Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics

Series

2020

Institution
Keyword
Publication

Articles 121 - 144 of 144

Full-Text Articles in Computer Engineering

Ensemble Lung Segmentation System Using Deep Neural Networks, Redha A. Ali, Russell C. Hardie, Hussin K. Ragb Jan 2020

Ensemble Lung Segmentation System Using Deep Neural Networks, Redha A. Ali, Russell C. Hardie, Hussin K. Ragb

Electrical and Computer Engineering Faculty Publications

Lung segmentation is a significant step in developing computer-aided diagnosis (CAD) using Chest Radiographs (CRs). CRs are used for diagnosis of the 2019 novel coronavirus disease (COVID-19), lung cancer, tuberculosis, and pneumonia. Hence, developing a Computer-Aided Detection (CAD) system would provide a second opinion to help radiologists in the reading process, increase objectivity, and reduce the workload. In this paper, we present the implementation of our ensemble deep learning model for lung segmentation. This model is based on the original DeepLabV3+, which is the extended model of DeepLabV3. Our model utilizes various architectures as a backbone of DeepLabV3+, such as …


Designing Shared Control Strategies For Teleoperated Robots Across Intrinsic User Qualities, Nancy Pham Jan 2020

Designing Shared Control Strategies For Teleoperated Robots Across Intrinsic User Qualities, Nancy Pham

Department of Computer Science and Engineering: Dissertations, Theses, and Student Research

Accounting for variance in human behavior is an integral part of interacting with robotic systems that share control between users and robots in order to reduce errors, improve performance, and maintain safety. In this work we focus on the shared control of a telepresence robot and how individual user traits may affect a person's performance while navigating the robot. This requires understanding which user qualities impact performance and cause conflicts -- with the ultimate goal of building shared controllers that adapt to those qualities. Toward this goal, we develop novel adaptive shared controllers and integrate the study of intrinsic user …


Implementing Asynchronous Linear Solvers Using Non-Uniform Distributions, Erik Jensen, Evan C. Coleman, Masha Sosonkina Jan 2020

Implementing Asynchronous Linear Solvers Using Non-Uniform Distributions, Erik Jensen, Evan C. Coleman, Masha Sosonkina

Computational Modeling & Simulation Engineering Faculty Publications

Asynchronous iterative methods present a mechanism to improve the performance of algorithms for highly parallel computational platforms by removing the overhead associated with synchronization among computing elements. This paper considers a class of asynchronous iterative linear system solvers that employ randomization to determine the component update orders, specifically focusing on the effects of drawing the order from non-uniform distributions. Results from shared-memory experiments with a two-dimensional finite-difference discrete Laplacian problem show that using distributions favoring the selection of components with a larger contribution to the residual may lead to faster convergence than selecting uniformly. Multiple implementations of the randomized asynchronous …


A Tutorial And Future Research For Building A Blockchain-Based Secure Communication Scheme For Internet Of Intelligent Things, Mohammad Wazid, Ashok Kumar Das, Sachin Shetty, Minho Jo Jan 2020

A Tutorial And Future Research For Building A Blockchain-Based Secure Communication Scheme For Internet Of Intelligent Things, Mohammad Wazid, Ashok Kumar Das, Sachin Shetty, Minho Jo

Computational Modeling & Simulation Engineering Faculty Publications

The Internet of Intelligent Things (IoIT) communication environment can be utilized in various types of applications (for example, intelligent battlefields, smart healthcare systems, the industrial internet, home automation, and many more). Communications that happen in such environments can have different types of security and privacy issues, which can be resolved through the utilization of blockchain. In this paper, we propose a tutorial that aims in desiging a generalized blockchain-based secure authentication key management scheme for the IoIT environment. Moreover, some issues with using blockchain for a communication environment are discussed as future research directions. The details of different types of …


The Artificial University: Decision Support For Universities In The Covid-19 Era, Wesley J. Wildman, Saikou Y. Diallo, George Hodulik, Andrew Page, Andreas Tolk, Neha Gondal Jan 2020

The Artificial University: Decision Support For Universities In The Covid-19 Era, Wesley J. Wildman, Saikou Y. Diallo, George Hodulik, Andrew Page, Andreas Tolk, Neha Gondal

