Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Physical Sciences and Mathematics (12458)
- Computer Sciences (11917)
- Electrical and Computer Engineering (7035)
- Artificial Intelligence and Robotics (3643)
- Operations Research, Systems Engineering and Industrial Engineering (3633)
-
- Numerical Analysis and Scientific Computing (3341)
- