Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Electrical and Computer Engineering (28)
- Computer Sciences (18)
- Physical Sciences and Mathematics (18)
- Other Computer Engineering (17)
- Social and Behavioral Sciences (12)
-
- Digital Communications and Networking (9)
- Library and Information Science (9)
- Medicine and Health Sciences (8)
- Artificial Intelligence and Robotics (6)
- Computer and Systems Architecture (6)
- Data Storage Systems (5)
- Life Sciences (5)
- Other Electrical and Computer Engineering (5)
- Robotics (5)
- Biomedical Engineering and Bioengineering (4)
- Software Engineering (4)
- Arts and Humanities (3)
- Computational Engineering (3)
- Digital Humanities (3)
- Medical Specialties (3)
- Numerical Analysis and Scientific Computing (3)
- Analytical, Diagnostic and Therapeutic Techniques and Equipment (2)
- Automotive Engineering (2)
- Biomedical (2)
- Biomedical Devices and Instrumentation (2)
- Cardiovascular Diseases (2)
- Communication (2)
- Diseases (2)
- Institution
-
- Technological University Dublin (25)
- University of Nebraska - Lincoln (18)
- Portland State University (8)
- Old Dominion University (6)
- University of South Carolina (6)
-
- Florida International University (5)
- Singapore Management University (5)
- Marquette University (4)
- Chapman University (3)
- City University of New York (CUNY) (2)
- University of Connecticut (2)
- Western University (2)
- Aga Khan University (1)
- Johnson & Wales University (1)
- Manipal Academy of Higher Education (1)
- Murray State University (1)
- Nova Southeastern University (1)
- Purdue University (1)
- Santa Clara University (1)
- Sheridan College (1)
- Southwestern Oklahoma State University (1)
- University of Georgia School of Law (1)
- University of Nevada, Las Vegas (1)
- University of Pennsylvania Carey Law School (1)
- West Virginia University (1)
- Western Kentucky University (1)
- Zayed University (1)
- Publication Year
- Publication
-
- Articles (9)
- Dissertations (8)
- Library Philosophy and Practice (e-journal) (7)
- Publications (6)
- Research Collection School Of Computing and Information Systems (5)
-
- Computer Science Faculty Publications and Presentations (4)
- Conference papers (4)
- Department of Computer Science and Engineering: Dissertations, Theses, and Student Research (4)
- Electrical & Computer Engineering Faculty Publications (4)
- Electrical and Computer Engineering Faculty Research and Publications (4)
- FIU Electronic Theses and Dissertations (4)
- Department of Electrical and Computer Engineering: Dissertations, Theses, and Student Research (3)
- Department of Electrical and Computer Engineering: Faculty Publications (3)
- Engineering Faculty Articles and Research (3)
- Undergraduate Research & Mentoring Program (3)
- Conference Papers (2)
- Electrical and Computer Engineering Publications (2)
- Honors Scholar Theses (2)
- Other resources (2)
- Publications and Research (2)
- All Faculty Scholarship (1)
- All Works (1)
- Articles, Chapters and Online Publications (1)
- Brain and Mind Institute (1)
- CCE Faculty Articles (1)
- Computational Modeling & Simulation Engineering Faculty Publications (1)
- Computer Science and Engineering (1)
- Department of Agricultural and Biological Systems Engineering: Dissertations, Theses, and Student Research (1)
- Department of Electrical and Computer Engineering Faculty Publications (1)
- Electrical and Computer Engineering Faculty Publications and Presentations (1)
Articles 1 - 30 of 101
Full-Text Articles in Computer Engineering
Development Of A Machine Learning System For Irrigation Decision Support With Disparate Data Streams, Eric Wilkening
Development Of A Machine Learning System For Irrigation Decision Support With Disparate Data Streams, Eric Wilkening
Department of Agricultural and Biological Systems Engineering: Dissertations, Theses, and Student Research
In recent years, advancements in irrigation technologies have led to increased efficiency in irrigation applications, encompassing the adoption of practices that utilize data-driven irrigation scheduling and leveraging variable rate irrigation (VRI). These technological improvements have the potential to reduce water withdrawals and diversions from both groundwater and surface water sources. However, it is vital to recognize that improved application efficiency does not necessarily equate to increased water availability for future or downstream use. This is particularly crucial in the context of consumptive water use, which refers to water consumed and not returned to the local or sub-regional watershed, representing a …