VMASC Publications

Operating universities under pandemic conditions is a complex undertaking. The Artificial University (TAU) responds to this need. TAU is a configurable, open-source computer simulation of a university using a contact network based on publicly available information about university classes, residences, and activities. This study evaluates health outcomes for an array of interventions and testing protocols in an artificial university of 6,500 students, faculty, and staff. Findings suggest that physical distancing and centralized contact tracing are most effective at reducing infections, but there is a tipping point for compliance below which physical distancing is less effective. If student compliance is anything …


Measuring Decentrality In Blockchain Based Systems, Sarada Prasad Gochhayat, Sachin Shetty, Ravi Mukkamala, Peter Foytik, Georges A. Kamhoua, Laurent Njilla Jan 2020

Measuring Decentrality In Blockchain Based Systems, Sarada Prasad Gochhayat, Sachin Shetty, Ravi Mukkamala, Peter Foytik, Georges A. Kamhoua, Laurent Njilla

VMASC Publications

Blockchain promises to provide a distributed and decentralized means of trust among untrusted users. However, in recent years, a shift from decentrality to centrality has been observed in the most accepted Blockchain system, i.e., Bitcoin. This shift has motivated researchers to identify the cause of decentrality, quantify decentrality and analyze the impact of decentrality. In this work, we take a holistic approach to identify and quantify decentrality in Blockchain based systems. First, we identify the emergence of centrality in three layers of Blockchain based systems, namely governance layer, network layer and storage layer. Then, we quantify decentrality in these layers …


An Examination Of The Smote And Other Smote-Based Techniques That Use Synthetic Data To Oversample The Minority Class In The Context Of Credit-Card Fraud Classification, Eduardo Parkinson De Castro Jan 2020

An Examination Of The Smote And Other Smote-Based Techniques That Use Synthetic Data To Oversample The Minority Class In The Context Of Credit-Card Fraud Classification, Eduardo Parkinson De Castro

Dissertations

This research project seeks to investigate some of the different sampling techniques that generate and use synthetic data to oversample the minority class as a means of handling the imbalanced distribution between non-fraudulent (majority class) and fraudulent (minority class) classes in a credit-card fraud dataset. The purpose of the research project is to assess the effectiveness of these techniques in the context of fraud detection which is a highly imbalanced and cost-sensitive dataset. Machine learning tasks that require learning from datasets that are highly unbalanced have difficulty learning since many of the traditional learning algorithms are not designed to cope …


Customer Churn Prediction, Deepshikha Wadikar Jan 2020

Customer Churn Prediction, Deepshikha Wadikar

Dissertations

Churned customers identification plays an essential role for the functioning and growth of any business. Identification of churned customers can help the business to know the reasons for the churn and they can plan their market strategies accordingly to enhance the growth of a business. This research is aimed at developing a machine learning model that can precisely predict the churned customers from the total customers of a Credit Union financial institution. A quantitative and deductive research strategies are employed to build a supervised machine learning model that addresses the class imbalance problem handled feature selection and efficiently predict the …


An Evaluation Of Text Representation Techniques For Fake News Detection Using: Tf-Idf, Word Embeddings, Sentence Embeddings With Linear Support Vector Machine., Sangita Sriram Jan 2020

An Evaluation Of Text Representation Techniques For Fake News Detection Using: Tf-Idf, Word Embeddings, Sentence Embeddings With Linear Support Vector Machine., Sangita Sriram

Dissertations

In a world where anybody can share their views, opinions and make it sound like these are facts about the current situation of the world, Fake News poses a huge threat especially to the reputation of people with high stature and to organizations. In the political world, this could lead to opposition parties making use of this opportunity to gain popularity in their elections. In the medical world, a fake scandalous message about a medicine giving side effects, hospital treatment gone wrong or even a false message against a practicing doctor could become a big menace to everyone involved in …


Drug Reviews: Cross-Condition And Cross-Source Analysis By Review Quantification Using Regional Cnn-Lstm Models, Ajith Mathew Thoomkuzhy Jan 2020

Drug Reviews: Cross-Condition And Cross-Source Analysis By Review Quantification Using Regional Cnn-Lstm Models, Ajith Mathew Thoomkuzhy

