Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- University of Nebraska - Lincoln (22)
- Purdue University (20)
- Singapore Management University (20)
- Technological University Dublin (12)
- Old Dominion University (10)
-
- University of Dayton (8)
- Chapman University (5)
- Washington University in St. Louis (5)
- Embry-Riddle Aeronautical University (4)
- University of New Mexico (4)
- Florida International University (3)
- Fordham University (3)
- Munster Technological University (3)
- University of New Haven (3)
- Loyola University Chicago (2)
- Southwestern Oklahoma State University (2)
- University of Louisville (2)
- Western University (2)
- Air Force Institute of Technology (1)
- City University of New York (CUNY) (1)
- Dakota State University (1)
- Dartmouth College (1)
- Harrisburg University of Science and Technology (1)
- Illinois Math and Science Academy (1)
- Portland State University (1)
- SIT Graduate Institute/SIT Study Abroad (1)
- San Jose State University (1)
- Tennessee State University (1)
- University of Connecticut (1)
- University of Kentucky (1)
- Keyword
-
- Internet of Things (10)
- Agriculture (8)
- Broadband antennas (8)
- Dielectric (8)
- Dipole antennas (8)
-
- IoT (8)
- Moisture (8)
- Permittivity (8)
- Soil (8)
- Underground communication (8)
- Deep learning (6)
- Internet of Underground Things (6)
- Machine Learning (6)
- Sustainability (6)
- Underground Communications (6)
- Wireless Underground Channel (6)
- Classification (4)
- Energy issues (4)
- Increasing global temperatures (4)
- Water and food scarcity (4)
- 1.2 COMPUTER AND INFORMATION SCIENCE (3)
- Blockchain (3)
- Cybersecurity (3)
- Eye tracking (3)
- Telecommunications (3)
- 2.2 ELECTRICAL, ELECTRONIC, INFORMATION ENGINEERING (2)
- Artificial intelligence (2)
- CNN (2)
- Climate crises (2)
- Cloud computing (2)
- Publication
-
- Faculty Publications (23)
- Research Collection School Of Computing and Information Systems (19)
- Department of Computer Science and Engineering: Dissertations, Theses, and Student Research (16)
- Dissertations (12)
- Electrical and Computer Engineering Faculty Publications (8)
-
- Publications (7)
- All Computer Science and Engineering Research (5)
- Branch Mathematics and Statistics Faculty and Staff Publications (4)
- Engineering Faculty Articles and Research (4)
- Electrical & Computer Engineering and Computer Science Faculty Publications (3)
- FIU Electronic Theses and Dissertations (3)
- VMASC Publications (3)
- CSE Conference and Workshop Papers (2)
- Computational Modeling & Simulation Engineering Faculty Publications (2)
- Computer Science Faculty Publications (2)
- Computer Science: Faculty Publications and Other Works (2)
- Department of Electrical and Computer Engineering: Dissertations, Theses, and Student Research (2)
- Electrical & Computer Engineering Faculty Publications (2)
- Electrical and Computer Engineering Publications (2)
- Faculty Scholarship (2)
- Student Research (2)
- AFIT Patents (1)
- ART 108: Introduction to Games Studies (1)
- Asian Management Insights (1)
- Biological Systems Engineering: Papers and Publications (1)
- Computer Science Faculty Research (1)
- Departmental Technical Reports (CS) (1)
- ENGS 88 Honors Thesis (AB Students) (1)
- Honors Scholar Theses (1)
- Independent Study Project (ISP) Collection (1)
Articles 1 - 30 of 143
Full-Text Articles in Computer Engineering
How Live Streaming And Twitch Have Changed The Gaming Industry, Krystal Ruiz
How Live Streaming And Twitch Have Changed The Gaming Industry, Krystal Ruiz
ART 108: Introduction to Games Studies
Live streaming in itself has become a booming industry in which its content consists of “streamers” who live broadcast numerous events and real-time interactions while simultaneously chatting with viewers drawing huge and increasing numbers (Adamovich). Twitch has especially excelled at garnering attention as one of the most popular live streaming platforms that focuses on broadcasting and viewing video game content (Adamovich). Twitch has grown rapidly within the last few years asserting its dominance as one of the major forces in the games industry and becoming a multi-billion-dollar industry (Adamovich). For example, according to Descrier, in 2016 there were approximately 292 …
Conditional Generative Adversarial Network Demosaicing Strategy For Division Of Focal Plane Polarimeters, Garrett Sargent, Bradley M. Ratliff, Vijayan K. Asari
Conditional Generative Adversarial Network Demosaicing Strategy For Division Of Focal Plane Polarimeters, Garrett Sargent, Bradley M. Ratliff, Vijayan K. Asari
Electrical and Computer Engineering Faculty Publications