Data Provenance Via Differential Auditing, Xin Mu, Ming Pang, Feida Zhu
Data Provenance Via Differential Auditing, Xin Mu, Ming Pang, Feida Zhu
Research Collection School Of Computing and Information Systems
With the rising awareness of data assets, data governance, which is to understand where data comes from, how it is collected, and how it is used, has been assuming evergrowing importance. One critical component of data governance gaining increasing attention is auditing machine learning models to determine if specific data has been used for training. Existing auditing techniques, like shadow auditing methods, have shown feasibility under specific conditions such as having access to label information and knowledge of training protocols. However, these conditions are often not met in most real-world applications. In this paper, we introduce a practical framework for …
Analysing Child Sexual Abuse Activities In The Dark Web Based On An Efficient Csam Detection Algorithm, Vuong Ngo, Christina Thorpe, Susan Mckeever
Analysing Child Sexual Abuse Activities In The Dark Web Based On An Efficient Csam Detection Algorithm, Vuong Ngo, Christina Thorpe, Susan Mckeever
Articles
Abstract: Child sexual abuse material (CSAM) activities are prevalent on the Dark Web to evade detection, posing a global challenge for law enforcement. Our objective is to analyze CSAM discussions in this concealed space using a Support Vector Machine model, achieving an accuracy of 87.6%. Across eight forums, approximately 28.4% of posts contained CSAM, with victim ages most commonly reported as 12, 14, 13, and 11 years old for YouTube, Skype, Instagram, and Facebook, respectively. Additionally, in forums discussing boys, the most frequently mentioned nationalities in CSAM posts were English, German, and American, accounting for 12%, 7.8%, and 6% of …
Use Of Mobile Technology To Identify Behavioral Mechanisms Linked To Mental Health Outcomes In Kenya: Protocol For Development And Validation Of A Predictive Model, Willie Njoroge, Rachel Maina, Frank Elena, Lukoye Atwoli, Anthony Ngugi, Srijan Sen, Stephen Wong, Linda Khakali, Andrew Aballa, James Orwa, Moses Nyongesa, Jasmit Shah, Amina Abubakar, Zul Merali
Use Of Mobile Technology To Identify Behavioral Mechanisms Linked To Mental Health Outcomes In Kenya: Protocol For Development And Validation Of A Predictive Model, Willie Njoroge, Rachel Maina, Frank Elena, Lukoye Atwoli, Anthony Ngugi, Srijan Sen, Stephen Wong, Linda Khakali, Andrew Aballa, James Orwa, Moses Nyongesa, Jasmit Shah, Amina Abubakar, Zul Merali
Brain and Mind Institute
Objective:This study proposes to identify and validate weighted sensor stream signatures that predict near-term risk of a major depressive episode and future mood among healthcare workers in Kenya.
Approach: The study will deploy a mobile application (app) platform and use novel data science analytic approaches (Artificial Intelligence and Machine Learning) to identifying predictors of mental health disorders among 500 randomly sampled healthcare workers from five healthcare facilities in Nairobi, Kenya.
Expectation: This study will lay the basis for creating agile and scalable systems for rapid diagnostics that could inform precise interventions for mitigating depression and ensure a healthy, resilient …
Using Machine Learning To Assist Auditory Processing Evaluation, Hasitha Wimalarathna, Sangamanatha Veeranna, Minh Vu Duong, Chris Allan Prof, Sumit K. Agrawal, Prudence Allen, Jagath Samarabandu, Hanif M. Ladak
Using Machine Learning To Assist Auditory Processing Evaluation, Hasitha Wimalarathna, Sangamanatha Veeranna, Minh Vu Duong, Chris Allan Prof, Sumit K. Agrawal, Prudence Allen, Jagath Samarabandu, Hanif M. Ladak
Electrical and Computer Engineering Publications
Introduction: Approximately 0.2–5% of school-age children complain of listening difficulties in the absence of hearing loss. These children are often referred to an audiologist for an auditory processing disorder (APD) assessment. Adequate experience and training is necessary to arrive at an accurate diagnosis due to the heterogeneity of the disorder.
