Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Physical Sciences and Mathematics (121)
- Computer Sciences (111)
- Digital Communications and Networking (66)
- Computer and Systems Architecture (36)
- Engineering Education (27)
-
- Social and Behavioral Sciences (27)
- Electrical and Computer Engineering (21)
- Public Affairs, Public Policy and Public Administration (20)
- Education (16)
- Information Security (16)
- Robotics (15)
- Artificial Intelligence and Robotics (14)
- Operations Research, Systems Engineering and Industrial Engineering (13)
- Databases and Information Systems (11)
- Software Engineering (11)
- Civil and Environmental Engineering (10)
- Business (9)
- Systems Engineering (9)
- Systems and Communications (9)
- Theory and Algorithms (9)
- Military and Veterans Studies (8)
- Systems Architecture (8)
- Transportation Engineering (8)
- Data Storage Systems (7)
- Defense and Security Studies (6)
- Graphics and Human Computer Interfaces (6)
- Mechanical Engineering (6)
- Medicine and Health Sciences (6)
- Keyword
-
- Digital libraries (14)
- Robotics (8)
- Blockchain (7)
- Deep learning (7)
- Engineering (7)
-
- Interoperability (7)
- Metadata (7)
- Machine learning (6)
- World Wide Web (6)
- Engineering education (5)
- Information dissemination (5)
- Information retrieval (5)
- Automation (4)
- Computer science (4)
- Conceptual modeling (4)
- Curricula (4)
- Documents (4)
- Information systems (4)
- IoT (4)
- Online systems (4)
- Security (4)
- Sensor networks (4)
- Telecommunications (4)
- Analysis (3)
- Artificial intelligence (3)
- Command and control systems (3)
- Composability (3)
- Digital data (3)
- Distributed processing (3)
- Document storage (3)
- Publication Year
- Publication
-
- Computational Modeling & Simulation Engineering Faculty Publications (47)
- Computer Science Faculty Publications (47)
- Engineering Technology Faculty Publications (28)
- Electrical & Computer Engineering Faculty Publications (21)
- VMASC Publications (19)
-
- Engineering Management & Systems Engineering Faculty Publications (18)
- Information Technology & Decision Sciences Faculty Publications (4)
- School of Cybersecurity Faculty Publications (3)
- Civil & Environmental Engineering Faculty Publications (2)
- Mathematics & Statistics Faculty Publications (2)
- Teaching & Learning Faculty Publications (2)
- January 23, 2015: Storm Surge Modeling Tools for Planning and Response (1)
- Mechanical & Aerospace Engineering Faculty Publications (1)
- Physics Faculty Publications (1)
Articles 1 - 30 of 196
Full-Text Articles in Computer Engineering
Methods That Support The Validation Of Agent-Based Models: An Overview And Discussion, Andrew Collins, Matthew Koehler, Christopher Lynch
Methods That Support The Validation Of Agent-Based Models: An Overview And Discussion, Andrew Collins, Matthew Koehler, Christopher Lynch
Engineering Management & Systems Engineering Faculty Publications
Validation is the process of determining if a model adequately represents the system under study for the model’s intended purpose. Validation is a critical component in building the credibility of a simulation model with its end-users. Effectively conducting validation can be a daunting task for both novice and experienced simulation developers. Further compounding the difficult task of conducting validation is that there is no universally accepted approach for assessing a simulation. These challenges are particularly relevant to the paradigm of Agent-Based Modeling and Simulation (ABMS) because of the complexity found in these models’ mechanisms and in the real-world situations they …
Iot Health Devices: Exploring Security Risks In The Connected Landscape, Abasi-Amefon Obot Affia, Hilary Finch, Woosub Jung, Issah Abubakari Samori, Lucas Potter, Xavier-Lewis Palmer
Iot Health Devices: Exploring Security Risks In The Connected Landscape, Abasi-Amefon Obot Affia, Hilary Finch, Woosub Jung, Issah Abubakari Samori, Lucas Potter, Xavier-Lewis Palmer
School of Cybersecurity Faculty Publications
