Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Singapore Management University (27)
- Old Dominion University (13)
- Fordham University (12)
- Western University (12)
- University of Nebraska - Lincoln (11)
-
- University of Louisville (4)
- Embry-Riddle Aeronautical University (3)
- Florida International University (3)
- Loyola University Chicago (3)
- Edith Cowan University (2)
- Technological University Dublin (2)
- University of Connecticut (2)
- University of Nevada, Las Vegas (2)
- University of Pennsylvania Carey Law School (2)
- Belmont University (1)
- Bryn Mawr College (1)
- Montclair State University (1)
- Munster Technological University (1)
- Portland State University (1)
- San Jose State University (1)
- Sheridan College (1)
- Southwestern Oklahoma State University (1)
- Tennessee State University (1)
- Texas A&M University-Commerce (1)
- University at Albany, State University of New York (1)
- University of Arkansas, Fayetteville (1)
- University of Dayton (1)
- University of Missouri, St. Louis (1)
- University of New Mexico (1)
- University of South Carolina (1)
- Keyword
-
- Robotics (14)
- Artificial intelligence (12)
- Deep learning (9)
- Machine learning (6)
- Behavior-Based (5)
-
- Formal Verification (5)
- Validation (5)
- Deep Learning (4)
- Simulation (4)
- Computer Vision (3)
- IoT (3)
- Scheduling (3)
- Unmanned Aerial Vehicle (3)
- AI (2)
- Administrative law (2)
- Autonomous systems (2)
- Bias (2)
- Big data (2)
- Chatbots (2)
- Classification (2)
- Computer science education (2)
- Computer vision (2)
- Consistency (2)
- Convolutional neural networks (2)
- Digital government (2)
- E-government (2)
- Explainability (2)
- Fuzzy logic (2)
- Gated Recurrent Units (2)
- Internet of Things (2)
- Publication Year
- Publication
-
- Research Collection School Of Computing and Information Systems (24)
- Faculty Publications (13)
- Electrical and Computer Engineering Publications (12)
- Department of Computer Science and Engineering: Dissertations, Theses, and Student Research (7)
- Electrical & Computer Engineering Faculty Publications (4)
-
- Faculty Scholarship (4)
- Publications (4)
- Computer Science: Faculty Publications and Other Works (3)
- Engineering Technology Faculty Publications (3)
- FIU Electronic Theses and Dissertations (3)
- All Faculty Scholarship (2)
- Engineering Management & Systems Engineering Faculty Publications (2)
- Honors Scholar Theses (2)
- MITB Thought Leadership Series (2)
- Research outputs 2014 to 2021 (2)
- Asian Management Insights (1)
- Belmont University Research Symposium (BURS) (1)
- Biological Systems Engineering: Papers and Publications (1)
- Branch Mathematics and Statistics Faculty and Staff Publications (1)
- Computational Modeling & Simulation Engineering Faculty Publications (1)
- Computer Science Faculty Research (1)
- Computer Science Faculty Research and Scholarship (1)
- Computer Science Faculty Works (1)
- Conference Papers (1)
- Content presented at the MAICS conference (1)
- Copyright, Fair Use, Scholarly Communication, etc. (1)
- Department of Computer Science Faculty Scholarship and Creative Works (1)
- Department of Construction Engineering and Management: Faculty Publications (1)
- Dept. of Marketing & International Business Conference Material (1)
- Dissertations (1)
Articles 1 - 30 of 116
Full-Text Articles in Computer Engineering
Examining The Externalities Of Highway Capacity Expansions In California: An Analysis Of Land Use And Land Cover (Lulc) Using Remote Sensing Technology, Serena E. Alexander, Bo Yang, Owen Hussey, Derek Hicks
Examining The Externalities Of Highway Capacity Expansions In California: An Analysis Of Land Use And Land Cover (Lulc) Using Remote Sensing Technology, Serena E. Alexander, Bo Yang, Owen Hussey, Derek Hicks
Mineta Transportation Institute Publications
There are over 590,000 bridges dispersed across the roadway network that stretches across the United States alone. Each bridge with a length of 20 feet or greater must be inspected at least once every 24 months, according to the Federal Highway Act (FHWA) of 1968. This research developed an artificial intelligence (AI)-based framework for bridge and road inspection using drones with multiple sensors collecting capabilities. It is not sufficient to conduct inspections of bridges and roads using cameras alone, so the research team utilized an infrared (IR) camera along with a high-resolution optical camera. In many instances, the IR camera …
Executive Order On The Safe, Secure, And Trustworthy Development And Use Of Artificial Intelligence, Joseph R. Biden
Executive Order On The Safe, Secure, And Trustworthy Development And Use Of Artificial Intelligence, Joseph R. Biden
Copyright, Fair Use, Scholarly Communication, etc.