Objectives: The main goal of the study was to determine if machine learning (ML) can be used to analyze data from the APD clinical test battery to accurately categorize children with suspected APD into clinical sub-groups, similar to expert labels.
Methods: The study retrospectively collected data from 134 children referred …
Assessment Of E-Senses Performance Through Machine Learning Models For Colombian Herbal Teas Classification, Jeniffer Katerine Carrillo, Cristhian Manuel Durán, Juan Martin Cáceres, Carlos Alberto Cuastumal, Jordana Ferreira, José Ramos, Brian Bahder, Martin Oates, Antonio Ruiz
Assessment Of E-Senses Performance Through Machine Learning Models For Colombian Herbal Teas Classification, Jeniffer Katerine Carrillo, Cristhian Manuel Durán, Juan Martin Cáceres, Carlos Alberto Cuastumal, Jordana Ferreira, José Ramos, Brian Bahder, Martin Oates, Antonio Ruiz
CCE Faculty Articles
This paper describes different E-Senses systems, such as Electronic Nose, Electronic Tongue, and Electronic Eyes, which were used to build several machine learning models and assess their performance in classifying a variety of Colombian herbal tea brands such as Albahaca, Frutos Verdes, Jaibel, Toronjil, and Toute. To do this, a set of Colombian herbal tea samples were previously acquired from the instruments and processed through multivariate data analysis techniques (principal component analysis and linear discriminant analysis) to feed the support vector machine, K-nearest neighbors, decision trees, naive Bayes, and random forests algorithms. The results of the E-Senses were validated using …
Cometrics: A New Software Tool For Behavior‑Analytic Clinicians And Machine Learning Researchers, Walker S. Arce, Seth G. Walker, Morgan L. Hurtz
Cometrics: A New Software Tool For Behavior‑Analytic Clinicians And Machine Learning Researchers, Walker S. Arce, Seth G. Walker, Morgan L. Hurtz
Department of Electrical and Computer Engineering: Faculty Publications
Cometrics is a Microsoft Windows compatible clinical tool for the collection and recording of frequency- and duration-based target behaviors, physiological signals, and video data. This software package is designed to record in-vivo observational and physiological data. In addition, we have included features that allow observers to capture video from real-time camera feeds and import saved video for retroactive data collection. By using Microsoft Excel-based spreadsheets, also called keystroke files, assessment and treatment sessions are exported into a single document using the click of a button. Integrated interobserver agreement metrics allow comparisons across primary and reliability observers, with the output exported …
Unobtrusive Data Collection In Clinical Settings For Advanced Patient Monitoring And Machine Learning, Walker Arce
Unobtrusive Data Collection In Clinical Settings For Advanced Patient Monitoring And Machine Learning, Walker Arce
Department of Electrical and Computer Engineering: Dissertations, Theses, and Student Research
When applying machine learning to clinical practice, a major hurdle that will be encountered is the lack of available data. While the data collected in clinical therapies is suitable for the types of analysis that are needed to measure and track clinical outcomes, it may not be suitable for other types of analysis. For instance, video data may have poor alignment with behavioral data, making it impossible to extract the videos frames that directly correlate with the observed behavior. Alternatively, clinicians may be exploring new data modalities, such as physiological signal collection, to research methods of improving clinical outcomes that …
Towards Machine Learning-Based Fpga Backend Flow: Challenges And Opportunities, Imran Taj, Umer Farooq
Towards Machine Learning-Based Fpga Backend Flow: Challenges And Opportunities, Imran Taj, Umer Farooq
All Works
Field-Programmable Gate Array (FPGA) is at the core of System on Chip (SoC) design across various Industry 5.0 digital systems—healthcare devices, farming equipment, autonomous vehicles and aerospace gear to name a few. Given that pre-silicon verification using Computer Aided Design (CAD) accounts for about 70% of the time and money spent on the design of modern digital systems, this paper summarizes the machine learning (ML)-oriented efforts in different FPGA CAD design steps. With the recent breakthrough of machine learning, FPGA CAD tasks—high-level synthesis (HLS), logic synthesis, placement and routing—are seeing a renewed interest in their respective decision-making steps. We focus …
Exploring Gender Bias In Semantic Representations For Occupational Classification In Nlp: Techniques And Mitigation Strategies, Joseph Michael O'Carroll
Exploring Gender Bias In Semantic Representations For Occupational Classification In Nlp: Techniques And Mitigation Strategies, Joseph Michael O'Carroll
Dissertations
Gender bias in Natural Language Processing (NLP) models is a non-trivial problem that can perpetuate and amplify existing societal biases. This thesis investigates gender bias in occupation classification and explores the effectiveness of different debiasing methods for language models to reduce the impact of bias in the model’s representations. The study employs a data-driven empirical methodology focusing heavily on experimentation and result investigation. The study uses five distinct semantic representations and models with varying levels of complexity to classify the occupation of individuals based on their biographies.