Division of focal plane (DoFP), or integrated microgrid polarimeters, typically consist of a 2 × 2 mosaic of linear polarization filters overlaid upon a focal plane array sensor and obtain temporally synchronized polarized intensity measurements across a scene, similar in concept to a Bayer color filter array camera. However, the resulting estimated polarimetric images suffer a loss in resolution and can be plagued by aliasing due to the spatially-modulated microgrid measurement strategy. Demosaicing strategies have been proposed that attempt to minimize these effects, but result in some level of residual artifacts. In this work we propose a conditional generative adversarial …
Survey On Deep Neural Networks In Speech And Vision Systems, M. Alam, Manar D. Samad, Lasitha Vidyaratne, Alexander Glandon, Khan M. Iftekharuddin
Survey On Deep Neural Networks In Speech And Vision Systems, M. Alam, Manar D. Samad, Lasitha Vidyaratne, Alexander Glandon, Khan M. Iftekharuddin
Computer Science Faculty Research
This survey presents a review of state-of-the-art deep neural network architectures, algorithms, and systems in speech and vision applications. Recent advances in deep artificial neural network algorithms and architectures have spurred rapid innovation and development of intelligent speech and vision systems. With availability of vast amounts of sensor data and cloud computing for processing and training of deep neural networks, and with increased sophistication in mobile and embedded technology, the next-generation intelligent systems are poised to revolutionize personal and commercial computing. This survey begins by providing background and evolution of some of the most successful deep learning models for intelligent …
A Novel Spatiotemporal Prediction Method Of Cumulative Covid-19 Cases, Junzhe Cai
A Novel Spatiotemporal Prediction Method Of Cumulative Covid-19 Cases, Junzhe Cai
Department of Computer Science and Engineering: Dissertations, Theses, and Student Research
Prediction methods are important for many applications. In particular, an accurate prediction for the total number of cases for pandemics such as the Covid-19 pandemic could help medical preparedness by providing in time a sufficient supply of testing kits, hospital beds and medical personnel. This thesis experimentally compares the accuracy of ten prediction methods for the cumulative number of Covid-19 pandemic cases. These ten methods include two types of neural networks and extrapolation methods based on best fit linear, best fit quadratic, best fit cubic and Lagrange interpolation, as well as an extrapolation method from Revesz. We also consider the …
Suffix Tree, Minwise Hashing And Streaming Algorithms For Big Data Analysis In Bioinformatics, Sairam Behera
Suffix Tree, Minwise Hashing And Streaming Algorithms For Big Data Analysis In Bioinformatics, Sairam Behera
Department of Computer Science and Engineering: Dissertations, Theses, and Student Research
In this dissertation, we worked on several algorithmic problems in bioinformatics using mainly three approaches: (a) a streaming model, (b) sux-tree based indexing, and (c) minwise-hashing (minhash) and locality-sensitive hashing (LSH). The streaming models are useful for large data problems where a good approximation needs to be achieved with limited space usage. We developed an approximation algorithm (Kmer-Estimate) using the streaming approach to obtain a better estimation of the frequency of k-mer counts. A k-mer, a subsequence of length k, plays an important role in many bioinformatics analyses such as genome distance estimation. We also developed new methods that use …
Representational Learning Approach For Predicting Developer Expertise Using Eye Movements, Sumeet Maan
Representational Learning Approach For Predicting Developer Expertise Using Eye Movements, Sumeet Maan
Department of Computer Science and Engineering: Dissertations, Theses, and Student Research
The thesis analyzes an existing eye-tracking dataset collected while software developers were solving bug fixing tasks in an open-source system. The analysis is performed using a representational learning approach namely, Multi-layer Perceptron (MLP). The novel aspect of the analysis is the introduction of a new feature engineering method based on the eye-tracking data. This is then used to predict developer expertise on the data. The dataset used in this thesis is inherently more complex because it is collected in a very dynamic environment i.e., the Eclipse IDE using an eye-tracking plugin, iTrace. Previous work in this area only worked on …
Transfer-To-Transfer Learning Approach For Computer Aided Detection Of Covid-19 In Chest Radiographs, Barath Narayanan Narayanan, Russell C. Hardie, Vignesh Krishnaraja, Christina Karam, Venkata Salini Priyamvada Davuluru
Transfer-To-Transfer Learning Approach For Computer Aided Detection Of Covid-19 In Chest Radiographs, Barath Narayanan Narayanan, Russell C. Hardie, Vignesh Krishnaraja, Christina Karam, Venkata Salini Priyamvada Davuluru
