Hard dissimilar examples are image pairs that come from different semantic classes but exhibit similar appearance. These hard examples generally have a small distance due to the shared appearance. Therefore, effective encoding of the hard examples can well discriminate the relevant images within a small Hamming distance, …
Generic Construction Of Elgamal-Type Attribute-Based Encryption Schemes With Revocability And Dual-Policy, Shengmin Xu, Yinghui Zhang, Yingjiu Li, Ximeng Liu, Guomin Yang
Generic Construction Of Elgamal-Type Attribute-Based Encryption Schemes With Revocability And Dual-Policy, Shengmin Xu, Yinghui Zhang, Yingjiu Li, Ximeng Liu, Guomin Yang
Research Collection School Of Computing and Information Systems
Cloud is a computing paradigm for allowing data owners to outsource their data to enjoy on-demand services and mitigate the burden of local data storage. However, secure sharing of data via cloud remains an essential issue since the cloud service provider is untrusted. Fortunately, asymmetric-key encryption, such as identity-based encryption (IBE) and attribute-based encryption (ABE), provides a promising tool to offer data confidentiality and has been widely applied in cloud-based applications. In this paper, we summarize the common properties of most of IBE and ABE and introduce a cryptographic primitive called ElGamal type cryptosystem. This primitive can be used to …
Exercises Integrating High School Mathematics With Robot Motion Planning, Ronald I. Greenberg, George K. Thiruvathukal
Exercises Integrating High School Mathematics With Robot Motion Planning, Ronald I. Greenberg, George K. Thiruvathukal
Computer Science: Faculty Publications and Other Works
This paper presents progress in developing exercises for high school students incorporating level-appropriate mathematics into robotics activities. We assume mathematical foundations ranging from algebra to precalculus, whereas most prior work on integrating mathematics into robotics uses only very elementary mathematical reasoning or, at the other extreme, is comprised of technical papers or books using calculus and other advanced mathematics. The exercises suggested are relevant to any differerential-drive robot, which is an appropriate model for many different varieties of educational robots. They guide students towards comparing a variety of natural navigational strategies making use of typical movement primitives. The exercises align …
Click Fraud Detection In Online And In-App Advertisements: A Learning Based Approach, Thejas Gubbi Sadashiva
Click Fraud Detection In Online And In-App Advertisements: A Learning Based Approach, Thejas Gubbi Sadashiva
FIU Electronic Theses and Dissertations
Click Fraud is the fraudulent act of clicking on pay-per-click advertisements to increase a site’s revenue, to drain revenue from the advertiser, or to inflate the popularity of content on social media platforms. In-app advertisements on mobile platforms are among the most common targets for click fraud, which makes companies hesitant to advertise their products. Fraudulent clicks are supposed to be caught by ad providers as part of their service to advertisers, which is commonly done using machine learning methods. However: (1) there is a lack of research in current literature addressing and evaluating the different techniques of click fraud …
Improving The Sustainability Of The Built Environment By Training Its Workforce In More Efficient And Greener Ways Of Designing And Constructing Through The Horizon2020 Bimcert Project, Barry Mcauley, Avril Behan
Improving The Sustainability Of The Built Environment By Training Its Workforce In More Efficient And Greener Ways Of Designing And Constructing Through The Horizon2020 Bimcert Project, Barry Mcauley, Avril Behan
Conference papers
The construction industry consumes up to 50% of mineral resources excavated from nature, generates about 33% of CO2 present in the atmosphere and is responsible for 40% of total global energy through both construction and operation of buildings. The realisation that current pervasive construction practices now face globalization, sustainability, and environmental concerns, as well as ever-changing legislation requirements and new skills needed for the information age has resulted in technologies such as Building Information Modelling (BIM) becoming a key enabler in navigating these barriers. To assist in overcoming these barriers, a number of funding initiatives have been put in place …