An Empirical Study Of Pre-Trained Model Reuse In The Hugging Face Deep Learning Model Registry, Wenxin Jiang, Nicholas Synovic, Matt Hyatt, Taylor R. Schorlemmer, Rohan Sethi, Yung-Hsiang Lu, George K. Thiruvathukal, James C. Davis
An Empirical Study Of Pre-Trained Model Reuse In The Hugging Face Deep Learning Model Registry, Wenxin Jiang, Nicholas Synovic, Matt Hyatt, Taylor R. Schorlemmer, Rohan Sethi, Yung-Hsiang Lu, George K. Thiruvathukal, James C. Davis
Department of Electrical and Computer Engineering Faculty Publications
Deep Neural Networks (DNNs) are being adopted as components in software systems. Creating and specializing DNNs from scratch has grown increasingly difficult as state-of-the-art architectures grow more complex. Following the path of traditional software engineering, machine learning engineers have begun to reuse large-scale pre-trained models (PTMs) and fine-tune these models for downstream tasks. Prior works have studied reuse practices for traditional software packages to guide software engineers towards better package maintenance and dependency management. We lack a similar foundation of knowledge to guide behaviors in pre-trained model ecosystems.
In this work, we present the first empirical investigation of PTM reuse. …
An Evaluation Of The Eeg Alpha-To-Theta And Theta-To-Alpha Band Ratios As Indexes Of Mental Workload, Bujar Raufi, Luca Longo
An Evaluation Of The Eeg Alpha-To-Theta And Theta-To-Alpha Band Ratios As Indexes Of Mental Workload, Bujar Raufi, Luca Longo
Articles
Many research works indicate that EEG bands, specifically the alpha and theta bands, have been potentially helpful cognitive load indicators. However, minimal research exists to validate this claim. This study aims to assess and analyze the impact of the alpha-to-theta and the theta-to-alpha band ratios on supporting the creation of models capable of discriminating self-reported perceptions of mental workload. A dataset of raw EEG data was utilized in which 48 subjects performed a resting activity and an induced task demanding exercise in the form of a multitasking SIMKAP test. Band ratios were devised from frontal and parietal electrode clusters. Building …
Security Of Internet Of Things (Iot) Using Federated Learning And Deep Learning — Recent Advancements, Issues And Prospects, Vinay Gugueoth, Sunitha Safavat, Sachin Shetty
Security Of Internet Of Things (Iot) Using Federated Learning And Deep Learning — Recent Advancements, Issues And Prospects, Vinay Gugueoth, Sunitha Safavat, Sachin Shetty
Electrical & Computer Engineering Faculty Publications
There is a great demand for an efficient security framework which can secure IoT systems from potential adversarial attacks. However, it is challenging to design a suitable security model for IoT considering the dynamic and distributed nature of IoT. This motivates the researchers to focus more on investigating the role of machine learning (ML) in the designing of security models. A brief analysis of different ML algorithms for IoT security is discussed along with the advantages and limitations of ML algorithms. Existing studies state that ML algorithms suffer from the problem of high computational overhead and risk of privacy leakage. …
An Optimized And Scalable Blockchain-Based Distributed Learning Platform For Consumer Iot, Zhaocheng Wang, Xueying Liu, Xinming Shao, Abdullah Alghamdi, Md. Shirajum Munir, Sujit Biswas
An Optimized And Scalable Blockchain-Based Distributed Learning Platform For Consumer Iot, Zhaocheng Wang, Xueying Liu, Xinming Shao, Abdullah Alghamdi, Md. Shirajum Munir, Sujit Biswas
School of Cybersecurity Faculty Publications
