Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Chapman University (87)
- University of Nebraska - Lincoln (55)
- Technological University Dublin (47)
- University of New Mexico (24)
- Florida International University (19)
-
- Purdue University (14)
- City University of New York (CUNY) (9)
- Embry-Riddle Aeronautical University (7)
- Nova Southeastern University (5)
- Boise State University (3)
- California Polytechnic State University, San Luis Obispo (3)
- Liberty University (3)
- Old Dominion University (3)
- University of Dayton (3)
- University of Georgia School of Law (3)
- University of South Carolina (3)
- Kean University (2)
- Portland State University (2)
- University of Central Florida (2)
- University of Connecticut (2)
- University of Nevada, Las Vegas (2)
- University of Pennsylvania Carey Law School (2)
- Walden University (2)
- Western Kentucky University (2)
- Bentley University (1)
- Binghamton University (1)
- Brigham Young University (1)
- Department of Primary Industries and Regional Development, Western Australia (1)
- Edith Cowan University (1)
- Harrisburg University of Science and Technology (1)
- Keyword
-
- Machine learning (17)
- Coalgebra (13)
- Artificial intelligence (11)
- Deep learning (10)
- Machine Learning (10)
-
- Blockchain (9)
- Data sonification (8)
- Bibliometric analysis (7)
- Computer Science (6)
- Deep Learning (6)
- Modal logic (6)
- Security (6)
- Virtual reality (6)
- AI (5)
- Artificial Intelligence (5)
- Computer vision (5)
- Contour icons (5)
- DSmT (5)
- Data mining (5)
- Empirical software engineering (5)
- Neural networks (5)
- Authentication (4)
- Cloud Computing (4)
- Cybersecurity (4)
- Information fusion (4)
- Malware (4)
- Remaining useful life prediction (4)
- Archaeology (3)
- Belief functions (3)
- Bibliometric (3)
- Publication Year
- Publication
-
- Engineering Faculty Articles and Research (81)
- Library Philosophy and Practice (e-journal) (34)
- Conference papers (30)
- Branch Mathematics and Statistics Faculty and Staff Publications (24)
- FIU Electronic Theses and Dissertations (18)
-
- Articles (11)
- Department of Electrical and Computer Engineering Faculty Publications (8)
- Publications and Research (8)
- College of Computing and Engineering News Archive (5)
- Honors Theses (5)
- Publications (5)
- Department of Anthropology: Faculty Publications (4)
- Mathematics, Physics, and Computer Science Faculty Articles and Research (3)
- Other resources (3)
- Purdue Polytechnic Masters Theses (3)
- Security Studies & International Affairs - Daytona Beach (3)
- Senior Honors Theses (3)
- Student Works (3)
- All Faculty Scholarship (2)
- Articles, Chapters and Online Publications (2)
- Center for Cybersecurity (2)
- Computer Science Faculty Publications (2)
- Department of Biological Systems Engineering: Papers and Publications (2)
- Department of Computer Graphics Technology Degree Theses (2)
- Department of Electrical and Computer Engineering: Dissertations, Theses, and Student Research (2)
- Electrical & Computer Engineering Faculty Research (2)
- Electrical and Computer Engineering Faculty Publications (2)
- Honors Scholar Theses (2)
- Mahurin Honors College Capstone Experience/Thesis Projects (2)
- Recent Advances in Real-Time Systems (2)
Articles 1 - 30 of 325
Full-Text Articles in Computer Engineering
Problem Solving / Javascript Programming, Sarah Zelikovitz, Orit D. Gruber
Problem Solving / Javascript Programming, Sarah Zelikovitz, Orit D. Gruber
Open Educational Resources
This Lab Experiment focuses on JavaScript Programming. Upon completing the lab, you will be able to understand the following:
· The definition of Algorithmic Problem Solving.
· The role of JavaScript in web pages.
· The concept of Iteration in computer programming.