Dissertations

Pharmaceutical drugs are usually rated by customers or patients (i.e. in a scale from 1 to 10). Often, they also give reviews or comments on the drug and its side effects. It is desirable to quantify the reviews to help analyze drug favorability in the market, in the absence of ratings. Since these reviews are in the form of text, we should use lexical methods for the analysis. The intent of this study was two-fold: First, to understand how better the efficiency will be if CNN-LSTM models are used to predict ratings or sentiment from reviews. These models are known …


Machine Learning Assisted Gait Analysis For The Determination Of Handedness In Able-Bodied People, Hugh Gallagher Jan 2020

Machine Learning Assisted Gait Analysis For The Determination Of Handedness In Able-Bodied People, Hugh Gallagher

Dissertations

This study has investigated the potential application of machine learning for video analysis, with a view to creating a system which can determine a person’s hand laterality (handedness) from the way that they walk (their gait). To this end, the convolutional neural network model VGG16 underwent transfer learning in order to classify videos under two ‘activities’: “walking left-handed” and “walking right-handed”. This saw varying degrees of success across five transfer learning trained models: Everything – the entire dataset; FiftyFifty – the dataset with enough right-handed samples removed to produce a set with parity between activities; Female – only the female …


Identifying Online Sexual Predators Using Support Vector Machine, Yifan Li Jan 2020

Identifying Online Sexual Predators Using Support Vector Machine, Yifan Li

Dissertations

A two-stage classification model is built in the research for online sexual predator identification. The first stage identifies the suspicious conversations that have predator participants. The second stage identifies the predators in suspicious conversations. Support vector machines are used with word and character n-grams, combined with behavioural features of the authors to train the final classifier. The unbalanced dataset is downsampled to test the performance of re-balancing an unbalanced dataset. An age group classification model is also constructed to test the feasibility of extracting the age profile of the authors, which can be used as features for classifier training. The …


Transformer Neural Networks For Automated Story Generation, Kemal Araz Jan 2020

Transformer Neural Networks For Automated Story Generation, Kemal Araz

Dissertations

Towards the last two-decade Artificial Intelligence (AI) proved its use on tasks such as image recognition, natural language processing, automated driving. As discussed in the Moore’s law the computational power increased rapidly over the few decades (Moore, 1965) and made it possible to use the techniques which were computationally expensive. These techniques include Deep Learning (DL) changed the field of AI and outperformed other models in a lot of fields some of which mentioned above. However, in natural language generation especially for creative tasks that needs the artificial intelligent models to have not only a precise understanding of the given …


Modeling And Counteracting Exposure Bias In Recommender Systems, Sami Khenissi, Olfa Nasraoui Jan 2020

Modeling And Counteracting Exposure Bias In Recommender Systems, Sami Khenissi, Olfa Nasraoui

Faculty Scholarship

What we discover and see online, and consequently our opinions and decisions, are becoming increasingly affected by automated machine learned predictions. Similarly, the predictive accuracy of learning machines heavily depends on the feedback data that we provide them. This mutual influence can lead to closed-loop interactions that may cause unknown biases which can be exacerbated after several iterations of machine learning predictions and user feedback. Machine-caused biases risk leading to undesirable social effects ranging from polarization to unfairness and filter bubbles. In this paper, we study the bias inherent in widely used recommendation strategies such as matrix factorization. Then we …


Technological Challenges And Innovations In Cybersecurity And Networking Technology Program, Syed R. Zaidi, Ajaz Sana, Aparicio Carranza Jan 2020

Technological Challenges And Innovations In Cybersecurity And Networking Technology Program, Syed R. Zaidi, Ajaz Sana, Aparicio Carranza

Publications and Research

This era is posing a unique challenge to the Cybersecurity and related Engineering Technology areas, stimulated by the multifaceted technological boom expressed in accelerated globalization, digital transformation, the cloud, mobile access apps, and the Internet of Things (IoT)—where more and more devices are connected to the Internet every day. As the use of new Internet-based technologies increase; so does the risk of theft and misuse of sensitive information. This demands the awareness of cyber-criminality and the need for cyber hygiene in corporations, small businesses, and the government. As the need for experienced cybersecurity specialists has skyrocketed in recent years and …


Comparison Of Object Detection And Patch-Based Classification Deep Learning Models On Mid- To Late-Season Weed Detection In Uav Imagery, Arun Narenthiran Veeranampalayam Sivakumar, Jiating Li, Stephen Scott, Eric T. Psota, Amit J. Jhala, Joe D. Luck, Yeyin Shi Jan 2020