Electrical and Computer Engineering Faculty Publications
The coronavirus disease 2019 (COVID-19) global pandemic has severely impacted lives across the globe. Respiratory disorders in COVID-19 patients are caused by lung opacities similar to viral pneumonia. A Computer-Aided Detection (CAD) system for the detection of COVID-19 using chest radiographs would provide a second opinion for radiologists. For this research, we utilize publicly available datasets that have been marked by radiologists into two-classes (COVID-19 and non-COVID-19). We address the class imbalance problem associated with the training dataset by proposing a novel transfer-to-transfer learning approach, where we break a highly imbalanced training dataset into a group of balanced mini-sets and …
Digital And Mixed Domain Hardware Reduction Algorithms And Implementations For Massive Mimo, Najath A. Mohomed
Digital And Mixed Domain Hardware Reduction Algorithms And Implementations For Massive Mimo, Najath A. Mohomed
FIU Electronic Theses and Dissertations
Emerging 5G and 6G based wireless communications systems largely rely on multiple-input-multiple-output (MIMO) systems to reduce inherently extensive path losses, facilitate high data rates, and high spatial diversity. Massive MIMO systems used in mmWave and sub-THz applications consists of hundreds perhaps thousands of antenna elements at base stations. Digital beamforming techniques provide the highest flexibility and better degrees of freedom for phased antenna arrays as compared to its analog and hybrid alternatives but has the highest hardware complexity.
Conventional digital beamformers at the receiver require a dedicated analog to digital converter (ADC) for every antenna element, leading to ADCs for …
Formal Concept Analysis Applications In Bioinformatics, Sarah Roscoe
Formal Concept Analysis Applications In Bioinformatics, Sarah Roscoe
Department of Computer Science and Engineering: Dissertations, Theses, and Student Research
Bioinformatics is an important field that seeks to solve biological problems with the help of computation. One specific field in bioinformatics is that of genomics, the study of genes and their functions. Genomics can provide valuable analysis as to the interaction between how genes interact with their environment. One such way to measure the interaction is through gene expression data, which determines whether (and how much) a certain gene activates in a situation. Analyzing this data can be critical for predicting diseases or other biological reactions. One method used for analysis is Formal Concept Analysis (FCA), a computing technique based …
Extending The Functional Subnetwork Approach To A Generalized Linear Integrate-And-Fire Neuron Model, Nicholas Szczecinski, Roger Quinn, Alexander J. Hunt
Extending The Functional Subnetwork Approach To A Generalized Linear Integrate-And-Fire Neuron Model, Nicholas Szczecinski, Roger Quinn, Alexander J. Hunt
Mechanical and Materials Engineering Faculty Publications and Presentations
Engineering neural networks to perform specific tasks often represents a monumental challenge in determining network architecture and parameter values. In this work, we extend our previously-developed method for tuning networks of non-spiking neurons, the “Functional subnetwork approach” (FSA), to the tuning of networks composed of spiking neurons. This extension enables the direct assembly and tuning of networks of spiking neurons and synapses based on the network’s intended function, without the use of global optimization ormachine learning. To extend the FSA, we show that the dynamics of a generalized linear integrate and fire (GLIF) neuronmodel have fundamental similarities to those of …
Multi-User Verifiable Searchable Symmetric Encryption For Cloud Storage, Xueqiao Liu, Guomin Yang, Guomin Yang
Multi-User Verifiable Searchable Symmetric Encryption For Cloud Storage, Xueqiao Liu, Guomin Yang, Guomin Yang
Research Collection School Of Computing and Information Systems
In a cloud data storage system, symmetric key encryption is usually used to encrypt files due to its high efficiency. In order allow the untrusted/semi-trusted cloud storage server to perform searching over encrypted data while maintaining data confidentiality, searchable symmetric encryption (SSE) has been proposed. In a typical SSE scheme, a users stores encrypted files on a cloud storage server and later can retrieve the encrypted files containing specific keywords. The basic security requirement of SSE is that the cloud server learns no information about the files or the keywords during the searching process. Some SSE schemes also offer additional …
Finite-Time State Estimation For An Inverted Pendulum Under Input-Multiplicative Uncertainty, Sergey V. Drakunov, William Mackunis, Anu Kossery Jayaprakash, Krishna Bhavithavya Kidambi, Mahmut Reyhanoglu