Section 1. Purpose. Artificial intelligence (AI) holds extraordinary potential for both promise and peril. Responsible AI use has the potential to help solve urgent challenges while making our world more prosperous, productive, innovative, and secure. At the same time, irresponsible use could exacerbate societal harms such as fraud, discrimination, bias, and disinformation; displace and disempower workers; stifle competition; and pose risks to national security. Harnessing AI for good and realizing its myriad benefits requires mitigating its substantial risks. This endeavor demands a society-wide effort that includes government, the private sector, academia, and civil society.
My Administration places the highest urgency …
Objectfusion: Multi-Modal 3d Object Detection With Object-Centric Fusion, Q. Cai, Y. Pan, T. Yao, Chong-Wah Ngo, T. Mei
Objectfusion: Multi-Modal 3d Object Detection With Object-Centric Fusion, Q. Cai, Y. Pan, T. Yao, Chong-Wah Ngo, T. Mei
Research Collection School Of Computing and Information Systems
Recent progress on multi-modal 3D object detection has featured BEV (Bird-Eye-View) based fusion, which effectively unifies both LiDAR point clouds and camera images in a shared BEV space. Nevertheless, it is not trivial to perform camera-to-BEV transformation due to the inherently ambiguous depth estimation of each pixel, resulting in spatial misalignment between these two multi-modal features. Moreover, such transformation also inevitably leads to projection distortion of camera image features in BEV space. In this paper, we propose a novel Object-centric Fusion (ObjectFusion) paradigm, which completely gets rid of camera-to-BEV transformation during fusion to align object-centric features across different modalities for …
Poly-Gan: Regularizing Polygons With Generative Adversarial Networks, Lasith Niroshan, James Carswell
Poly-Gan: Regularizing Polygons With Generative Adversarial Networks, Lasith Niroshan, James Carswell
Conference Papers
Regularizing polygons involves simplifying irregular and noisy shapes of built environment objects (e.g. buildings) to ensure that they are accurately represented using a minimum number of vertices. It is a vital processing step when creating/transmitting online digital maps so that they occupy minimal storage space and bandwidth. This paper presents a data-driven and Deep Learning (DL) based approach for regularizing OpenStreetMap building polygon edges. The study introduces a building footprint regularization technique (Poly-GAN) that utilises a Generative Adversarial Network model trained on irregular building footprints and OSM vector data. The proposed method is particularly relevant for map features …
Investigating The Use Of Recurrent Neural Networks In Modeling Guitar Distortion Effects, Caleb Koch, Scott Hawley, Andrew Fyfe
Investigating The Use Of Recurrent Neural Networks In Modeling Guitar Distortion Effects, Caleb Koch, Scott Hawley, Andrew Fyfe
Belmont University Research Symposium (BURS)
Guitar players have been modifying their guitar tone with audio effects ever since the mid-20th century. Traditionally, these effects have been achieved by passing a guitar signal through a series of electronic circuits which modify the signal to produce the desired audio effect. With advances in computer technology, audio “plugins” have been created to produce audio effects digitally through programming algorithms. More recently, machine learning researchers have been exploring the use of neural networks to replicate and produce audio effects initially created by analog and digital effects units. Recurrent Neural Networks have proven to be exceptional at modeling audio effects …
Chatgpt As Metamorphosis Designer For The Future Of Artificial Intelligence (Ai): A Conceptual Investigation, Amarjit Kumar Singh (Library Assistant), Dr. Pankaj Mathur (Deputy Librarian)
Chatgpt As Metamorphosis Designer For The Future Of Artificial Intelligence (Ai): A Conceptual Investigation, Amarjit Kumar Singh (Library Assistant), Dr. Pankaj Mathur (Deputy Librarian)
Library Philosophy and Practice (e-journal)
Abstract
Purpose: The purpose of this research paper is to explore ChatGPT’s potential as an innovative designer tool for the future development of artificial intelligence. Specifically, this conceptual investigation aims to analyze ChatGPT’s capabilities as a tool for designing and developing near about human intelligent systems for futuristic used and developed in the field of Artificial Intelligence (AI). Also with the helps of this paper, researchers are analyzed the strengths and weaknesses of ChatGPT as a tool, and identify possible areas for improvement in its development and implementation. This investigation focused on the various features and functions of ChatGPT that …