Comparison Of Object Detection And Patch-Based Classification Deep Learning Models On Mid- To Late-Season Weed Detection In Uav Imagery, Arun Narenthiran Veeranampalayam Sivakumar, Jiating Li, Stephen Scott, Eric T. Psota, Amit J. Jhala, Joe D. Luck, Yeyin Shi

Department of Biological Systems Engineering: Papers and Publications

Mid- to late-season weeds that escape from the routine early-season weed management threaten agricultural production by creating a large number of seeds for several future growing seasons. Rapid and accurate detection of weed patches in field is the first step of site-specific weed management. In this study, object detection-based convolutional neural network models were trained and evaluated over low-altitude unmanned aerial vehicle (UAV) imagery for mid- to late-season weed detection in soybean fields. The performance of two object detection models, Faster RCNN and the Single Shot Detector (SSD), were evaluated and compared in terms of weed detection performance using mean …


A Direct Data-Cluster Analysis Method Based On Neutrosophic Set Implication, Florentin Smarandache, Sudan Jha, Gyanendra Prasad Joshi, Lewis Nkenyereya, Dae Wan Kim Jan 2020

A Direct Data-Cluster Analysis Method Based On Neutrosophic Set Implication, Florentin Smarandache, Sudan Jha, Gyanendra Prasad Joshi, Lewis Nkenyereya, Dae Wan Kim

Branch Mathematics and Statistics Faculty and Staff Publications

Raw data are classified using clustering techniques in a reasonable manner to create disjoint clusters. A lot of clustering algorithms based on specific parameters have been proposed to access a high volume of datasets. This paper focuses on cluster analysis based on neutrosophic set implication, i.e., a k-means algorithm with a threshold-based clustering technique. This algorithm addresses the shortcomings of the k-means clustering algorithm by overcoming the limitations of the threshold-based clustering algorithm. To evaluate the validity of the proposed method, several validity measures and validity indices are applied to the Iris dataset (from the University of California, Irvine, Machine …


(Φ, Ψ)-Weak Contractions In Neutrosophic Cone Metric Spaces Via Fixed Point Theorems, Florentin Smarandache, Wadei F. Al-Omeri Jan 2020

(Φ, Ψ)-Weak Contractions In Neutrosophic Cone Metric Spaces Via Fixed Point Theorems, Florentin Smarandache, Wadei F. Al-Omeri

Branch Mathematics and Statistics Faculty and Staff Publications

In this manuscript, we obtain common fixed point theorems in the neutrosophic cone metric space. Also, notion of (Φ, Ψ)-weak contraction is defined in the neutrosophic cone metric space by using the idea of altering distance function. Finally, we review many examples of cone metric spaces to verify some properties.


Mitosisnet: End-To-End Mitotic Cell Detection By Multi-Task Learning, Md Zahangir Alom, Theus Aspiras, Tarek M. Taha, Tj Bowen, Vijayan K. Asari Jan 2020

Mitosisnet: End-To-End Mitotic Cell Detection By Multi-Task Learning, Md Zahangir Alom, Theus Aspiras, Tarek M. Taha, Tj Bowen, Vijayan K. Asari

Electrical and Computer Engineering Faculty Publications

Mitotic cell detection is one of the challenging problems in the field of computational pathology. Currently, mitotic cell detection and counting are one of the strongest prognostic markers for breast cancer diagnosis. The clinical visual inspection on histology slides is tedious, error prone, and time consuming for the pathologist. Thus, automatic mitotic cell detection approaches are highly demanded in clinical practice. In this paper, we propose an end-to-end multi-task learning system for mitosis detection from pathological images which is named"MitosisNet". MitosisNet consist of segmentation, detection, and classification models where the segmentation, and detection models are used for mitosis reference region …


A Saliency-Driven Video Magnifier For People With Low Vision, Ali Selman Aydin, Shirin Feiz, Iv Ramakrishnan, Vikas Ashok Jan 2020

A Saliency-Driven Video Magnifier For People With Low Vision, Ali Selman Aydin, Shirin Feiz, Iv Ramakrishnan, Vikas Ashok