Finite-Time State Estimation For An Inverted Pendulum Under Input-Multiplicative Uncertainty, Sergey V. Drakunov, William Mackunis, Anu Kossery Jayaprakash, Krishna Bhavithavya Kidambi, Mahmut Reyhanoglu
Publications
A sliding mode observer is presented, which is rigorously proven to achieve finite-time state estimation of a dual-parallel underactuated (i.e., single-input multi-output) cart inverted pendulum system in the presence of parametric uncertainty. A salient feature of the proposed sliding mode observer design is that a rigorous analysis is provided, which proves finite-time estimation of the complete system state in the presence of input-multiplicative parametric uncertainty. The performance of the proposed observer design is demonstrated through numerical case studies using both sliding mode control (SMC)- and linear quadratic regulator (LQR)-based closed-loop control systems. The main contribution presented here is the rigorous …
Investigating Factors Predicting Effective Learning In A Cs Professional Development Program For K-12 Teachers, Patrick Morrow
Investigating Factors Predicting Effective Learning In A Cs Professional Development Program For K-12 Teachers, Patrick Morrow
Department of Computer Science and Engineering: Dissertations, Theses, and Student Research
The demand for K-12 Computer Science (CS) education is growing and there is not an adequate number of educators to match the demand. Comprehensive research was carried out to investigate and understand the influence of a summer two-week professional development (PD) program on teachers’ CS content and pedagogical knowledge, their confidence in such knowledge, their interest in and perceived value of CS, and the factors influencing such impacts. Two courses designed to train K-12 teachers to teach CS, focusing on both concepts and pedagogy skills were taught over two separate summers to two separate cohorts of teachers. Statistical and SWOT …
A User Study Of A Wearable System To Enhance Bystanders’ Facial Privacy, Alfredo J. Perez, Sherali Zeadally, Scott Griffith, Luis Y. Matos Garcia, Jaouad A. Mouloud
A User Study Of A Wearable System To Enhance Bystanders’ Facial Privacy, Alfredo J. Perez, Sherali Zeadally, Scott Griffith, Luis Y. Matos Garcia, Jaouad A. Mouloud
Information Science Faculty Publications
The privacy of users and information are becoming increasingly important with the growth and pervasive use of mobile devices such as wearables, mobile phones, drones, and Internet of Things (IoT) devices. Today many of these mobile devices are equipped with cameras which enable users to take pictures and record videos anytime they need to do so. In many such cases, bystanders’ privacy is not a concern, and as a result, audio and video of bystanders are often captured without their consent. We present results from a user study in which 21 participants were asked to use a wearable system called …
A Novel Framework Using Neutrosophy For Integrated Speech And Text Sentiment Analysis, Florentin Smarandache, Kritika Mishra, Ilanthenral Kandasamy, Vasantha Kandasamy W.B.
A Novel Framework Using Neutrosophy For Integrated Speech And Text Sentiment Analysis, Florentin Smarandache, Kritika Mishra, Ilanthenral Kandasamy, Vasantha Kandasamy W.B.
Branch Mathematics and Statistics Faculty and Staff Publications
With increasing data on the Internet, it is becoming difficult to analyze every bit and make sure it can be used efficiently for all the businesses. One useful technique using Natural Language Processing (NLP) is sentiment analysis. Various algorithms can be used to classify textual data based on various scales ranging from just positive-negative, positive-neutral-negative to a wide spectrum of emotions. While a lot of work has been done on text, only a lesser amount of research has been done on audio datasets. An audio file contains more features that can be extracted from its amplitude and frequency than a …
Analysis Of Cloud Bursting On Openstack Infrastructure To Aws, Bao Pham, Ronald C. Jones, Majid Shaalan
Analysis Of Cloud Bursting On Openstack Infrastructure To Aws, Bao Pham, Ronald C. Jones, Majid Shaalan
Other Student Works
Cloud computing is the development of distributed and parallel computing that seeks to provide a new model of business computing by automating services and efficiently storing proprietary data. Cloud bursting is one of the cloud computing techniques that adopts the hybrid cloud model which seeks to expand the resources of a private cloud through the integration with a public cloud infrastructure. In this paper, the viability of cloud bursting is experimented and an attempt to integrate AWS EC2 onto an Openstack cloud environment using the Openstack OMNI driver is conducted.