Consumer Internet of Things (CIoT) manufacturers seek customer feedback to enhance their products and services, creating a smart ecosystem, like a smart home. Due to security and privacy concerns, blockchain-based federated learning (BCFL) ecosystems can let CIoT manufacturers update their machine learning (ML) models using end-user data. Federated learning (FL) uses privacy-preserving ML techniques to forecast customers' needs and consumption habits, and blockchain replaces the centralized aggregator to safeguard the ecosystem. However, blockchain technology (BCT) struggles with scalability and quick ledger expansion. In BCFL, local model generation and secure aggregation are other issues. This research introduces a novel architecture, emphasizing …
Probability Expressions In Ai Decision Support: Impacts On Human+Ai Team Performance, Elias Spinn
Probability Expressions In Ai Decision Support: Impacts On Human+Ai Team Performance, Elias Spinn
Dissertations
AI decision support systems aim to assist people in highly complex and consequential domains to make efficient, effective, and high-quality decisions. AI alone cannot be guaranteed to be correct in these complex decision tasks, and a human is often needed to ensure decision accuracy. The ambition is for these human+ AI teams to perform better together than either would individually. To realise this, decision makers must trust their AI partners appropriately, knowing when to rely on their recommendations and when to be sceptical. However, research has shown that decision makers often either mistrust and underutilise these systems, or trust them …
How Visual Stimuli Evoked P300 Is Transforming The Brain–Computer Interface Landscape: A Prisma Compliant Systematic Review, Jai Kalra, Prashasti Mittal, Nirmiti Mittal, Abhishek Arora, Utkarsh Tewari, Aviral Chharia, Rahul Upadhyay, Vinay Kumar, Luca Longo
How Visual Stimuli Evoked P300 Is Transforming The Brain–Computer Interface Landscape: A Prisma Compliant Systematic Review, Jai Kalra, Prashasti Mittal, Nirmiti Mittal, Abhishek Arora, Utkarsh Tewari, Aviral Chharia, Rahul Upadhyay, Vinay Kumar, Luca Longo
Articles
Non-invasive Visual Stimuli evoked-EEGbased P300 BCIs have gained immense attention in recent years due to their ability to help patients with disability using BCI-controlled assistive devices and applications. In addition to the medical field, P300 BCI has applications in entertainment, robotics, and education. The current article systematically reviews 147 articles that were published between 2006-2021*. Articles that pass the pre-defined criteria are included in the study. Further, classification based on their primary focus, including article orientation, participants’ age groups, tasks given, databases, the EEG devices used in the studies, classification models, and application domain, is performed. The application-based classification considers …
Persuasive Communication Systems: A Machine Learning Approach To Predict The Effect Of Linguistic Styles And Persuasion Techniques, Annye Braca, Pierpaolo Dondio
Persuasive Communication Systems: A Machine Learning Approach To Predict The Effect Of Linguistic Styles And Persuasion Techniques, Annye Braca, Pierpaolo Dondio
Articles
Prediction is a critical task in targeted online advertising, where predictions better than random guessing can translate to real economic return. This study aims to use machine learning (ML) methods to identify individuals who respond well to certain linguistic styles/persuasion techniques based on Aristotle’s means of persuasion, rhetorical devices, cognitive theories and Cialdini’s principles, given their psychometric profile.