Centres Of Excellence And Roadmaps For Digital Transition: Lessons For Ireland’S Construction Industry, Barry Mcauley, Alan Hore, Roger West
Centres Of Excellence And Roadmaps For Digital Transition: Lessons For Ireland’S Construction Industry, Barry Mcauley, Alan Hore, Roger West
Conference papers
Like most sectors in today’s working world, construction businesses are challenged to work in an increasingly digitised world with sophisticated demands from intelligent clients. So much has been written about the inefficiencies of the construction industry, its fragmentation, lack of collaboration, low margins, adversarial pricing, poor productivity, financial fragility, lack of research and development, poor industry image and relatively weak use of digital solutions. The Irish government recognises the importance of digital innovation to address many of the challenges the construction industry faces. With recent high profile reports of escalating spend on signature public sector projects and weak productivity performance …
Bim In Ireland 2019: A Study Of Bim Maturity And Diffusion In Ireland, Barry Mcauley, Alan Hore, Roger West
Bim In Ireland 2019: A Study Of Bim Maturity And Diffusion In Ireland, Barry Mcauley, Alan Hore, Roger West
Conference papers
In 2017, the BIM Innovation Capability Programme team applied five macro BIM maturity conceptual models to capture the capability of the Irish construction industry and assess its BIM maturity. The results found that while Ireland is mature for modelling processes, it is less developed with regards to collaboration processes and policies. Ireland also ranked poorly when it came to regulatory frameworks, measurements and benchmarks compared to a number of countries which also applied the same conceptual models. At the time, the findings highlighted that Ireland’s diffusion dynamic was middle out, meaning that larger organisations or industry associations were pushing the …
An Investigation Into Current Procurement Strategies That Promote Collaboration Through Early Contractor Involvement With Regards To Their Suitability For Irish Public Work Projects, Barry Mcauley, Frederic Lefebvre
An Investigation Into Current Procurement Strategies That Promote Collaboration Through Early Contractor Involvement With Regards To Their Suitability For Irish Public Work Projects, Barry Mcauley, Frederic Lefebvre
Conference papers
Previous research has established that multi-disciplinary collaboration will benefit a construction project throughout its lifecycle. While Lean Construction, Building Information Modelling (BIM), and Integrated Project Delivery (IPD) can all be viewed as separate processes which add independent value to a project, they are more effective when used in partnership with each other. In order to ensure the high levels of collaboration expected for these processes to work in unison, the early involvement of the Contractor is paramount. Early contractor involvement within the design process can ensure a more focused integrated project team, improvement of both constructability and cost certainty, as …
From Roadmap To Implementation: Lessons For Ireland’S Digital Construction Programme, Barry Mcauley, Alan Hore, Roger West
From Roadmap To Implementation: Lessons For Ireland’S Digital Construction Programme, Barry Mcauley, Alan Hore, Roger West
Conference papers
As part of their Future of Construction initiative in 2018 the World Economic Forum published an action plan to accelerate Building Information Modelling adoption. The WEF report highlighted actions that companies, industry organisations and governments are advised to implement to accelerate BIM adoption and better capitalise on delivering better project outcomes. According the authors of the report BIM is seen as the centrepiece of the construction industry’s digital transformation, however they acknowledged that BIM adoption globally remain slow. Anecdotal experience would suggest that BIM usage in Ireland is also very low and that a similar initiative or an adaptation of …
Similarity-Based Chained Transfer Learning For Energy Forecasting With Big Data, Yifang Tian, Ljubisa Sehovac, Katarina Grolinger