Toward Intuitive 3d Interactions In Virtual Reality: A Deep Learning- Based Dual-Hand Gesture Recognition Approach, Trudi Di Qi, Franceli L. Cibrian, Meghna Raswan, Tyler Kay, Hector M. Camarillo-Abad, Yuxin Wen
Toward Intuitive 3d Interactions In Virtual Reality: A Deep Learning- Based Dual-Hand Gesture Recognition Approach, Trudi Di Qi, Franceli L. Cibrian, Meghna Raswan, Tyler Kay, Hector M. Camarillo-Abad, Yuxin Wen
Engineering Faculty Articles and Research
Dual-hand gesture recognition is crucial for intuitive 3D interactions in virtual reality (VR), allowing the user to interact with virtual objects naturally through gestures using both handheld controllers. While deep learning and sensor-based technology have proven effective in recognizing single-hand gestures for 3D interactions, research on dual-hand gesture recognition for VR interactions is still underexplored. In this work, we introduce CWT-CNN-TCN, a novel deep learning model that combines a 2D Convolution Neural Network (CNN) with Continuous Wavelet Transformation (CWT) and a Temporal Convolution Network (TCN). This model can simultaneously extract features from the time-frequency domain and capture long-term dependencies using …
First-Year Engineering Students And Genai: Experience, Attitudes, Trust, And Ethics., Elisabeth Thomas, Cenetria Crockett, Campbell Rightmyer Bego
First-Year Engineering Students And Genai: Experience, Attitudes, Trust, And Ethics., Elisabeth Thomas, Cenetria Crockett, Campbell Rightmyer Bego
Undergraduate Research Events
Generative AI (GenAI) has the potential to benefit student learning by offering personalized feedback, idea generation, research, and analysis support, writing aid, and administrative support (Chan and Hu, 2023; Zhang, 2023). However, if used inappropriately, the same tools can lead to false/biased content creation and reduced ethical awareness leading to possible academic dishonesty and privacy issues (Schwartz, 2016; Wu, 2023). At this early stage, ethical standards and professorial guidance are unavailable, so it is important to understand what students are thinking about the recent technologies (Shen et al., 2013). Spring 2023 survey results revealed that some students used ChatGPT, a …
Intellectual Property Rights And Copyright Laws In The Regime Of Artificial Intelligence (Ai) In India, Hemavathy C
Intellectual Property Rights And Copyright Laws In The Regime Of Artificial Intelligence (Ai) In India, Hemavathy C
Library Philosophy and Practice (e-journal)
Artificial Intelligence (AI) has been developing for two decades. The application of AI is budding quickly in business dealings, corporate communication and legal services. AI and Law Forms are increasingly important in the legal arena as they play a significant role in the economy and society. Scientists and policymakers together are facing some of the hardest problems with the advancement of machine learning, cryptology and data protection. This paper is very helpful for policymakers, economists, lawyers and technocrats in the aspect of the ethical use of AI in data protection, privacy, security and social corners turns into very relevant issues …
Life During Wartime: Proactive Cybersecurity Is A Humanitarian Imperative, Stanley Mierzwa, Diane Rubino
Life During Wartime: Proactive Cybersecurity Is A Humanitarian Imperative, Stanley Mierzwa, Diane Rubino
Center for Cybersecurity
In brief:
- Humanitarian agencies responding to conflict face massive challenges in distributing aid. Cyberattacks add to that burden.
- This short overview, tailored for non-technical leaders, demystifies the process and equips clouds security experts to proactively champion cloud security at non-profits, and non-governmental organizations.
Proactive Cybersecurity is a Humanitarian Imperative | CSA (cloudsecurityalliance.org)
Development Of A Machine Learning System For Irrigation Decision Support With Disparate Data Streams, Eric Wilkening
Development Of A Machine Learning System For Irrigation Decision Support With Disparate Data Streams, Eric Wilkening
Department of Biological Systems Engineering: Dissertations and Theses
In recent years, advancements in irrigation technologies have led to increased efficiency in irrigation applications, encompassing the adoption of practices that utilize data-driven irrigation scheduling and leveraging variable rate irrigation (VRI). These technological improvements have the potential to reduce water withdrawals and diversions from both groundwater and surface water sources. However, it is vital to recognize that improved application efficiency does not necessarily equate to increased water availability for future or downstream use. This is particularly crucial in the context of consumptive water use, which refers to water consumed and not returned to the local or sub-regional watershed, representing a …
An Investigation Of Match For Lossless Video Compression, Brittany Sullivan-Reicks