The concept of the Internet of Things (IoT) spans decades, and the same can be said for its inclusion in healthcare. The IoT is an attractive target in medicine; it offers considerable potential in expanding care. However, the application of the IoT in healthcare is fraught with an array of challenges, and also, through it, numerous vulnerabilities that translate to wider attack surfaces and deeper degrees of damage possible to both consumers and their confidence within health systems, as a result of patient-specific data being available to access. Further, when IoT health devices (IoTHDs) are developed, a diverse range of …
A Structured Narrative Prompt For Prompting Narratives From Large Language Models: Sentiment Assessment Of Chatgpt-Generated Narratives And Real Tweets, Christopher J. Lynch, Erik J. Jensen, Virginia Zamponi, Kevin O'Brien, Erika Frydenlund, Ross Gore
A Structured Narrative Prompt For Prompting Narratives From Large Language Models: Sentiment Assessment Of Chatgpt-Generated Narratives And Real Tweets, Christopher J. Lynch, Erik J. Jensen, Virginia Zamponi, Kevin O'Brien, Erika Frydenlund, Ross Gore
VMASC Publications
Large language models (LLMs) excel in providing natural language responses that sound authoritative, reflect knowledge of the context area, and can present from a range of varied perspectives. Agent-based models and simulations consist of simulated agents that interact within a simulated environment to explore societal, social, and ethical, among other, problems. Simulated agents generate large volumes of data and discerning useful and relevant content is an onerous task. LLMs can help in communicating agents' perspectives on key life events by providing natural language narratives. However, these narratives should be factual, transparent, and reproducible. Therefore, we present a structured narrative prompt …
Past Challenges And The Future Of Discrete Event Simulation, Andrew J. Collins, Farinaz Sabz Ali Pour, Craig A. Jordan
Past Challenges And The Future Of Discrete Event Simulation, Andrew J. Collins, Farinaz Sabz Ali Pour, Craig A. Jordan
Engineering Management & Systems Engineering Faculty Publications
The American scientist Carl Sagan once said: “You have to know the past to understand the present.” We argue that having a meaningful dialogue on the future of simulation requires a baseline understanding of previous discussions on its future. For this paper, we conduct a review of the discrete event simulation (DES) literature that focuses on its future to understand better the path that DES has been following, both in terms of who is using simulation and what directions they think DES should take. Our review involves a qualitative literature review of DES and a quantitative bibliometric analysis of the …
Security Of Internet Of Things (Iot) Using Federated Learning And Deep Learning — Recent Advancements, Issues And Prospects, Vinay Gugueoth, Sunitha Safavat, Sachin Shetty
Security Of Internet Of Things (Iot) Using Federated Learning And Deep Learning — Recent Advancements, Issues And Prospects, Vinay Gugueoth, Sunitha Safavat, Sachin Shetty
Electrical & Computer Engineering Faculty Publications
There is a great demand for an efficient security framework which can secure IoT systems from potential adversarial attacks. However, it is challenging to design a suitable security model for IoT considering the dynamic and distributed nature of IoT. This motivates the researchers to focus more on investigating the role of machine learning (ML) in the designing of security models. A brief analysis of different ML algorithms for IoT security is discussed along with the advantages and limitations of ML algorithms. Existing studies state that ML algorithms suffer from the problem of high computational overhead and risk of privacy leakage. …
Technology Adoption Of Computer-Aided Instruction In Healthcare: A Structured Review, Queenie Kate Cabanilla, Frevy Teofilo-Orencia, Rentor Cafino, Armando T. Isla Jr., Jehan Grace Maglaya, Xavier-Lewis Palmer, Lucas Potter, Dave E. Marcial, Lemuel Clark Velasco
Technology Adoption Of Computer-Aided Instruction In Healthcare: A Structured Review, Queenie Kate Cabanilla, Frevy Teofilo-Orencia, Rentor Cafino, Armando T. Isla Jr., Jehan Grace Maglaya, Xavier-Lewis Palmer, Lucas Potter, Dave E. Marcial, Lemuel Clark Velasco
Electrical & Computer Engineering Faculty Publications
Computer-Aided Instruction (CAI) is one of the interactive teaching methods that electronically presents instructional resources and enhances learner performance. In health settings, using CAI is one of the important ways to improve learners' knowledge and usefulness in their healthcare specialization yet there is still a lack of research that offers a comprehensive synthesis of investigating into the adoption of CAI in healthcare. This research aims to provide a comprehensive review of related literatures on the enablers and barriers for technology adoption of CAI in healthcare. 31 journals were analyzed and revealed that several studies were utilizing the Unified Theory of …
An Optimized And Scalable Blockchain-Based Distributed Learning Platform For Consumer Iot, Zhaocheng Wang, Xueying Liu, Xinming Shao, Abdullah Alghamdi, Md. Shirajum Munir, Sujit Biswas
An Optimized And Scalable Blockchain-Based Distributed Learning Platform For Consumer Iot, Zhaocheng Wang, Xueying Liu, Xinming Shao, Abdullah Alghamdi, Md. Shirajum Munir, Sujit Biswas
School of Cybersecurity Faculty Publications
Consumer Internet of Things (CIoT) manufacturers seek customer feedback to enhance their products and services, creating a smart ecosystem, like a smart home. Due to security and privacy concerns, blockchain-based federated learning (BCFL) ecosystems can let CIoT manufacturers update their machine learning (ML) models using end-user data. Federated learning (FL) uses privacy-preserving ML techniques to forecast customers' needs and consumption habits, and blockchain replaces the centralized aggregator to safeguard the ecosystem. However, blockchain technology (BCT) struggles with scalability and quick ledger expansion. In BCFL, local model generation and secure aggregation are other issues. This research introduces a novel architecture, emphasizing …
Robustembed: Robust Sentence Embeddings Using Self-Supervised Contrastive Pre-Training, Javad Asl, Eduardo Blanco, Daniel Takabi
Robustembed: Robust Sentence Embeddings Using Self-Supervised Contrastive Pre-Training, Javad Asl, Eduardo Blanco, Daniel Takabi
School of Cybersecurity Faculty Publications
Pre-trained language models (PLMs) have demonstrated their exceptional performance across a wide range of natural language processing tasks. The utilization of PLM-based sentence embeddings enables the generation of contextual representations that capture rich semantic information. However, despite their success with unseen samples, current PLM-based representations suffer from poor robustness in adversarial scenarios. In this paper, we propose RobustEmbed, a self-supervised sentence embedding framework that enhances both generalization and robustness in various text representation tasks and against diverse adversarial attacks. By generating high-risk adversarial perturbations to promote higher invariance in the embedding space and leveraging the perturbation within a novel contrastive …
Modeling Wealth Distribution In A Society, Dylan Berns, Peihsien Sun, Adrian V. Gheorghe
Modeling Wealth Distribution In A Society, Dylan Berns, Peihsien Sun, Adrian V. Gheorghe
Engineering Management & Systems Engineering Faculty Publications
The interconnectedness of social mood, changing dynamics, income inequality, and wealth distribution underscores the complexity of understanding and addressing these issues. This complexity inspires researchers to develop models and conduct further research to gain insights into the mechanisms driving income inequality and wealth distribution. By studying these phenomena more comprehensively, one can aim to develop strategies and policies that promote a more equitable distribution of wealth and opportunities, thereby fostering social stability and economic prosperity. In the present paper, there was build a model on wealth distribution and income inequality to help people understand the complexities of wealth inequality and …
A Structure-Aware Generative Adversarial Network For Bilingual Lexicon Induction, Bocheng Han, Qian Tao, Lusi Li, Zhihao Xiong
A Structure-Aware Generative Adversarial Network For Bilingual Lexicon Induction, Bocheng Han, Qian Tao, Lusi Li, Zhihao Xiong
Computer Science Faculty Publications
Bilingual lexicon induction (BLI) is the task of inducing word translations with a learned mapping function that aligns monolingual word embedding spaces in two different languages. However, most previous methods treat word embeddings as isolated entities and fail to jointly consider both the intra-space and inter-space topological relations between words. This limitation makes it challenging to align words from embedding spaces with distinct topological structures, especially when the assumption of isomorphism may not hold. To this end, we propose a novel approach called the Structure-Aware Generative Adversarial Network (SA-GAN) model to explicitly capture multiple topological structure information to achieve accurate …
Hashes Are Not Suitable To Verify Fixity Of The Public Archived Web, Mohamed Aturban, Martin Klein, Herbert Van De Sompel, Sawood Alam, Michael L. Nelson, Michele C. Weigle
Hashes Are Not Suitable To Verify Fixity Of The Public Archived Web, Mohamed Aturban, Martin Klein, Herbert Van De Sompel, Sawood Alam, Michael L. Nelson, Michele C. Weigle
Computer Science Faculty Publications
Web archives, such as the Internet Archive, preserve the web and allow access to prior states of web pages. We implicitly trust their versions of archived pages, but as their role moves from preserving curios of the past to facilitating present day adjudication, we are concerned with verifying the fixity of archived web pages, or mementos, to ensure they have always remained unaltered. A widely used technique in digital preservation to verify the fixity of an archived resource is to periodically compute a cryptographic hash value on a resource and then compare it with a previous hash value. If the …
Efficient Gpu Implementation Of Automatic Differentiation For Computational Fluid Dynamics, Mohammad Zubair, Desh Ranjan, Aaron Walden, Gabriel Nastac, Eric Nielsen, Boris Diskin, Marc Paterno, Samuel Jung, Joshua Hoke Davis
Efficient Gpu Implementation Of Automatic Differentiation For Computational Fluid Dynamics, Mohammad Zubair, Desh Ranjan, Aaron Walden, Gabriel Nastac, Eric Nielsen, Boris Diskin, Marc Paterno, Samuel Jung, Joshua Hoke Davis
Computer Science Faculty Publications
Many scientific and engineering applications require repeated calculations of derivatives of output functions with respect to input parameters. Automatic Differentiation (AD) is a method that automates derivative calculations and can significantly speed up code development. In Computational Fluid Dynamics (CFD), derivatives of flux functions with respect to state variables (Jacobian) are needed for efficient solutions of the nonlinear governing equations. AD of flux functions on graphics processing units (GPUs) is challenging as flux computations involve many intermediate variables that create high register pressure and require significant memory traffic because of the need to store the derivatives. This paper presents a …
Are Ride-Hailing Services Safer Than Taxis? A Multivariate Spatial Approach With Accomodation Of Exposure Uncertainty, Guocong Zhai, Kun Xie, Hong Yang, Di Yang
Are Ride-Hailing Services Safer Than Taxis? A Multivariate Spatial Approach With Accomodation Of Exposure Uncertainty, Guocong Zhai, Kun Xie, Hong Yang, Di Yang
Civil & Environmental Engineering Faculty Publications
Despite many research efforts on ride-hailing services and taxis, limited studies have compared the safety performance of the two modes. A major challenge is the need for reliable mode-specific exposure data to model their safety outcomes. Moreover, crash frequencies of the two modes by injury severities tend to be spatially and inherently correlated. To fully address these issues, this study proposes a novel multivariate conditional autoregressive model considering measurement errors in mode-specific exposures (MVCARME). More specially, a classical measurement error structure is used to accommodate the uncertainty of mode-specific exposures estimated, and a multivariate spatial specification is adopted to capture …
An Overview Of Bidirectional Electric Vehicles Charging System As A Vehicle To Anything (V2x) Under Cyber–Physical Power System (Cpps), Onur Elma, Umit Cali, Murat Kuzlu
An Overview Of Bidirectional Electric Vehicles Charging System As A Vehicle To Anything (V2x) Under Cyber–Physical Power System (Cpps), Onur Elma, Umit Cali, Murat Kuzlu
Engineering Technology Faculty Publications
Nowadays, EVs are rapidly increasing in popularity, and are accepted as the vehicles of the future all over the world. The most important components are their battery and charging systems. The energy capacity of EVs’ batteries has a significant potential to supply different energy requirements. Therefore, EVs must be designed in accordance with bidirectional power flow, and Electric Vehicle Supply Equipment (EVSE) should be upgraded as Electric Vehicle Power Exchange Equipment (EVPE). This power exchange infrastructure can be called Vehicle-to-Anything (V2X). V2X will also be the key solution for energy grids of the future that will turn into a much …
Applications Of Blockchain In Business Processes: A Comprehensive Review, Wattana Viriyasitavat, Li Xu, Dusit Niyato, Zhuming Bi, Danupol Hoonsopon
Applications Of Blockchain In Business Processes: A Comprehensive Review, Wattana Viriyasitavat, Li Xu, Dusit Niyato, Zhuming Bi, Danupol Hoonsopon
Information Technology & Decision Sciences Faculty Publications
Blockchain (BC), as an emerging technology, is revolutionizing Business Process Management (BPM) in multiple ways. The main adoption is to serve as a trusted infrastructure to guarantee the trust of collaborations among multiple partners in trustless environments. Especially, BC enables trust of information by using Distributed Ledger Technology (DLT). With the power of smart contracts, BC enforces the obligations of counterparties that transact in a business process (BP) by programming the contracts as transactions. This paper aims to study the state-of-the-art of BC technologies by (1) exploring its applications in BPM with the focus on how BC provides the trust …
Monocular Camera Viewpoint-Invariant Vehicular Traffic Segmentation And Classification Utilizing Small Datasets, Amr Yousef, Jeff Flora, Khan Iftekharuddin
Monocular Camera Viewpoint-Invariant Vehicular Traffic Segmentation And Classification Utilizing Small Datasets, Amr Yousef, Jeff Flora, Khan Iftekharuddin
Electrical & Computer Engineering Faculty Publications
The work presented here develops a computer vision framework that is view angle independent for vehicle segmentation and classification from roadway traffic systems installed by the Virginia Department of Transportation (VDOT). An automated technique for extracting a region of interest is discussed to speed up the processing. The VDOT traffic videos are analyzed for vehicle segmentation using an improved robust low-rank matrix decomposition technique. It presents a new and effective thresholding method that improves segmentation accuracy and simultaneously speeds up the segmentation processing. Size and shape physical descriptors from morphological properties and textural features from the Histogram of Oriented Gradients …
Integrating Plcs With Robot Motion Control In Engineering Capstone Courses, Sanjeevi Chitikeshi, Shirshak K. Dhali, Vukica Jovanovic
Integrating Plcs With Robot Motion Control In Engineering Capstone Courses, Sanjeevi Chitikeshi, Shirshak K. Dhali, Vukica Jovanovic
Engineering Technology Faculty Publications
Robotic motion control methods and Programmable Logic Controllers (PLCs) are critical in engineering automation and process control applications. In most manufacturing and automation processes, robots are used for moving parts and are controlled by industrial PLCs. Proper integration of external I/O devices, sensors and actuating motors with PLC input and output cards is very important to run the process smoothly without any faults and/or safety concerns. Most traditional electrical and computer engineering (ECE) programs offer high level of motion theory and controls but little hands-on exposure to PLCs which are the main industrial controllers. This paper provides a framework for …
Measuring The Rol Of Digital Engineering: It's A Journey, Not A Number, Tom Mcdermott, Kaitlin Henderson, Eileen Van Aken, Alejandro Salado, Joseph Bradley
Measuring The Rol Of Digital Engineering: It's A Journey, Not A Number, Tom Mcdermott, Kaitlin Henderson, Eileen Van Aken, Alejandro Salado, Joseph Bradley
Engineering Management & Systems Engineering Faculty Publications
Systems engineering as a discipline has long had difficulty providing quantifiable evidence of its value (Honour 2004); DE transformation provides an opportunity to better measure its value. Transitioning from a document-based to a model-based approach is expensive, and organizations want to know if the effort and cost to adopt MBSE is worth it.
Runtime Energy Savings Based On Machine Learning Models For Multicore Applications, Vaibhav Sundriyal, Masha Sosonkina
Runtime Energy Savings Based On Machine Learning Models For Multicore Applications, Vaibhav Sundriyal, Masha Sosonkina
Electrical & Computer Engineering Faculty Publications
To improve the power consumption of parallel applications at the runtime, modern processors provide frequency scaling and power limiting capabilities. In this work, a runtime strategy is proposed to maximize energy savings under a given performance degradation. Machine learning techniques were utilized to develop performance models which would provide accurate performance prediction with change in operating core-uncore frequency. Experiments, performed on a node (28 cores) of a modern computing platform showed significant energy savings of as much as 26% with performance degradation of as low as 5% under the proposed strategy compared with the execution in the unlimited power case.
Agile Research - Getting Beyond The Buzzword, Trupti Narayan Rane
Agile Research - Getting Beyond The Buzzword, Trupti Narayan Rane
Engineering Management & Systems Engineering Faculty Publications
"Oh yeah, we're an Agile shop, we gave up Waterfall years ago." - product owners, managers, or could be anyone else. You will seldom have a conversation with a product or software development team member without the agile buzzword thrown at you at the drop of a hat. It would not be an oversell to say that Agile software development has been adopted at a large scale across several big and small organizations. Clearly, Agile is an ideology that is working, which made me explore more on its applicability in research. As someone who has been in the Information Technology …
Spectrum Sensing With Energy Detection In Multiple Alternating Time Slots, Călin Vlădeanu, Alexandru Marţian, Dimitrie C. Popescu
Spectrum Sensing With Energy Detection In Multiple Alternating Time Slots, Călin Vlădeanu, Alexandru Marţian, Dimitrie C. Popescu
Electrical & Computer Engineering Faculty Publications
Energy detection (ED) represents a low complexity approach used by secondary users (SU) to sense spectrum occupancy by primary users (PU) in cognitive radio (CR) systems. In this paper, we present a new algorithm that senses the spectrum occupancy by performing ED in K consecutive sensing time slots starting from the current slot and continuing by alternating before and after the current slot. We consider a PU traffic model specified in terms of an average duty cycle value, and derive analytical expressions for the false alarm probability (FAP) and correct detection probability (CDP) for any value of K . Our …
A Literature Review On Combining Heuristics And Exact Algorithms In Combinatorial Optimization, Hesamoddin Tahami, Hengameh Fakhravar
A Literature Review On Combining Heuristics And Exact Algorithms In Combinatorial Optimization, Hesamoddin Tahami, Hengameh Fakhravar
Engineering Management & Systems Engineering Faculty Publications
There are several approaches for solving hard optimization problems. Mathematical programming techniques such as (integer) linear programming-based methods and metaheuristic approaches are two extremely effective streams for combinatorial problems. Different research streams, more or less in isolation from one another, created these two. Only several years ago, many scholars noticed the advantages and enormous potential of building hybrids of combining mathematical programming methodologies and metaheuristics. In reality, many problems can be solved much better by exploiting synergies between these approaches than by “pure” classical algorithms. The key question is how to integrate mathematical programming methods and metaheuristics to achieve such …
Core Point Pixel-Level Localization By Fingerprint Features In Spatial Domain, Xueyi Ye, Yuzhong Shen, Maosheng Zeng, Yirui Liu, Huahua Chen, Zhijing Zhao
Core Point Pixel-Level Localization By Fingerprint Features In Spatial Domain, Xueyi Ye, Yuzhong Shen, Maosheng Zeng, Yirui Liu, Huahua Chen, Zhijing Zhao
Computational Modeling & Simulation Engineering Faculty Publications
Singular point detection is a primary step in fingerprint recognition, especially for fingerprint alignment and classification. But in present there are still some problems and challenges such as more false-positive singular points or inaccurate reference point localization. This paper proposes an accurate core point localization method based on spatial domain features of fingerprint images from a completely different viewpoint to improve the fingerprint core point displacement problem of singular point detection. The method first defines new fingerprint features, called furcation and confluence, to represent specific ridge/valley distribution in a core point area, and uses them to extract the innermost Curve …
Bfv-Based Homomorphic Encryption For Privacy-Preserving Cnn Models, Febrianti Wibawa, Ferhat Ozgur Catak, Salih Sarp, Murat Kuzlu
Bfv-Based Homomorphic Encryption For Privacy-Preserving Cnn Models, Febrianti Wibawa, Ferhat Ozgur Catak, Salih Sarp, Murat Kuzlu
Engineering Technology Faculty Publications
Medical data is frequently quite sensitive in terms of data privacy and security. Federated learning has been used to increase the privacy and security of medical data, which is a sort of machine learning technique. The training data is disseminated across numerous machines in federated learning, and the learning process is collaborative. There are numerous privacy attacks on deep learning (DL) models that attackers can use to obtain sensitive information. As a result, the DL model should be safeguarded from adversarial attacks, particularly in medical data applications. Homomorphic encryption-based model security from the adversarial collaborator is one of the answers …
Can We Make Our Robot Play Soccer? Influence Of Collaborating With Preservice Teachers And Fifth Graders On Undergraduate Engineering Students' Learning During A Robotic Design Process (Work In Progress), Krishnanand Kaipa, Jennifer Kidd, Julia Noginova, Francisco Cima, Stacie Ringleb, Orlando Ayala, Pilar Pazos, Kristie Gutierrez, Min Jung Lee
Can We Make Our Robot Play Soccer? Influence Of Collaborating With Preservice Teachers And Fifth Graders On Undergraduate Engineering Students' Learning During A Robotic Design Process (Work In Progress), Krishnanand Kaipa, Jennifer Kidd, Julia Noginova, Francisco Cima, Stacie Ringleb, Orlando Ayala, Pilar Pazos, Kristie Gutierrez, Min Jung Lee
Mechanical & Aerospace Engineering Faculty Publications
This work-in-progress paper describes engineering students’ experiences in an NSF-funded project that partnered undergraduate engineering students with pre-service teachers to plan and deliver robotics lessons to fifth graders at a local school. This project aims to address an apparent gap between what is taught in academia and industry’s expectations of engineers to integrate perspectives from outside their field to solve modern societal problems requiring a multidisciplinary approach. Working in small teams over Zoom, participating engineering, education, and fifth grade students designed, built, and coded bio-inspired COVID companion robots. The goal for the engineering students was to build new interprofessional skills, …
Supporting Transportation System Management And Operations Using Internet Of Things Technology, Hong Yang, Yuzhong Shen, Mecit Cetin, Zhenyu Wang
Supporting Transportation System Management And Operations Using Internet Of Things Technology, Hong Yang, Yuzhong Shen, Mecit Cetin, Zhenyu Wang
Computational Modeling & Simulation Engineering Faculty Publications
Low power wide-area network (LPWAN) technology aims to provide long range and low power wireless communication. It can serve as an alternative technology for data transmissions in many application scenarios (e.g., parking monitoring and remote flood sensing). In order to explore its feasibility in transportation systems, this project conducted a review of relevant literature to understand the current status of LPWAN applications. An online survey that targeted professionals concerned with transportation was also developed to elicit input about their experiences in using LPWAN technology for their projects. The literature review and survey results showed that LPWAN’s application in the U.S. …
Wg2An: Synthetic Wound Image Generation Using Generative Adversarial Network, Salih Sarp, Murat Kuzlu, Emmanuel Wilson, Ozgur Guler
Wg2An: Synthetic Wound Image Generation Using Generative Adversarial Network, Salih Sarp, Murat Kuzlu, Emmanuel Wilson, Ozgur Guler
Engineering Technology Faculty Publications
In part due to its ability to mimic any data distribution, Generative Adversarial Network (GAN) algorithms have been successfully applied to many applications, such as data augmentation, text-to-image translation, image-to-image translation, and image inpainting. Learning from data without crafting loss functions for each application provides broader applicability of the GAN algorithm. Medical image synthesis is also another field that the GAN algorithm has great potential to assist clinician training. This paper proposes a synthetic wound image generation model based on GAN architecture to increase the quality of clinical training. The proposed model is trained on chronic wound datasets with various …
Role Of Artificial Intelligence In The Internet Of Things (Iot) Cybersecurity, Murat Kuzlu, Corinne Fair, Ozgur Guler
Role Of Artificial Intelligence In The Internet Of Things (Iot) Cybersecurity, Murat Kuzlu, Corinne Fair, Ozgur Guler
Engineering Technology Faculty Publications
In recent years, the use of the Internet of Things (IoT) has increased exponentially, and cybersecurity concerns have increased along with it. On the cutting edge of cybersecurity is Artificial Intelligence (AI), which is used for the development of complex algorithms to protect networks and systems, including IoT systems. However, cyber-attackers have figured out how to exploit AI and have even begun to use adversarial AI in order to carry out cybersecurity attacks. This review paper compiles information from several other surveys and research papers regarding IoT, AI, and attacks with and against AI and explores the relationship between these …
Modeling The Effects Of Religious Belief And Affiliation On Prosociality, Luke Galen, Ross Gore, F. Leron Shults
Modeling The Effects Of Religious Belief And Affiliation On Prosociality, Luke Galen, Ross Gore, F. Leron Shults
VMASC Publications
To what extent do supernatural beliefs, group affiliation, and social interaction produce values and behaviors that benefit others, i.e., prosociality? Addressing this question involves multiple variables interacting within complex social networks that shape and constrain the beliefs and behaviors of individuals. We examine the relationships among some of these factors utilizing data from the World Values Survey to inform the construction of an Agent-Based Model. The latter was able to identify the conditions under which - and the mechanisms by which - the prosociality of simulated agents was increased or decreased within an "artificial society" designed to reflect real world …
Vind: A Blockchain-Enabled Supply Chain Provenance Framework For Energy Delivery Systems, Eranga Bandara, Sachin Shetty, Deepak Tosh, Xueping Liang
Vind: A Blockchain-Enabled Supply Chain Provenance Framework For Energy Delivery Systems, Eranga Bandara, Sachin Shetty, Deepak Tosh, Xueping Liang
VMASC Publications
Enterprise-level energy delivery systems (EDSs) depend on different software or hardware vendors to achieve operational efficiency. Critical components of these systems are typically manufactured and integrated by overseas suppliers, which expands the attack surface to adversaries with additional opportunities to infiltrate into EDSs. Due to this reason, the risk management of the EDS supply chain is crucial to ensure that we are knowledgeable about the vulnerabilities in software and hardware components that comprise any critical part, quantifiable risk metrics to assess the severity and exploitability of the attack, and provide remediation solutions that can influence a prioritized mitigation plan. There …