Similarity-Based Chained Transfer Learning For Energy Forecasting With Big Data, Yifang Tian, Ljubisa Sehovac, Katarina Grolinger
Electrical and Computer Engineering Publications
Smart meter popularity has resulted in the ability to collect big energy data and has created opportunities for large-scale energy forecasting. Machine Learning (ML) techniques commonly used for forecasting, such as neural networks, involve computationally intensive training typically with data from a single building or a single aggregated load to predict future consumption for that same building or aggregated load. With hundreds of thousands of meters, it becomes impractical or even infeasible to individually train a model for each meter. Consequently, this paper proposes Similarity-Based Chained Transfer Learning (SBCTL), an approach for building neural network-based models for many meters by …
Comparing Record Linkage Software Programs And Algorithms Using Real-World Data., Alan F. Karr, Matthew T. Taylor, Suzanne L. West, Soko Setoguchi, Tzuyung D. Kou, Tobias Gerhard, Daniel B. Horton
Comparing Record Linkage Software Programs And Algorithms Using Real-World Data., Alan F. Karr, Matthew T. Taylor, Suzanne L. West, Soko Setoguchi, Tzuyung D. Kou, Tobias Gerhard, Daniel B. Horton
Student Papers, Posters & Projects
Linkage of medical databases, including insurer claims and electronic health records (EHRs), is increasingly common. However, few studies have investigated the behavior and output of linkage software. To determine how linkage quality is affected by different algorithms, blocking variables, methods for string matching and weight determination, and decision rules, we compared the performance of 4 nonproprietary linkage software packages linking patient identifiers from noninteroperable inpatient and outpatient EHRs. We linked datasets using first and last name, gender, and date of birth (DOB). We evaluated DOB and year of birth (YOB) as blocking variables and used exact and inexact matching methods. …
Hybrid Superhydrophilic–Superhydrophobic Micro/ Nanostructures Fabricated By Femtosecond Laserinduced Forward Transfer For Sub-Femtomolar Raman Detection, Xiaodan Ma, Lan Jiang, Xiaowei Li, Bohong Li, Ji Huang, Jiaxing Sun, Zhi Wang, Zhijie Xu, Liangti Qu, Yongfeng Lu, Tianhong Cui
Hybrid Superhydrophilic–Superhydrophobic Micro/ Nanostructures Fabricated By Femtosecond Laserinduced Forward Transfer For Sub-Femtomolar Raman Detection, Xiaodan Ma, Lan Jiang, Xiaowei Li, Bohong Li, Ji Huang, Jiaxing Sun, Zhi Wang, Zhijie Xu, Liangti Qu, Yongfeng Lu, Tianhong Cui
Department of Electrical and Computer Engineering: Faculty Publications
Raman spectroscopy plays a crucial role in biochemical analysis. Recently, superhydrophobic surface-enhanced Raman scattering (SERS) substrates have enhanced detection limits by concentrating target molecules into small areas. However, due to the wet transition phenomenon, further reduction of the droplet contact area is prevented, and the detection limit is restricted. This paper proposes a simple method involving femtosecond laser-induced forward transfer for preparing a hybrid superhydrophilic–superhydrophobic SERS (HS-SERS) substrate by introducing a superhydrophilic pattern to promote the target molecules to concentrate on it for ultratrace detection. Furthermore, the HS-SERS substrate is heated to promote a smaller concentrated area. The water vapor …
Advanced Mathematical And Numerical Methods In Control And Optimization For Smart Grids, Zhan Shu, Michael Z.Q. Chen, Qing Hui
Advanced Mathematical And Numerical Methods In Control And Optimization For Smart Grids, Zhan Shu, Michael Z.Q. Chen, Qing Hui
Department of Electrical and Computer Engineering: Faculty Publications
While renewable energy, as a part of smart-grid technologies, brings clean energy, it also brings a series of power quality problems. An increasing number of power electronic devices and new smart-grid technologies are used to ensure a safe, reliable, and high-quality operation of the power grid. However, the effectiveness of these control devices and technologies largely depends on the accuracy of the model, the advancement of control methods, and the numerical optimization of the parameters.
This special issue focuses on recent advances in modeling, numerical analysis, control, and optimization of smart grids with some special emphasis on the mathematical problems …