An Investigation Of Match For Lossless Video Compression, Brittany Sullivan-Reicks
Department of Electrical and Computer Engineering: Dissertations, Theses, and Student Research
A new lossless video compression technique, Match, is investigated. Match uses the similarity between the frames of a video or the slices of medical images to find a prediction for the current pixel. A portion of the previous frame is searched to find a matching context, which is the pixels surrounding the current pixel, within some distance centered on the current location. The best distance to use for each dataset is found experimentally. The matching context refers to the neighborhood of w, nw, n, and ne, where the pixel in the previous frame with the closest matching context becomes the …
Making Tradable White Certificates Trustworthy, Anonymous, And Efficient Using Blockchains, Nouman Ashraf, Sachin Sharma, Sheraz Aslam, Khursheed Aurangzeb
Making Tradable White Certificates Trustworthy, Anonymous, And Efficient Using Blockchains, Nouman Ashraf, Sachin Sharma, Sheraz Aslam, Khursheed Aurangzeb
Articles
Fossil fuel pollution has contributed to dramatic changes in the Earth’s climate, and this trend will continue as fossil fuels are burned at an ever-increasing rate. Many countries around the world are currently making efforts to reduce greenhouse gas emissions, and one of the methods is the Tradable White Certificate (TWC) mechanism. The mechanism allows organizations to reduce their energy consumption to generate energy savings certificates, and those that achieve greater energy savings can sell their certificates to those that fall short. However, there are some challenges to implementing this mechanism, such as the centralized and costly verification and control …
Drones For Marine Science And Agriculture, David Caldera, Sai Murthy
Drones For Marine Science And Agriculture, David Caldera, Sai Murthy
College of Engineering Summer Undergraduate Research Program
Our research project was launched at Cal Poly in 2019 with the goal of assisting researchers at the CSULB Shark Lab in detecting sharks from aerial images. Under the guidance of Dr. Franz J. Kurfess, students trained an object detection algorithm using shark images and were able to achieve high rate of detection. Following this success, the team has constructed multiple drones and expanded their research to include applications in the fields of agriculture and ecology. This summer the goal is to use a iPhone 14 Pro in lieu of a traditional camera system for real-time object recognition. Object detection …
Columnas: The Honors Program Newsletter At Bentley University, Hailey Jennato, Samson Shen, Clara Williams
Columnas: The Honors Program Newsletter At Bentley University, Hailey Jennato, Samson Shen, Clara Williams
Honors Program
Page 1: HOW AI IS IMPACTING THE BENTLEY CLASSROOM AND EDUCATION OVERALL ~ by Nayeli Franco ’24
Page 2: A BEAUTY OF DIVERSITY ~ by Yun Song ’26
Page 3: RESURRECTING THE DEAD THROUGH COMPUTER TECHNOLOGY: HONORING THEIR MEMORY OR EXPLOITING THEIR LEGACY? ~ by Hailey Jennato ’24
Page 4: THE IMPORTANCE OF DEVELOPING EMOTIONAL INTELLIGENCE ~ by Isa Ramirez Perdomo ’26
Page 5: FROM STRUGGLE TO STRENGTH: THRIVING AS AN INTERNATIONAL STUDENT ~ by Ledion Hoti ’25
Page 6: CHASING BUTTERFLIES ~ by Alyssa Galin ’27
Adaptive Octree Meshes For Simulation Of Extracellular Electrophysiology, Christopher Bc Girard, Dong Song
Adaptive Octree Meshes For Simulation Of Extracellular Electrophysiology, Christopher Bc Girard, Dong Song
Engineering Faculty Articles and Research
Objective. The interaction between neural tissues and artificial electrodes is crucial for understanding and advancing neuroscientific research and therapeutic applications. However, accurately modeling this space around the neurons rapidly increases the computational complexity of neural simulations. Approach. This study demonstrates a dynamically adaptive simulation method that greatly accelerates computation by adjusting spatial resolution of the simulation as needed. Use of an octree structure for the mesh, in combination with the admittance method for discretizing conductivity, provides both accurate approximation and ease of modification on-the-fly. Main results. In tests of both local field potential estimation and multi-electrode stimulation, dynamically adapted meshes …
Visualizing Transaction-Level Modeling Simulations Of Deep Neural Networks, Nataniel Farzan, Emad Arasteh
Visualizing Transaction-Level Modeling Simulations Of Deep Neural Networks, Nataniel Farzan, Emad Arasteh
Engineering Technical Reports