Computer Science Faculty Publications

Consuming video content poses significant challenges for many screen magnifier users, which is the “go to” assistive technology for people with low vision. While screen magnifier software could be used to achieve a zoom factor that would make the content of the video visible to low-vision users, it is oftentimes a major challenge for these users to navigate through videos. Towards making videos more accessible for low-vision users, we have developed the SViM video magnifier system [6]. Specifically, SViM consists of three different magnifier interfaces with easy-to-use means of interactions. All three interfaces are driven by visual saliency as a …


A Review Of Emotion Sensing: Categorization Models And Algorithms, Zhaoxia Wang, Seng-Beng Ho, Erik Cambria Jan 2020

A Review Of Emotion Sensing: Categorization Models And Algorithms, Zhaoxia Wang, Seng-Beng Ho, Erik Cambria

Research Collection School Of Computing and Information Systems

Sentiment analysis consists in the identification of the sentiment polarity associated with a target object, such as a book, a movie or a phone. Sentiments reflect feelings and attitudes, while emotions provide a finer characterization of the sentiments involved. With the huge number of comments generated daily on the Internet, besides sentiment analysis, emotion identification has drawn keen interest from different researchers, businessmen and politicians for polling public opinions and attitudes. This paper reviews and discusses existing emotion categorization models for emotion analysis and proposes methods that enhance existing emotion research. We carried out emotion analysis by inviting experts from …


Remote Communication In Wilderness Search And Rescue: Implications For The Design Of Emergency Distributed-Collaboration Tools For Network-Sparse Environments, Brennan Jones, Anthony Tang, Carman Neustaedter Jan 2020

Remote Communication In Wilderness Search And Rescue: Implications For The Design Of Emergency Distributed-Collaboration Tools For Network-Sparse Environments, Brennan Jones, Anthony Tang, Carman Neustaedter

Research Collection School Of Computing and Information Systems

Wilderness search and rescue (WSAR) requires careful communication between workers in different locations. To understand the contexts from which WSAR workers communicate and the challenges they face, we interviewed WSAR workers and observed a mock-WSAR scenario. Our findings illustrate that WSAR workers face challenges in maintaining a shared mental model. This is primarily done through distributed communication using two-way radios and cell phones for text and photo messaging; yet both implicit and explicit communication suffer. WSAR workers send messages for various reasons and share different types of information with varying levels of urgency. This warrants the use of multiple communication …


Smart Communities: From Sensors To Internet Of Things And To A Marketplace Of Services, Stephan Olariu, Nirwan Ansari (Editor), Andreas Ahrens (Editor), Cesar Benavente-Preces (Editor) Jan 2020

Smart Communities: From Sensors To Internet Of Things And To A Marketplace Of Services, Stephan Olariu, Nirwan Ansari (Editor), Andreas Ahrens (Editor), Cesar Benavente-Preces (Editor)

Computer Science Faculty Publications

Our paper was inspired by the recent Society 5.0 initiative of the Japanese Government that seeks to create a sustainable human-centric society by putting to work recent advances in technology: sensor networks, edge computing, IoT ecosystems, AI, Big Data, robotics, to name just a few. The main contribution of this work is a vision of how these technological advances can contribute, directly or indirectly, to making Society 5.0 reality. For this purpose we build on a recently-proposed concept of Marketplace of Services that, in our view, will turn out to be one of the cornerstones of Society 5.0. Instead of …


Deepmag+ : Sniffing Mobile Apps In Magnetic Field Through Deep Learning, Rui Ning, Cong Wang, Chunsheng Xin, Jiang Li, Hongyi Wu Jan 2020

Deepmag+ : Sniffing Mobile Apps In Magnetic Field Through Deep Learning, Rui Ning, Cong Wang, Chunsheng Xin, Jiang Li, Hongyi Wu

Electrical & Computer Engineering Faculty Publications

This paper reports a new side-channel attack to smartphones using the unrestricted magnetic sensor data. We demonstrate that attackers can effectively infer the Apps being used on a smartphone with an accuracy of over 80%, through training a deep Convolutional Neural Networks (CNN). Various signal processing strategies have been studied for feature extractions, including a tempogram based scheme. Moreover, by further exploiting the unrestricted motion sensor to cluster magnetometer data, the sniffing accuracy can increase to as high as 98%. To mitigate such attacks, we propose a noise injection scheme that can effectively reduce the App sniffing accuracy to only …