Comparing Poor And Favorable Outcome Prediction With Machine Learning After Mechanical Thrombectomy In Acute Ischemic Stroke, Matthias A. Mutke, Vince I. Madai, Adam Hilbert, Esra Zihni, Arne Potreck, Charlotte S. Weyland, Markus A. Mohlenbruch, Sabine Heiland, Peter A. Ringleb, Simon Nagel, Martin Beendszus, Dietmar Frey
Comparing Poor And Favorable Outcome Prediction With Machine Learning After Mechanical Thrombectomy In Acute Ischemic Stroke, Matthias A. Mutke, Vince I. Madai, Adam Hilbert, Esra Zihni, Arne Potreck, Charlotte S. Weyland, Markus A. Mohlenbruch, Sabine Heiland, Peter A. Ringleb, Simon Nagel, Martin Beendszus, Dietmar Frey
Articles
Outcome prediction after mechanical thrombectomy (MT) in patients with acute ischemic stroke (AIS) and large vessel occlusion (LVO) is commonly performed by focusing on favorable outcome (modified Rankin Scale, mRS 0–2) after 3 months but poor outcome representing severe disability and mortality (mRS 5 and 6) might be of equal importance for clinical decision-making.
Enhancing Zero‑Shot Action Recognition In Videos By Combining Gans With Text And Images, Kaiqiang Huang, Luis Miralles-Pechuán, Susan Mckeever
Enhancing Zero‑Shot Action Recognition In Videos By Combining Gans With Text And Images, Kaiqiang Huang, Luis Miralles-Pechuán, Susan Mckeever
Articles
Zero-shot action recognition (ZSAR) tackles the problem of recognising actions that have not been seen by the model during the training phase. Various techniques have been used to achieve ZSAR in the field of human action recognition (HAR) in videos. Techniques based on generative adversarial networks (GANs) are the most promising in terms of performance. GANs are trained to generate representations of unseen videos conditioned on information related to the unseen classes, such as class label embeddings. In this paper, we present an approach based on combining information from two different GANs, both of which generate a visual representation of …
Sequential Frame-Interpolation And Dct-Based Video Compression Framework, Yeganeh Jalalpour, Wu-Chi Feng, Feng Liu
Sequential Frame-Interpolation And Dct-Based Video Compression Framework, Yeganeh Jalalpour, Wu-Chi Feng, Feng Liu
Computer Science Faculty Publications and Presentations
Video data is ubiquitous; capturing, transferring, and storing even compressed video data is challenging because it requires substantial resources. With the large amount of video traffic being transmitted on the internet, any improvement in compressing such data, even small, can drastically impact resource consumption. In this paper, we present a hybrid video compression framework that unites the advantages of both DCT-based and interpolation-based video compression methods in a single framework. We show that our work can deliver the same visual quality or, in some cases, improve visual quality while reducing the bandwidth by 10--20%.
Design Of Secure Communication Schemes To Provide Authentication And Integrity Among The Iot Devices, Vidya Rao Dr.
Design Of Secure Communication Schemes To Provide Authentication And Integrity Among The Iot Devices, Vidya Rao Dr.
Technical Collection
The fast growth in Internet-of-Things (IoT) based applications, has increased the number of end-devices communicating over the Internet. The end devices are made with fewer resources and are low battery-powered. These resource-constrained devices are exposed to various security and privacy concerns over publicly available Internet communication. Thus, it becomes essential to provide lightweight security solutions to safeguard data and user privacy. Elliptic Curve Cryptography (ECC) can be used to generate the digital signature and also encrypt the data. The method can be evaluated on a real-time testbed deployed using Raspberry Pi3 devices and every message transmitted is subjected to ECC. …