The growing complexity of data-intensive software demands constant innovation in computer hardware design. Performance is a critical factor in rapidly evolving applications such as artificial intelligence (AI). Transaction-level modeling (TLM) is a valuable technique used to represent hardware and software behavior in a simulated environment. However, extracting actionable insights from TLM simulations is not a trivial task. We present Netmemvisual, an interactive, cross-platform visualization tool for exposing memory bottlenecks in TLM simulations. We demonstrate how Netmemvisual helps system designers rapidly analyze complex TLM simulations to find memory contention. We describe the project’s current features, experimental results with two state-of-the-art deep …
Unveiling The Digital Shadows: Cybersecurity And The Art Of Digital Forensics, Derek Beardall
Unveiling The Digital Shadows: Cybersecurity And The Art Of Digital Forensics, Derek Beardall
Cyber Operations and Resilience Program Graduate Projects
This paper navigates the symbiotic relationship between cybersecurity and digital forensics, exploring the profound role of digital forensic methodologies in addressing cyber incidents. Beginning with foundational definitions and historical evolution, this study delves into diverse types of methodologies and their applications across law enforcement and cybersecurity domains. The mechanics of cyber incident response illuminates the strategic orchestration of digital forensic methodologies. Amidst triumphs, challenges emerge from the shadows: swift threat evolution, digital ecosystem complexity, standardization gaps, resource limitations, and legal intricacies. Best practices guide experts through this intricate terrain, culminating in an enhanced understanding of the inseparable bond between cybersecurity …
The Potential Of The Implementation Of Offline Robotic Programming Into Automation-Related Pedagogy, Max Rios Carballo, Xavier Brown
The Potential Of The Implementation Of Offline Robotic Programming Into Automation-Related Pedagogy, Max Rios Carballo, Xavier Brown
Publications and Research
In this study, the offline programming tool RoboDK is used to program industrial robots for the automation sector. The study explores the feasibility of using this non-disruptive robot programming software for classroom use; assesses how well RoboDK can be used to program various robots used in the industry; creates and tests various applications; and pinpoints technical obstacles that prevent a smooth link between offline programming and actual robots. Initial results indicate that RoboDK is an effective tool for deploying its offline programming code to a Universal Robot, UR3e. There are many potential for advanced applications. The goal of the project …
The First Annual Teaching And Research Showcase Poster Tu Dublin – The Proof Is In The Pudding – Using Perceived Stress To Measure Short-Term Impact In Initiatives To Enhance Gender Balance In Computing Education, Alina Berry, Sarah Jane Delany
The First Annual Teaching And Research Showcase Poster Tu Dublin – The Proof Is In The Pudding – Using Perceived Stress To Measure Short-Term Impact In Initiatives To Enhance Gender Balance In Computing Education, Alina Berry, Sarah Jane Delany
Other resources
The problem of gender imbalance in computing higher education has forced academics and professionals to implement a wide range of initiatives. Many initiatives use recruitment or retention numbers as their most obvious evidence of impact. This type of evidence of impact is, however, more resource heavy to obtain, as well as often requires a longitudinal approach. There are many shorter term initiatives that use other ways to measure their success.
First, this poster presents with a review of existing evaluation measures in interventions to recruit and retain women in computing education across the board. Three main groups of evaluation come …
Region-Specified Inverse Design Of Absorption And Scattering In Nanoparticles By Using Machine Learning, Alex Vallone, Nooshin M. Estakhri, Nasim Mohammadi Estrakhri
Region-Specified Inverse Design Of Absorption And Scattering In Nanoparticles By Using Machine Learning, Alex Vallone, Nooshin M. Estakhri, Nasim Mohammadi Estrakhri
Engineering Faculty Articles and Research
Machine learning provides a promising platform for both forward modeling and the inverse design of photonic structures. Relying on a data-driven approach, machine learning is especially appealing for situations when it is not feasible to derive an analytical solution for a complex problem. There has been a great amount of recent interest in constructing machine learning models suitable for different electromagnetic problems. In this work, we adapt a region-specified design approach for the inverse design of multilayered nanoparticles. Given the high computational cost of dataset generation for electromagnetic problems, we specifically investigate the case of a small training dataset, enhanced …
The Fashion Visual Search Using Deep Learning Approach, Smita V. Bhoir, Sunita R. Patil
The Fashion Visual Search Using Deep Learning Approach, Smita V. Bhoir, Sunita R. Patil
Library Philosophy and Practice (e-journal)
In recent years, the World Wide Web (WWW) has established itself as a popular source of information. Using an effective approach to investigate the vast amount of information available on the internet is essential if we are to make the most of the resources available. Visual data cannot be indexed using text-based indexing algorithms because it is significantly larger and more complex than text. Content-Based Image Retrieval, as a result, has gained widespread attention among the scientific community (CBIR). Input into a CBIR system that is dependent on visible features of the user's input image at a low level is …
Para Cima Y Pa’ Abajo: Building Bridges Between Hci Research In Latin America And In The Global North, Pedro Reynolds-Cuéllar, Marisol Wong-Villacres, Karla A. Badillo-Urquiola, Mayra Donaji Barrera-Machuca, Franceli L. Cibrian, Marianela Ciolfi Felice, Carolina Fuentes, Laura Sanely Gaytán-Lugo, Vivian Genaro Motti, Monica Perusquía-Hernández, Oscar A. Lemus
Para Cima Y Pa’ Abajo: Building Bridges Between Hci Research In Latin America And In The Global North, Pedro Reynolds-Cuéllar, Marisol Wong-Villacres, Karla A. Badillo-Urquiola, Mayra Donaji Barrera-Machuca, Franceli L. Cibrian, Marianela Ciolfi Felice, Carolina Fuentes, Laura Sanely Gaytán-Lugo, Vivian Genaro Motti, Monica Perusquía-Hernández, Oscar A. Lemus
Engineering Faculty Articles and Research
The Human-computer Interaction (HCI) community has the opportunity to foster the integration of research practices across the Global South and North to begin overcoming colonial relationships. In this paper, we focus on the case of Latin America (LATAM), where initiatives to increase the representation of HCI practitioners lack a consolidated understanding of the practices they employ, the factors that influence them, and the challenges that practitioners face. To address this knowledge gap, we employ a mixed-methods approach, comprising a survey (66 respondents) and in-depth interviews (19 interviewees). Our analyses characterize a set of research perspectives on how HCI is practiced …
Chatgpt As Metamorphosis Designer For The Future Of Artificial Intelligence (Ai): A Conceptual Investigation, Amarjit Kumar Singh (Library Assistant), Dr. Pankaj Mathur (Deputy Librarian)
Chatgpt As Metamorphosis Designer For The Future Of Artificial Intelligence (Ai): A Conceptual Investigation, Amarjit Kumar Singh (Library Assistant), Dr. Pankaj Mathur (Deputy Librarian)
Library Philosophy and Practice (e-journal)
Abstract
Purpose: The purpose of this research paper is to explore ChatGPT’s potential as an innovative designer tool for the future development of artificial intelligence. Specifically, this conceptual investigation aims to analyze ChatGPT’s capabilities as a tool for designing and developing near about human intelligent systems for futuristic used and developed in the field of Artificial Intelligence (AI). Also with the helps of this paper, researchers are analyzed the strengths and weaknesses of ChatGPT as a tool, and identify possible areas for improvement in its development and implementation. This investigation focused on the various features and functions of ChatGPT that …
Low-Power Redundant-Transition-Free Tspc Dual-Edge-Triggering Flip-Flop Using Single-Transistor-Clocked Buffer, Zisong Wang, Peiyi Zhao, Tom Springer, Congyi Zhu, Jaccob Mau, Andrew Wells, Yinshui Xia, Lingli Wang
Low-Power Redundant-Transition-Free Tspc Dual-Edge-Triggering Flip-Flop Using Single-Transistor-Clocked Buffer, Zisong Wang, Peiyi Zhao, Tom Springer, Congyi Zhu, Jaccob Mau, Andrew Wells, Yinshui Xia, Lingli Wang
Engineering Faculty Articles and Research
In the modern graphics processing unit (GPU)/artificial intelligence (AI) era, flip-flop (FF) has become one of the most power-hungry blocks in processors. To address this issue, a novel single-phase-clock dual-edge-triggering (DET) FF using a single-transistor-clocked (STC) buffer (STCB) is proposed. The STCB uses a single-clocked transistor in the data sampling path, which completely removes clock redundant transitions (RTs) and internal RTs that exist in other DET designs. Verified by post-layout simulations in 22 nm fully depleted silicon on insulator (FD-SOI) CMOS, when operating at 10% switching activity, the proposed STC-DET outperforms prior state-of-the-art low-power DET in power consumption by 14% …
Completeness Of Nominal Props, Samuel Balco, Alexander Kurz
Completeness Of Nominal Props, Samuel Balco, Alexander Kurz
Engineering Faculty Articles and Research
We introduce nominal string diagrams as string diagrams internal in the category of nominal sets. This leads us to define nominal PROPs and nominal monoidal theories. We show that the categories of ordinary PROPs and nominal PROPs are equivalent. This equivalence is then extended to symmetric monoidal theories and nominal monoidal theories, which allows us to transfer completeness results between ordinary and nominal calculi for string diagrams.
Improving Developers' Understanding Of Regex Denial Of Service Tools Through Anti-Patterns And Fix Strategies, Sk Adnan Hassan, Zainab Aamir, Dongyoon Lee, James C. Davis, Francisco Servant
Improving Developers' Understanding Of Regex Denial Of Service Tools Through Anti-Patterns And Fix Strategies, Sk Adnan Hassan, Zainab Aamir, Dongyoon Lee, James C. Davis, Francisco Servant
Department of Electrical and Computer Engineering Faculty Publications
Regular expressions are used for diverse purposes, including input validation and firewalls. Unfortunately, they can also lead to a security vulnerability called ReDoS (Regular Expression Denial of Service), caused by a super-linear worst-case execution time during regex matching. Due to the severity and prevalence of ReDoS, past work proposed automatic tools to detect and fix regexes. Although these tools were evaluated in automatic experiments, their usability has not yet been studied; usability has not been a focus of prior work. Our insight is that the usability of existing tools to detect and fix regexes will improve if we complement them …
An Empirical Study Of Pre-Trained Model Reuse In The Hugging Face Deep Learning Model Registry, Wenxin Jiang, Nicholas Synovic, Matt Hyatt, Taylor R. Schorlemmer, Rohan Sethi, Yung-Hsiang Lu, George K. Thiruvathukal, James C. Davis
An Empirical Study Of Pre-Trained Model Reuse In The Hugging Face Deep Learning Model Registry, Wenxin Jiang, Nicholas Synovic, Matt Hyatt, Taylor R. Schorlemmer, Rohan Sethi, Yung-Hsiang Lu, George K. Thiruvathukal, James C. Davis
Department of Electrical and Computer Engineering Faculty Publications
Deep Neural Networks (DNNs) are being adopted as components in software systems. Creating and specializing DNNs from scratch has grown increasingly difficult as state-of-the-art architectures grow more complex. Following the path of traditional software engineering, machine learning engineers have begun to reuse large-scale pre-trained models (PTMs) and fine-tune these models for downstream tasks. Prior works have studied reuse practices for traditional software packages to guide software engineers towards better package maintenance and dependency management. We lack a similar foundation of knowledge to guide behaviors in pre-trained model ecosystems.
In this work, we present the first empirical investigation of PTM reuse. …
Understanding And Quantifying Human Factors In Programming From Demonstration: A User Study Proposal, Shakra Mehak, Aayush Jain, John D. Kelleher, Philip Long, Michael Guilfoyle, Maria Chiara Leva
Understanding And Quantifying Human Factors In Programming From Demonstration: A User Study Proposal, Shakra Mehak, Aayush Jain, John D. Kelleher, Philip Long, Michael Guilfoyle, Maria Chiara Leva
Conference papers
Programming by demonstration (PbD) is a promising method for robots to learn from direct, non-expert human interaction. This approach enables the interactive transfer of human skills to the robot. As the non-expert user is at the center of PbD, the efficacy of the learned skill is largely dependent on the demonstrations provided. Although PbD methods have been extensively developed and validated in the field of robotics, there has been inadequate confirmation of their effectiveness from the perspective of human teachability. To address this gap, we propose to experimentally investigate the impact of communicating robot learning process on the efficacy of …
Automation, Ai, And Future Skills Needs: An Irish Perspective, Raimunda Bukartaite, Daire Hooper
Automation, Ai, And Future Skills Needs: An Irish Perspective, Raimunda Bukartaite, Daire Hooper
Articles
This study explores insights from key stakeholders into the skills they believe will be necessary for the future of work as we become more reliant on artificial intelligence (AI) and technology. The study also seeks to understand what human resource policies and educational interventions are needed to support and take advantage of these changes.