Peer-Inspired Student Performance Prediction In Interactive Online Question Pools With Graph Neural Network, Haotian Li, Huan Wei, Yong Wang, Yangqiu Song, Huamin. Qu
Peer-Inspired Student Performance Prediction In Interactive Online Question Pools With Graph Neural Network, Haotian Li, Huan Wei, Yong Wang, Yangqiu Song, Huamin. Qu
Research Collection School Of Computing and Information Systems
Student performance prediction is critical to online education. It can benefit many downstream tasks on online learning platforms, such as estimating dropout rates, facilitating strategic intervention, and enabling adaptive online learning. Interactive online question pools provide students with interesting interactive questions to practice their knowledge in online education. However, little research has been done on student performance prediction in interactive online question pools. Existing work on student performance prediction targets at online learning platforms with predefined course curriculum and accurate knowledge labels like MOOC platforms, but they are not able to fully model knowledge evolution of students in interactive online …
Camera Placement Meeting Restrictions Of Computer Vision, Sara Aghajanzadeh, Roopasree Naidu, Shuo-Han Chen, Caleb Tung, Abhinav Goel, Yung-Hsiang Lu, George K. Thiruvathukal
Camera Placement Meeting Restrictions Of Computer Vision, Sara Aghajanzadeh, Roopasree Naidu, Shuo-Han Chen, Caleb Tung, Abhinav Goel, Yung-Hsiang Lu, George K. Thiruvathukal
Computer Science: Faculty Publications and Other Works
In the blooming era of smart edge devices, surveillance cam- eras have been deployed in many locations. Surveillance cam- eras are most useful when they are spaced out to maximize coverage of an area. However, deciding where to place cam- eras is an NP-hard problem and researchers have proposed heuristic solutions. Existing work does not consider a signifi- cant restriction of computer vision: in order to track a moving object, the object must occupy enough pixels. The number of pixels depends on many factors (how far away is the object? What is the camera resolution? What is the focal length?). …
Memory Foreshadow: Memory Forensics Of Hardware Cryptocurrency Wallets – A Tool And Visualization Framework, Tyler Thomas, Mathew Piscitelli, Ilya Shavrov, Ibrahim Baggili
Memory Foreshadow: Memory Forensics Of Hardware Cryptocurrency Wallets – A Tool And Visualization Framework, Tyler Thomas, Mathew Piscitelli, Ilya Shavrov, Ibrahim Baggili
Electrical & Computer Engineering and Computer Science Faculty Publications
We present Memory FORESHADOW: Memory FOREnSics of HArDware cryptOcurrency Wallets. To the best of our knowledge, this is the primary account of cryptocurrency hardware wallet client memory forensics. Our exploratory analysis revealed forensically relevant data in memory including transaction history, extended public keys, passphrases, and unique device identifiers. Data extracted with FORESHADOW can be used to associate a hardware wallet with a computer and allow an observer to deanonymize all past and future transactions due to hierarchical deterministic wallet address derivation. Additionally, our novel visualization framework enabled us to measure both the persistence and integrity of artifacts produced by the …
Exploring The Learning Efficacy Of Digital Forensics Concepts And Bagging & Tagging Of Digital Devices In Immersive Virtual Reality, Courtney Hassenfeldt, Jillian Jacques, Ibrahim Baggili
Exploring The Learning Efficacy Of Digital Forensics Concepts And Bagging & Tagging Of Digital Devices In Immersive Virtual Reality, Courtney Hassenfeldt, Jillian Jacques, Ibrahim Baggili
Electrical & Computer Engineering and Computer Science Faculty Publications
This work presents the first account of evaluating learning inside a VR experience created to teach Digital Forensics (DF) concepts, and a hands-on laboratory exercise in Bagging & Tagging a crime scene with digital devices. First, we designed and developed an immersive VR experience which included a lecture and a lab. Next, we tested it with (n = 57) participants in a controlled experiment where they were randomly assigned to a VR group or a physical group. Both groups were subjected to the same lecture and lab, but one was in VR and the other was in the real world. …
Forecasting Vegetation Health In The Mena Region By Predicting Vegetation Indicators With Machine Learning Models, Sachi Perera, Wenzhao Li, Erik Linstead, Hesham El-Askary
Forecasting Vegetation Health In The Mena Region By Predicting Vegetation Indicators With Machine Learning Models, Sachi Perera, Wenzhao Li, Erik Linstead, Hesham El-Askary
Mathematics, Physics, and Computer Science Faculty Articles and Research