Sers Spectroscopy With Machine Learning To Analyze Human Plasma Derived Sevs For Coronary Artery Disease Diagnosis And Prognosis, Xi Huang, Bo Liu, Shenghan Guo, Weihong Guo, Ke Liao, Guoku Hu, Wen Shi, Mitchell Kuss, Michael J. Duryee, Daniel R. Anderson, Yongfeng Lu, Bin Duan
Sers Spectroscopy With Machine Learning To Analyze Human Plasma Derived Sevs For Coronary Artery Disease Diagnosis And Prognosis, Xi Huang, Bo Liu, Shenghan Guo, Weihong Guo, Ke Liao, Guoku Hu, Wen Shi, Mitchell Kuss, Michael J. Duryee, Daniel R. Anderson, Yongfeng Lu, Bin Duan
Department of Electrical and Computer Engineering: Faculty Publications
Coronary artery disease (CAD) is one of the major cardiovascular diseases and represents the leading causes of global mortality. Developing new diagnostic and therapeutic approaches for CAD treatment are critically needed, especially for an early accurate CAD detection and further timely intervention. In this study, we successfully isolated human plasma small extracellular vesicles (sEVs) from four stages of CAD patients, that is, healthy control, stable plaque, non-ST-elevation myocardial infarction, and ST-elevation myocardial infarction. Surface-enhanced Raman scattering (SERS) measurement in conjunction with five machine learning approaches, including Quadratic Discriminant Analysis, Support Vector Machine (SVM), K-Nearest Neighbor, Artificial Neural network, were then …
Sers Spectroscopy With Machine Learning To Analyze Human Plasma Derived Sevs For Coronary Artery Disease Diagnosis And Prognosis, Xi Huang, Bo Liu, Shenghan Guo, Weihong Guo, Ke Liao, Guoku Hu, Wen Shi, Mitchell Kuss, Michael J. Duryee, Daniel R. Anderson, Yongfeng Lu, Bin Duan
Sers Spectroscopy With Machine Learning To Analyze Human Plasma Derived Sevs For Coronary Artery Disease Diagnosis And Prognosis, Xi Huang, Bo Liu, Shenghan Guo, Weihong Guo, Ke Liao, Guoku Hu, Wen Shi, Mitchell Kuss, Michael J. Duryee, Daniel R. Anderson, Yongfeng Lu, Bin Duan
Department of Electrical and Computer Engineering: Faculty Publications
Coronary artery disease (CAD) is one of the major cardiovascular diseases and represents the leading causes of global mortality. Developing new diagnostic and therapeutic approaches for CAD treatment are critically needed, especially for an early accurate CAD detection and further timely intervention. In this study, we successfully isolated human plasma small extracellular vesicles (sEVs) from four stages of CAD patients, that is, healthy control, stable plaque, non-ST-elevation myocardial infarction, and ST-elevation myocardial infarction. Surface-enhanced Raman scattering (SERS) measurement in conjunction with five machine learning approaches, including Quadratic Discriminant Analysis, Support Vector Machine (SVM), K-Nearest Neighbor, Artificial Neural network, were then …
Runtime Energy Savings Based On Machine Learning Models For Multicore Applications, Vaibhav Sundriyal, Masha Sosonkina
Runtime Energy Savings Based On Machine Learning Models For Multicore Applications, Vaibhav Sundriyal, Masha Sosonkina
Electrical & Computer Engineering Faculty Publications
To improve the power consumption of parallel applications at the runtime, modern processors provide frequency scaling and power limiting capabilities. In this work, a runtime strategy is proposed to maximize energy savings under a given performance degradation. Machine learning techniques were utilized to develop performance models which would provide accurate performance prediction with change in operating core-uncore frequency. Experiments, performed on a node (28 cores) of a modern computing platform showed significant energy savings of as much as 26% with performance degradation of as low as 5% under the proposed strategy compared with the execution in the unlimited power case.
