Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 8 of 8

Full-Text Articles in Computer Engineering

A Systematic Literature Review With Bibliometric Meta-Analysis Of Deep Learning And 3d Reconstruction Methods In Image Based Food Volume Estimation Using Scopus, Web Of Science And Ieee Database, Prachi Kadam, Nayana Petkar, Shraddha Phansalkar Dr. Nov 2020

A Systematic Literature Review With Bibliometric Meta-Analysis Of Deep Learning And 3d Reconstruction Methods In Image Based Food Volume Estimation Using Scopus, Web Of Science And Ieee Database, Prachi Kadam, Nayana Petkar, Shraddha Phansalkar Dr.

Library Philosophy and Practice (e-journal)

Purpose- Estimation of food portions is necessary in image based dietary monitoring techniques. The purpose of this systematic survey is to identify peer reviewed literature in image-based food volume estimation methods in Scopus, Web of Science and IEEE database. It further analyzes bibliometric survey of image-based food volume estimation methods with 3D reconstruction and deep learning techniques.

Design/methodology/approach- Scopus, Web of Science and IEEE citation databases are used to gather the data. Using advanced keyword search and PRISMA approach, relevant papers were extracted, selected and analyzed. The bibliographic data of the articles published in the journals over the past …


A Bibliometric Survey Of Smart Wearable In The Health Insurance Industry, Apeksha Shah, Swati Ahirrao, Shraddha Phansalkar, Ketan Kotecha Nov 2020

A Bibliometric Survey Of Smart Wearable In The Health Insurance Industry, Apeksha Shah, Swati Ahirrao, Shraddha Phansalkar, Ketan Kotecha

Library Philosophy and Practice (e-journal)

Smart wearables help real-time and remote monitoring of health data for effective diagnostic and preventive health care services. Wearable devices have the ability to track and monitor healthcare vitals such as heart rate, physical activities, BMI (Body Mass Index), blood pressure, and keeps an individual notified about the health status. Artificial Intelligence-enabled wearables show an ability to transform the health insurance sector. This would not only enable self-management of individual health but also help them focus from treatments to the preventions of health hazards. With this customer-centric approach to health care, it will enable the insurance companies to track the …


Zero-Bias Deep Learning For Accurate Identification Of Internet Of Things (Iot) Devices, Yongxin Liu, Houbing Song, Thomas Yang, Jian Wang, Jianqiang Li, Shuteng Niu, Zhong Ming Aug 2020

Zero-Bias Deep Learning For Accurate Identification Of Internet Of Things (Iot) Devices, Yongxin Liu, Houbing Song, Thomas Yang, Jian Wang, Jianqiang Li, Shuteng Niu, Zhong Ming

Publications

The Internet of Things (IoT) provides applications and services that would otherwise not be possible. However, the open nature of IoT makes it vulnerable to cybersecurity threats. Especially, identity spoofing attacks, where an adversary passively listens to the existing radio communications and then mimic the identity of legitimate devices to conduct malicious activities. Existing solutions employ cryptographic signatures to verify the trustworthiness of received information. In prevalent IoT, secret keys for cryptography can potentially be disclosed and disable the verification mechanism. Noncryptographic device verification is needed to ensure trustworthy IoT. In this article, we propose an enhanced deep learning framework …


An End-To-End Trainable Method For Generating And Detecting Fiducial Markers, J Brennan Peace Aug 2020

An End-To-End Trainable Method For Generating And Detecting Fiducial Markers, J Brennan Peace

Department of Electrical and Computer Engineering: Dissertations, Theses, and Student Research

Existing fiducial markers are designed for efficient detection and decoding. The methods are computationally efficient and capable of demonstrating impressive results, however, the markers are not explicitly designed to stand out in natural environments and their robustness is difficult to infer from relatively limited analysis. Worsening performance in challenging image capture scenarios - such as poorly exposed images, motion blur, and off-axis viewing - sheds light on their limitations. The method introduced in this work is an end-to-end trainable method for designing fiducial markers and a complimentary detector. By introducing back-propagatable marker augmentation and superimposition into training, the method learns …


Scalable Profiling And Visualization For Characterizing Microbiomes, Camilo Valdes Mar 2020

Scalable Profiling And Visualization For Characterizing Microbiomes, Camilo Valdes

FIU Electronic Theses and Dissertations

Metagenomics is the study of the combined genetic material found in microbiome samples, and it serves as an instrument for studying microbial communities, their biodiversities, and the relationships to their host environments. Creating, interpreting, and understanding microbial community profiles produced from microbiome samples is a challenging task as it requires large computational resources along with innovative techniques to process and analyze datasets that can contain terabytes of information.

The community profiles are critical because they provide information about what microorganisms are present in the sample, and in what proportions. This is particularly important as many human diseases and environmental disasters …


Bibliometric Analysis Of Passive Image Forgery Detection And Explainable Ai, Kalyani Dhananjay Kadam, Dr. Swati Ahirrao Ahirrao, Dr. Ketan Kotecha Jan 2020

Bibliometric Analysis Of Passive Image Forgery Detection And Explainable Ai, Kalyani Dhananjay Kadam, Dr. Swati Ahirrao Ahirrao, Dr. Ketan Kotecha

Library Philosophy and Practice (e-journal)

Due to the arrival of social networking services such as Facebook and Instagram, there has been a vast increase in the volume of image data generated in the last decade. The use of image processing tools like GNU Gimp, Adobe Photoshop to create doctored images and videos is a major concern. These are the main sources of fake news and are often used in malevolent ways such as for mob incitement. Before a move can be taken based on a fake image, we should confirm its realness. This paper shows systematic mappings of existing literature for image forgery detection using …


Synthetic Data Generation Using Wasserstein Conditional Gans With Gradient Penalty (Wcgans-Gp), Manhar Singh Walia Jan 2020

Synthetic Data Generation Using Wasserstein Conditional Gans With Gradient Penalty (Wcgans-Gp), Manhar Singh Walia

Dissertations

With data protection requirements becoming stricter, the data privacy has become increasingly important and more crucial than ever. This has led to restrictions on the availability and dissemination of real-world datasets. Synthetic data offers a viable solution to overcome barriers of data access and sharing. Existing data generation methods require a great deal of user-defined rules, manual interactions and domainspecific knowledge. Moreover, they are not able to balance the trade-off between datausability and privacy. Deep learning based methods like GANs have seen remarkable success in synthesizing images by automatically learning the complicated distributions and patterns of real data. But they …


Investigating Effect Of Amount Of Augmented Data On Performance Of Convolutional Neural Network For Multiclass Image Classification, Shivam Khandelwal Jan 2020

Investigating Effect Of Amount Of Augmented Data On Performance Of Convolutional Neural Network For Multiclass Image Classification, Shivam Khandelwal

Dissertations

This research project seeks to investigate the use of Image Data augmentation that generates synthetic data by adding distortions to original images, as a means of replacement to a large amount of real data used to train the Convolutional Neural Networks. The purpose of the research project is to assess the effectiveness of augmented data over the real data by comparing the performance of the model trained with various amounts of augmented training and validation data ratio. Deep learning tasks involving convolutional neural networks have difficulty in generalizing the models effectively for computer vision tasks when the training dataset is …