Drone Detection Using Yolov5, Burchan Aydin, Subroto Singha
Drone Detection Using Yolov5, Burchan Aydin, Subroto Singha
Faculty Publications
The rapidly increasing number of drones in the national airspace, including those for recreational and commercial applications, has raised concerns regarding misuse. Autonomous drone detection systems offer a probable solution to overcoming the issue of potential drone misuse, such as drug smuggling, violating people’s privacy, etc. Detecting drones can be difficult, due to similar objects in the sky, such as airplanes and birds. In addition, automated drone detection systems need to be trained with ample amounts of data to provide high accuracy. Real-time detection is also necessary, but this requires highly configured devices such as a graphical processing unit (GPU). …
Scheduling Electric Vehicle Charging For Grid Load Balancing, Zhixin Han, Katarina Grolinger, Miriam Capretz, Syed Mir
Scheduling Electric Vehicle Charging For Grid Load Balancing, Zhixin Han, Katarina Grolinger, Miriam Capretz, Syed Mir
Electrical and Computer Engineering Publications
In recent years, electric vehicles (EVs) have been widely adopted because of their environmental benefits. However, the increasing volume of EVs poses capacity issues for grid operators as simultaneously charging many EVs may result in grid instabilities. Scheduling EV charging for grid load balancing has a potential to prevent load peaks caused by simultaneous EV charging and contribute to balance of supply and demand. This paper proposes a user-preference-based scheduling approach to minimize costs for the user while balancing grid loads. The EV owners benefit by charging when the electricity cost is lower, but still within the user-defined preferred charging …
An Optimized And Scalable Blockchain-Based Distributed Learning Platform For Consumer Iot, Zhaocheng Wang, Xueying Liu, Xinming Shao, Abdullah Alghamdi, Md. Shirajum Munir, Sujit Biswas
An Optimized And Scalable Blockchain-Based Distributed Learning Platform For Consumer Iot, Zhaocheng Wang, Xueying Liu, Xinming Shao, Abdullah Alghamdi, Md. Shirajum Munir, Sujit Biswas
School of Cybersecurity Faculty Publications
Consumer Internet of Things (CIoT) manufacturers seek customer feedback to enhance their products and services, creating a smart ecosystem, like a smart home. Due to security and privacy concerns, blockchain-based federated learning (BCFL) ecosystems can let CIoT manufacturers update their machine learning (ML) models using end-user data. Federated learning (FL) uses privacy-preserving ML techniques to forecast customers' needs and consumption habits, and blockchain replaces the centralized aggregator to safeguard the ecosystem. However, blockchain technology (BCT) struggles with scalability and quick ledger expansion. In BCFL, local model generation and secure aggregation are other issues. This research introduces a novel architecture, emphasizing …
Security Of Internet Of Things (Iot) Using Federated Learning And Deep Learning — Recent Advancements, Issues And Prospects, Vinay Gugueoth, Sunitha Safavat, Sachin Shetty
Security Of Internet Of Things (Iot) Using Federated Learning And Deep Learning — Recent Advancements, Issues And Prospects, Vinay Gugueoth, Sunitha Safavat, Sachin Shetty
Electrical & Computer Engineering Faculty Publications
There is a great demand for an efficient security framework which can secure IoT systems from potential adversarial attacks. However, it is challenging to design a suitable security model for IoT considering the dynamic and distributed nature of IoT. This motivates the researchers to focus more on investigating the role of machine learning (ML) in the designing of security models. A brief analysis of different ML algorithms for IoT security is discussed along with the advantages and limitations of ML algorithms. Existing studies state that ML algorithms suffer from the problem of high computational overhead and risk of privacy leakage. …
A Structured Narrative Prompt For Prompting Narratives From Large Language Models: Sentiment Assessment Of Chatgpt-Generated Narratives And Real Tweets, Christopher J. Lynch, Erik J. Jensen, Virginia Zamponi, Kevin O'Brien, Erika Frydenlund, Ross Gore
A Structured Narrative Prompt For Prompting Narratives From Large Language Models: Sentiment Assessment Of Chatgpt-Generated Narratives And Real Tweets, Christopher J. Lynch, Erik J. Jensen, Virginia Zamponi, Kevin O'Brien, Erika Frydenlund, Ross Gore
VMASC Publications
Large language models (LLMs) excel in providing natural language responses that sound authoritative, reflect knowledge of the context area, and can present from a range of varied perspectives. Agent-based models and simulations consist of simulated agents that interact within a simulated environment to explore societal, social, and ethical, among other, problems. Simulated agents generate large volumes of data and discerning useful and relevant content is an onerous task. LLMs can help in communicating agents' perspectives on key life events by providing natural language narratives. However, these narratives should be factual, transparent, and reproducible. Therefore, we present a structured narrative prompt …
Agglomerative Hierarchical Clustering With Dynamic Time Warping For Household Load Curve Clustering, Fadi Almahamid, Katarina Grolinger
Agglomerative Hierarchical Clustering With Dynamic Time Warping For Household Load Curve Clustering, Fadi Almahamid, Katarina Grolinger
Electrical and Computer Engineering Publications
Energy companies often implement various demand response (DR) programs to better match electricity demand and supply by offering the consumers incentives to reduce their demand during critical periods. Classifying clients according to their consumption patterns enables targeting specific groups of consumers for DR. Traditional clustering algorithms use standard distance measurement to find the distance between two points. The results produced by clustering algorithms such as K-means, K-medoids, and Gaussian Mixture Models depend on the clustering parameters or initial clusters. In contrast, our methodology uses a shape-based approach that combines Agglomerative Hierarchical Clustering (AHC) with Dynamic Time Warping (DTW) to classify …
Tutorial: Neuro-Symbolic Ai For Mental Healthcare, Kaushik Roy, Usha Lokala, Manas Gaur, Amit Sheth
Tutorial: Neuro-Symbolic Ai For Mental Healthcare, Kaushik Roy, Usha Lokala, Manas Gaur, Amit Sheth
Publications
Artificial Intelligence (AI) systems for mental healthcare (MHCare) have been ever-growing after realizing the importance of early interventions for patients with chronic mental health (MH) conditions. Social media (SocMedia) emerged as the go-to platform for supporting patients seeking MHCare. The creation of peer-support groups without social stigma has resulted in patients transitioning from clinical settings to SocMedia supported interactions for quick help. Researchers started exploring SocMedia content in search of cues that showcase correlation or causation between different MH conditions to design better interventional strategies. User-level Classification-based AI systems were designed to leverage diverse SocMedia data from various MH conditions, …
A Monte Carlo Framework For Incremental Improvement Of Simulation Fidelity, Damian Lyons, James Finocchiaro, Misha Novitsky, Chris Korpela
A Monte Carlo Framework For Incremental Improvement Of Simulation Fidelity, Damian Lyons, James Finocchiaro, Misha Novitsky, Chris Korpela
Faculty Publications
Robot software developed in simulation often does not be- have as expected when deployed because the simulation does not sufficiently represent reality - this is sometimes called the `reality gap' problem. We propose a novel algorithm to address the reality gap by injecting real-world experience into the simulation. It is assumed that the robot program (control policy) is developed using simulation, but subsequently deployed on a real system, and that the program includes a performance objective monitor procedure with scalar output. The proposed approach collects simulation and real world observations and builds conditional probability functions. These are used to generate …
Benchmarking Library Recognition In Tweets, Ting Zhang, Divya Prabha Chandrasekaran, Ferdian Thung, David Lo
Benchmarking Library Recognition In Tweets, Ting Zhang, Divya Prabha Chandrasekaran, Ferdian Thung, David Lo
Research Collection School Of Computing and Information Systems
Software developers often use social media (such as Twitter) to shareprogramming knowledge such as new tools, sample code snippets,and tips on programming. One of the topics they talk about is thesoftware library. The tweets may contain useful information abouta library. A good understanding of this information, e.g., on thedeveloper’s views regarding a library can be beneficial to weigh thepros and cons of using the library as well as the general sentimentstowards the library. However, it is not trivial to recognize whethera word actually refers to a library or other meanings. For example,a tweet mentioning the word “pandas" may refer to …
Visual Homing For Robot Teams: Do You See What I See?, Damian Lyons, Noah Petzinger
Visual Homing For Robot Teams: Do You See What I See?, Damian Lyons, Noah Petzinger
Faculty Publications
Visual homing is a lightweight approach to visual navigation which does not require GPS. It is very attractive for robot platforms with a low computational capacity. However, a limitation is that the stored home location must be initially within the field of view of the robot. Motivated by the increasing ubiquity of camera information we propose to address this line-of-sight limitation by leveraging camera information from other robots and fixed cameras. To home to a location that is not initially within view, a robot must be able to identify a common visual landmark with another robot that can be used …
Improving Feature Generalizability With Multitask Learning In Class Incremental Learning, Dong Ma, Chi Ian Tang, Cecilia Mascolo
Improving Feature Generalizability With Multitask Learning In Class Incremental Learning, Dong Ma, Chi Ian Tang, Cecilia Mascolo
Research Collection School Of Computing and Information Systems
Many deep learning applications, like keyword spotting [1], [2], require the incorporation of new concepts (classes) over time, referred to as Class Incremental Learning (CIL). The major challenge in CIL is catastrophic forgetting, i.e., preserving as much of the old knowledge as possible while learning new tasks. Various techniques, such as regularization, knowledge distillation, and the use of exemplars, have been proposed to resolve this issue. However, prior works primarily focus on the incremental learning step, while ignoring the optimization during the base model training. We hypothesise that a more transferable and generalizable feature representation from the base model would …
Bfv-Based Homomorphic Encryption For Privacy-Preserving Cnn Models, Febrianti Wibawa, Ferhat Ozgur Catak, Salih Sarp, Murat Kuzlu
Bfv-Based Homomorphic Encryption For Privacy-Preserving Cnn Models, Febrianti Wibawa, Ferhat Ozgur Catak, Salih Sarp, Murat Kuzlu
Engineering Technology Faculty Publications
Medical data is frequently quite sensitive in terms of data privacy and security. Federated learning has been used to increase the privacy and security of medical data, which is a sort of machine learning technique. The training data is disseminated across numerous machines in federated learning, and the learning process is collaborative. There are numerous privacy attacks on deep learning (DL) models that attackers can use to obtain sensitive information. As a result, the DL model should be safeguarded from adversarial attacks, particularly in medical data applications. Homomorphic encryption-based model security from the adversarial collaborator is one of the answers …
Reinforcement Learning Algorithms: An Overview And Classification, Fadi Almahamid, Katarina Grolinger
Reinforcement Learning Algorithms: An Overview And Classification, Fadi Almahamid, Katarina Grolinger
Electrical and Computer Engineering Publications
The desire to make applications and machines more intelligent and the aspiration to enable their operation without human interaction have been driving innovations in neural networks, deep learning, and other machine learning techniques. Although reinforcement learning has been primarily used in video games, recent advancements and the development of diverse and powerful reinforcement algorithms have enabled the reinforcement learning community to move from playing video games to solving complex real-life problems in autonomous systems such as self-driving cars, delivery drones, and automated robotics. Understanding the environment of an application and the algorithms’ limitations plays a vital role in selecting the …
Automated Taxi Queue Management At High-Demand Venues, Mengyu Ji, Shih-Fen Cheng
Automated Taxi Queue Management At High-Demand Venues, Mengyu Ji, Shih-Fen Cheng
Research Collection School Of Computing and Information Systems
In this paper, we seek to identify an effective management policy that could reduce supply-demand gaps at taxi queues serving high-density locations where demand surges frequently happen. Unlike current industry practice, which relies on broadcasting to attract taxis to come and serve the queue, we propose more proactive and adaptive approaches to handle demand surges. Our design objective is to reduce the cumulative supply-demand gaps as much as we could by sending notifications to individual taxis. To address this problem, we first propose a highly effective passenger demand prediction system that is based on the real-time flight arrival information. By …
A Lagrangian Column Generation Approach For The Probabilistic Crowdsourced Logistics Planning, Chung-Kyun Han, Shih-Fen Cheng
A Lagrangian Column Generation Approach For The Probabilistic Crowdsourced Logistics Planning, Chung-Kyun Han, Shih-Fen Cheng
Research Collection School Of Computing and Information Systems
In recent years we have increasingly seen the movement for the retail industry to move their operations online. Along the process, it has created brand new patterns for the fulfillment service, and the logistics service providers serving these retailers have no choice but to adapt. The most challenging issues faced by all logistics service providers are the highly fluctuating demands and the shortening response times. All these challenges imply that maintaining a fixed fleet will either be too costly or insufficient. One potential solution is to tap into the crowdsourced workforce. However, existing industry practices of relying on human planners …
When Program Analysis Meets Bytecode Search: Targeted And Efficient Inter-Procedural Analysis Of Modern Android Apps In Backdroid, Daoyuan Wu, Debin Gao, Robert H. Deng, Rocky Chang
When Program Analysis Meets Bytecode Search: Targeted And Efficient Inter-Procedural Analysis Of Modern Android Apps In Backdroid, Daoyuan Wu, Debin Gao, Robert H. Deng, Rocky Chang
Research Collection School Of Computing and Information Systems
Widely-used Android static program analysis tools,e.g., Amandroid and FlowDroid, perform the whole-app interprocedural analysis that is comprehensive but fundamentallydifficult to handle modern (large) apps. The average app size hasincreased three to four times over five years. In this paper, weexplore a new paradigm of targeted inter-procedural analysis thatcan skip irrelevant code and focus only on the flows of securitysensitive sink APIs. To this end, we propose a technique calledon-the-fly bytecode search, which searches the disassembled appbytecode text just in time when a caller needs to be located. In thisway, it guides targeted (and backward) inter-procedural analysisstep by step until reaching …
Lecture 00: Opening Remarks: 46th Spring Lecture Series, Tulin Kaman
Lecture 00: Opening Remarks: 46th Spring Lecture Series, Tulin Kaman
Mathematical Sciences Spring Lecture Series
Opening remarks for the 46th Annual Mathematical Sciences Spring Lecture Series at the University of Arkansas, Fayetteville.
Wg2An: Synthetic Wound Image Generation Using Generative Adversarial Network, Salih Sarp, Murat Kuzlu, Emmanuel Wilson, Ozgur Guler
Wg2An: Synthetic Wound Image Generation Using Generative Adversarial Network, Salih Sarp, Murat Kuzlu, Emmanuel Wilson, Ozgur Guler
Engineering Technology Faculty Publications
In part due to its ability to mimic any data distribution, Generative Adversarial Network (GAN) algorithms have been successfully applied to many applications, such as data augmentation, text-to-image translation, image-to-image translation, and image inpainting. Learning from data without crafting loss functions for each application provides broader applicability of the GAN algorithm. Medical image synthesis is also another field that the GAN algorithm has great potential to assist clinician training. This paper proposes a synthetic wound image generation model based on GAN architecture to increase the quality of clinical training. The proposed model is trained on chronic wound datasets with various …
Role Of Artificial Intelligence In The Internet Of Things (Iot) Cybersecurity, Murat Kuzlu, Corinne Fair, Ozgur Guler
Role Of Artificial Intelligence In The Internet Of Things (Iot) Cybersecurity, Murat Kuzlu, Corinne Fair, Ozgur Guler
Engineering Technology Faculty Publications
In recent years, the use of the Internet of Things (IoT) has increased exponentially, and cybersecurity concerns have increased along with it. On the cutting edge of cybersecurity is Artificial Intelligence (AI), which is used for the development of complex algorithms to protect networks and systems, including IoT systems. However, cyber-attackers have figured out how to exploit AI and have even begun to use adversarial AI in order to carry out cybersecurity attacks. This review paper compiles information from several other surveys and research papers regarding IoT, AI, and attacks with and against AI and explores the relationship between these …
Ship Deck Segmentation In Engineering Document Using Generative Adversarial Networks, Mohammad Shahab Uddin, Raphael Pamie-George, Daron Wilkins, Andres Sousa Poza, Mustafa Canan, Samuel Kovacic, Jiang Li
Ship Deck Segmentation In Engineering Document Using Generative Adversarial Networks, Mohammad Shahab Uddin, Raphael Pamie-George, Daron Wilkins, Andres Sousa Poza, Mustafa Canan, Samuel Kovacic, Jiang Li
Engineering Management & Systems Engineering Faculty Publications
Generative adversarial networks (GANs) have become very popular in recent years. GANs have proved to be successful in different computer vision tasks including image-translation, image super-resolution etc. In this paper, we have used GAN models for ship deck segmentation. We have used 2D scanned raster images of ship decks provided by US Navy Military Sealift Command (MSC) to extract necessary information including ship walls, objects etc. Our segmentation results will be helpful to get vector and 3D image of a ship that can be later used for maintenance of the ship. We applied the trained models to engineering documents provided …
Human Characteristics Impact On Strategic Decisions In A Human-In-The-Loop Simulation, Andrew J. Collins, Shieda Etemadidavan
Human Characteristics Impact On Strategic Decisions In A Human-In-The-Loop Simulation, Andrew J. Collins, Shieda Etemadidavan
Engineering Management & Systems Engineering Faculty Publications
In this paper, a hybrid simulation model of the agent-based model and cooperative game theory is used in a human-in-the-loop experiment to study the effect of human demographic characteristics in situations where they make strategic coalition decisions. Agent-based modeling (ABM) is a computational method that can reveal emergent phenomenon from interactions between agents in an environment. It has been suggested in organizational psychology that ABM could model human behavior more holistically than other modeling methods. Cooperative game theory is a method that models strategic coalitions formation. Three characteristics (age, education, and gender) were considered in the experiment to see if …
Converting Optical Videos To Infrared Videos Using Attention Gan And Its Impact On Target Detection And Classification Performance, Mohammad Shahab Uddin, Reshad Hoque, Kazi Aminul Islam, Chiman Kwan, David Gribben, Jiang Li
Converting Optical Videos To Infrared Videos Using Attention Gan And Its Impact On Target Detection And Classification Performance, Mohammad Shahab Uddin, Reshad Hoque, Kazi Aminul Islam, Chiman Kwan, David Gribben, Jiang Li
Electrical & Computer Engineering Faculty Publications
To apply powerful deep-learning-based algorithms for object detection and classification in infrared videos, it is necessary to have more training data in order to build high-performance models. However, in many surveillance applications, one can have a lot more optical videos than infrared videos. This lack of IR video datasets can be mitigated if optical-to-infrared video conversion is possible. In this paper, we present a new approach for converting optical videos to infrared videos using deep learning. The basic idea is to focus on target areas using attention generative adversarial network (attention GAN), which will preserve the fidelity of target areas. …
Administrative Law In The Automated State, Cary Coglianese
Administrative Law In The Automated State, Cary Coglianese
All Faculty Scholarship
In the future, administrative agencies will rely increasingly on digital automation powered by machine learning algorithms. Can U.S. administrative law accommodate such a future? Not only might a highly automated state readily meet longstanding administrative law principles, but the responsible use of machine learning algorithms might perform even better than the status quo in terms of fulfilling administrative law’s core values of expert decision-making and democratic accountability. Algorithmic governance clearly promises more accurate, data-driven decisions. Moreover, due to their mathematical properties, algorithms might well prove to be more faithful agents of democratic institutions. Yet even if an automated state were …
Development Of A Real Time Human Face Recognition Software System, Askar Boranbayev, Seilkhan Boranbayev, Mukhamedzhan Amirtaev, Malik Baimukhamedov, Askar Nurbekov
Development Of A Real Time Human Face Recognition Software System, Askar Boranbayev, Seilkhan Boranbayev, Mukhamedzhan Amirtaev, Malik Baimukhamedov, Askar Nurbekov
Physics and Astronomy Faculty Publications and Presentations
In this study, a system for real-time face recognition was built using the Open Face tools of the Open CV library. The article describes the methodology for creating the system and the results of its testing. The Open CV library has various modules that perform many tasks. In this paper, Open CV modules were used for face recognition in images and face identification in real time. In addition, the HOG method was used to detect a person by the front of his face. After performing the HOG method, 128 face measurements were obtained using the image encoding method. A convolutional …