Ml-Based Online Traffic Classification For Sdns, Mohammed Nsaif, Gergely Kovasznai, Mohammed Abboosh, Ali Malik, Ruairí De Fréin
Ml-Based Online Traffic Classification For Sdns, Mohammed Nsaif, Gergely Kovasznai, Mohammed Abboosh, Ali Malik, Ruairí De Fréin
Articles
Traffic classification is a crucial aspect for Software-Defined Networking functionalities. This paper is a part of an on-going project aiming at optimizing power consumption in the environment of software-defined datacenter networks. We have developed a novel routing strategy that can blindly balance between the power consumption and the quality of service for the incoming traffic flows. In this paper, we demonstrate how to classify the network traffic flows so that the quality of service of each flow-class can be guaranteed efficiently. This is achieved by creating a dataset that encompasses different types of network traffic such as video, VoIP, game …
Machine Learning-Based Device Type Classification For Iot Device Re- And Continuous Authentication, Kaustubh Gupta
Machine Learning-Based Device Type Classification For Iot Device Re- And Continuous Authentication, Kaustubh Gupta
Department of Computer Science and Engineering: Dissertations, Theses, and Student Research
Today, the use of Internet of Things (IoT) devices is higher than ever and it is growing rapidly. Many IoT devices are usually manufactured by home appliance manufacturers where security and privacy are not the foremost concern. When an IoT device is connected to a network, currently there does not exist a strict authentication method that verifies the identity of the device, allowing any rogue IoT device to authenticate to an access point. This thesis addresses the issue by introducing methods for continuous and re-authentication of static and dynamic IoT devices, respectively. We introduce mechanisms and protocols for authenticating a …
A Brief Literature Review For Machine Learning In Autonomous Robotic Navigation, Jake Biddy, Jeremy Evert
A Brief Literature Review For Machine Learning In Autonomous Robotic Navigation, Jake Biddy, Jeremy Evert
Student Research
Machine learning is becoming very popular in many technological aspects worldwide, including robotic applications. One of the unique aspects of using machine learning in robotics is that it no longer requires the user to program every situation. The robotic application will be able to learn and adapt from its mistakes. In most situations, robotics using machine learning is designed to fulfill a task better than a human could, and with the machine learning aspect, it can function at the highest level of efficiency and quality. However, creating a machine learning program requires extensive coding and programming knowledge that can be …
Machine Learning Based Medical Image Deepfake Detection: A Comparative Study, Siddharth Solaiyappan, Yuxin Wen
Machine Learning Based Medical Image Deepfake Detection: A Comparative Study, Siddharth Solaiyappan, Yuxin Wen
Engineering Faculty Articles and Research
Deep generative networks in recent years have reinforced the need for caution while consuming various modalities of digital information. One avenue of deepfake creation is aligned with injection and removal of tumors from medical scans. Failure to detect medical deepfakes can lead to large setbacks on hospital resources or even loss of life. This paper attempts to address the detection of such attacks with a structured case study. Specifically, we evaluate eight different machine learning algorithms, which include three conventional machine learning methods (Support Vector Machine, Random Forest, Decision Tree) and five deep learning models (DenseNet121, DenseNet201, ResNet50, ResNet101, VGG19) …
Exploring The Concept Of The Digital Educator During Covid-19, Fernando Jimenez, Gracia Sanchez, Jose Palma, Luis Miralles-Pechuán, Juan A. Botia
Exploring The Concept Of The Digital Educator During Covid-19, Fernando Jimenez, Gracia Sanchez, Jose Palma, Luis Miralles-Pechuán, Juan A. Botia
Articles
T In many machine learning classification problems, datasets are usually of high dimensionality and therefore require efficient and effective methods for identifying the relative importance of their attributes, eliminating the redundant and irrelevant ones. Due to the huge size of the search space of the possible solutions, the attribute subset evaluation feature selection methods are not very suitable, so in these scenarios feature ranking methods are used. Most of the feature ranking methods described in the literature are univariate methods, which do not detect interactions between factors. In this paper, we propose two new multivariate feature ranking methods based on …
Trip Based Modeling Of Fuel Consumption In Modern Heavy-Duty Vehicles Using Artificial Intelligence, Sasanka Katreddi, Arvind Thiruvengadam
Trip Based Modeling Of Fuel Consumption In Modern Heavy-Duty Vehicles Using Artificial Intelligence, Sasanka Katreddi, Arvind Thiruvengadam
Faculty & Staff Scholarship
Heavy-duty trucks contribute approximately 20% of fuel consumption in the United States of America (USA). The fuel economy of heavy-duty vehicles (HDV) is affected by several real-world parameters like road parameters, driver behavior, weather conditions, and vehicle parameters, etc. Although modern vehicles comply with emissions regulations, potential malfunction of the engine, regular wear and tear, or other factors could affect vehicle performance. Predicting fuel consumption per trip based on dynamic on-road data can help the automotive industry to reduce the cost and time for on-road testing. Data modeling can easily help to diagnose the reason behind fuel consumption with a …