Machine learning (ML) techniques can be applied to predict and monitor drought conditions due to climate change. Predicting future vegetation health indicators (such as EVI, NDVI, and LAI) is one approach to forecast drought events for hotspots (e.g. Middle East and North Africa (MENA) regions). Recently, ML models were implemented to predict EVI values using parameters such as land types, time series, historical vegetation indices, land surface temperature, soil moisture, evapotranspiration etc. In this work, we collected the MODIS atmospherically corrected surface spectral reflectance imagery with multiple vegetation related indices for modeling and evaluation of drought conditions in the MENA …
Chess As A Testing Grounds For The Oracle Approach To Ai Safety, James D. Miller, Roman Yampolskiy, Olle Häggström, Stuart Armstrong
Chess As A Testing Grounds For The Oracle Approach To Ai Safety, James D. Miller, Roman Yampolskiy, Olle Häggström, Stuart Armstrong
Faculty Scholarship
To reduce the danger of powerful super-intelligent AIs, we might make the first such AIs oracles that can only send and receive messages. This paper proposes a possibly practical means of using machine learning to create two classes of narrow AI oracles that would provide chess advice: those aligned with the player's interest, and those that want the player to lose and give deceptively bad advice. The player would be uncertain which type of oracle it was interacting with. As the oracles would be vastly more intelligent than the player in the domain of chess, experience with these oracles might …
A Statistical Impulse Response Model Based On Empirical Characterization Of Wireless Underground Channel, Abdul Salam, Mehmet C. Vuran, Suat Irmak
A Statistical Impulse Response Model Based On Empirical Characterization Of Wireless Underground Channel, Abdul Salam, Mehmet C. Vuran, Suat Irmak
Faculty Publications
Wireless underground sensor networks (WUSNs) are becoming ubiquitous in many areas. The design of robust systems requires extensive understanding of the underground (UG) channel characteristics. In this paper, an UG channel impulse response is modeled and validated via extensive experiments in indoor and field testbed settings. The three distinct types of soils are selected with sand and clay contents ranging from $13\%$ to $86\%$ and $3\%$ to $32\%$, respectively. The impacts of changes in soil texture and soil moisture are investigated with more than $1,200$ measurements in a novel UG testbed that allows flexibility in soil moisture control. Moreover, the …
Temporal Heterogeneous Interaction Graph Embedding For Next-Item Recommendation, Yugang Ji, Mingyang Yin, Yuan Fang, Hongxia Yang, Xiangwei Wang, Tianrui Jia, Chuan Shi
Temporal Heterogeneous Interaction Graph Embedding For Next-Item Recommendation, Yugang Ji, Mingyang Yin, Yuan Fang, Hongxia Yang, Xiangwei Wang, Tianrui Jia, Chuan Shi
Research Collection School Of Computing and Information Systems
In the scenario of next-item recommendation, previous methods attempt to model user preferences by capturing the evolution of sequential interactions. However, their sequential expression is often limited, without modeling complex dynamics that short-term demands can often be influenced by long-term habits. Moreover, few of them take into account the heterogeneous types of interaction between users and items. In this paper, we model such complex data as a Temporal Heterogeneous Interaction Graph (THIG) and learn both user and item embeddings on THIGs to address next-item recommendation. The main challenges involve two aspects: the complex dynamics and rich heterogeneity of interactions. We …
Querying Recurrent Convoys Over Trajectory Data, Munkh-Erdene Yadamjav, Zhifeng Bao, Baihua Zheng, Farhana M. Choudhury, Hanan Samet
Querying Recurrent Convoys Over Trajectory Data, Munkh-Erdene Yadamjav, Zhifeng Bao, Baihua Zheng, Farhana M. Choudhury, Hanan Samet
Research Collection School Of Computing and Information Systems
Moving objects equipped with location-positioning devices continuously generate a large amount of spatio-temporal trajectory data. An interesting finding over a trajectory stream is a group of objects that are travelling together for a certain period of time. Existing studies on mining co-moving objects do not consider an important correlation between co-moving objects, which is the reoccurrence of the movement pattern. In this study, we define a problem of finding recurrent pattern of co-moving objects from streaming trajectories and propose an efficient solution that enables us to discover recent co-moving object patterns repeated within a given time period. Experimental results on …