Efficient Gpu Implementation Of Automatic Differentiation For Computational Fluid Dynamics, Mohammad Zubair, Desh Ranjan, Aaron Walden, Gabriel Nastac, Eric Nielsen, Boris Diskin, Marc Paterno, Samuel Jung, Joshua Hoke Davis
Efficient Gpu Implementation Of Automatic Differentiation For Computational Fluid Dynamics, Mohammad Zubair, Desh Ranjan, Aaron Walden, Gabriel Nastac, Eric Nielsen, Boris Diskin, Marc Paterno, Samuel Jung, Joshua Hoke Davis
Computer Science Faculty Publications
Many scientific and engineering applications require repeated calculations of derivatives of output functions with respect to input parameters. Automatic Differentiation (AD) is a method that automates derivative calculations and can significantly speed up code development. In Computational Fluid Dynamics (CFD), derivatives of flux functions with respect to state variables (Jacobian) are needed for efficient solutions of the nonlinear governing equations. AD of flux functions on graphics processing units (GPUs) is challenging as flux computations involve many intermediate variables that create high register pressure and require significant memory traffic because of the need to store the derivatives. This paper presents a …
Towards Qos-Based Embedded Machine Learning, Tom Springer, Erik Linstead, Peiyi Zhao, Chelsea Parlett-Pelleriti
Towards Qos-Based Embedded Machine Learning, Tom Springer, Erik Linstead, Peiyi Zhao, Chelsea Parlett-Pelleriti
Engineering Faculty Articles and Research
Due to various breakthroughs and advancements in machine learning and computer architectures, machine learning models are beginning to proliferate through embedded platforms. Some of these machine learning models cover a range of applications including computer vision, speech recognition, healthcare efficiency, industrial IoT, robotics and many more. However, there is a critical limitation in implementing ML algorithms efficiently on embedded platforms: the computational and memory expense of many machine learning models can make them unsuitable in resource-constrained environments. Therefore, to efficiently implement these memory-intensive and computationally expensive algorithms in an embedded computing environment, innovative resource management techniques are required at the …
Reality Analagous Synthetic Dataset Generation With Daylight Variance For Deep Learning Classification, Thomas Lee, Susan Mckeever, Jane Courtney
Reality Analagous Synthetic Dataset Generation With Daylight Variance For Deep Learning Classification, Thomas Lee, Susan Mckeever, Jane Courtney
Conference papers
For the implementation of Autonomously navigating Unmanned Air Vehicles (UAV) in the real world, it must be shown that safe navigation is possible in all real world scenarios. In the case of UAVs powered by Deep Learning algorithms, this is a difficult task to achieve, as the weak point of any trained network is the reduction in predictive capacity when presented with unfamiliar input data. It is possible to train for more use cases, however more data is required for this, requiring time and manpower to acquire. In this work, a potential solution to the manpower issues of exponentially scaling …
Automated Identification Of Astronauts On Board The International Space Station: A Case Study In Space Archaeology, Rao Hamza Ali, Amir Kanan Kashefi, Alice C. Gorman, Justin St. P. Walsh, Erik J. Linstead
Automated Identification Of Astronauts On Board The International Space Station: A Case Study In Space Archaeology, Rao Hamza Ali, Amir Kanan Kashefi, Alice C. Gorman, Justin St. P. Walsh, Erik J. Linstead
Art Faculty Articles and Research
We develop and apply a deep learning-based computer vision pipeline to automatically identify crew members in archival photographic imagery taken on-board the International Space Station. Our approach is able to quickly tag thousands of images from public and private photo repositories without human supervision with high degrees of accuracy, including photographs where crew faces are partially obscured. Using the results of our pipeline, we carry out a large-scale network analysis of the crew, using the imagery data to provide novel insights into the social interactions among crew during their missions.
Classifying Toe Walking Gait Patterns Among Children Diagnosed With Idiopathic Toe Walking Using Wearable Sensors And Machine Learning Algorithms, Rahul Soangra, Yuxin Wen, Hualin Yang, Marybeth Grant-Beuttler
Classifying Toe Walking Gait Patterns Among Children Diagnosed With Idiopathic Toe Walking Using Wearable Sensors And Machine Learning Algorithms, Rahul Soangra, Yuxin Wen, Hualin Yang, Marybeth Grant-Beuttler
Physical Therapy Faculty Articles and Research
Idiopathic toe walking (ITW) is a gait abnormality in which children’s toes touch at initial contact and demonstrate limited or no heel contact throughout the gait cycle. Toe walking results in poor balance, increased risk of falling, and developmental delays among children. Identifying toe walking steps during walking can facilitate targeted intervention among children diagnosed with ITW. With recent advances in wearable sensing, communication technologies, and machine learning, new avenues of managing toe walking behavior among children are feasible. In this study, we investigate the capabilities of Machine Learning (ML) algorithms in identifying initial foot contact (heel strike versus toe …