Efficient Fine-Grained Data Sharing Mechanism For Electronic Medical Record Systems With Mobile Devices, Hui Ma, Rui Zhang, Guomin Yang, Zishuai Zong, Kai He, Yuting Xiao
Efficient Fine-Grained Data Sharing Mechanism For Electronic Medical Record Systems With Mobile Devices, Hui Ma, Rui Zhang, Guomin Yang, Zishuai Zong, Kai He, Yuting Xiao
Research Collection School Of Computing and Information Systems
Sharing digital medical records on public cloud storage via mobile devices facilitates patients (doctors) to get (offer) medical treatment of high quality and efficiency. However, challenges such as data privacy protection, flexible data sharing, efficient authority delegation, computation efficiency optimization, are remaining toward achieving practical fine-grained access control in the Electronic Medical Record (EMR) system. In this work, we propose an innovative access control model and a fine-grained data sharing mechanism for EMR, which simultaneously achieves the above-mentioned features and is suitable for resource-constrained mobile devices. In the model, complex computation is outsourced to public cloud servers, leaving almost no …
A Fortran-Keras Deep Learning Bridge For Scientific Computing, Jordan Ott, Mike Pritchard, Natalie Best, Erik Linstead, Milan Curcic, Pierre Baldi
A Fortran-Keras Deep Learning Bridge For Scientific Computing, Jordan Ott, Mike Pritchard, Natalie Best, Erik Linstead, Milan Curcic, Pierre Baldi
Engineering Faculty Articles and Research
Implementing artificial neural networks is commonly achieved via high-level programming languages such as Python and easy-to-use deep learning libraries such as Keras. These software libraries come preloaded with a variety of network architectures, provide autodifferentiation, and support GPUs for fast and efficient computation. As a result, a deep learning practitioner will favor training a neural network model in Python, where these tools are readily available. However, many large-scale scientific computation projects are written in Fortran, making it difficult to integrate with modern deep learning methods. To alleviate this problem, we introduce a software library, the Fortran-Keras Bridge (FKB). This two-way …
Decision Agriculture, Abdul Salam, Usman Raza
Decision Agriculture, Abdul Salam, Usman Raza
Faculty Publications
In this chapter, the latest developments in the field of decision agriculture are discussed. The practice of management zones in digital agriculture is described for efficient and smart faming. Accordingly, the methodology for delineating management zones is presented. Modeling of decision support systems is explained along with discussion of the issues and challenges in this area. Moreover, the precision agriculture technology is also considered. Moreover, the chapter surveys the state of the decision agriculture technologies in the countries such as Bulgaria, Denmark, France, Israel, Malaysia, Pakistan, United Kingdom, Ukraine, and Sweden. Finally, different field factors such as GPS accuracy and …
Underground Phased Arrays And Beamforming Applications, Abdul Salam, Usman Raza
Underground Phased Arrays And Beamforming Applications, Abdul Salam, Usman Raza
Faculty Publications
This chapter presents a framework for adaptive beamforming in underground communication. The wireless propagation is thoroughly analyzed to develop a model using the soil moisture as an input parameter to provide feedback mechanism while enhancing the system performance. The working of array element in the soil is analyzed. Moreover, the effect of soil texture and soil moisture on the resonant frequency and return loss is studied in detail. The wave refraction from the soil–air interface highly degrades the performance of the system. Furthermore, to beam steering is done to achieve high gain for lateral component improving the UG communication. The …
Signals In The Soil: An Introduction To Wireless Underground Communications, Abdul Salam, Usman Raza
Signals In The Soil: An Introduction To Wireless Underground Communications, Abdul Salam, Usman Raza
Faculty Publications
In this chapter, wireless underground (UG) communications are introduced. A detailed overview of WUC is given. A comprehensive review of research challenges in WUC is presented. The evolution of underground wireless is also discussed. Moreover, different component of UG communications is wireless. The WUC system architecture is explained with a detailed discussion of the anatomy of an underground mote. The examples of UG wireless communication systems are explored. Furthermore, the differences of UG wireless and over-the-air wireless are debated. Different types of wireless underground channel (e.g., In-Soil, Soil-to-Air, and Air-to-Soil) are reported as well.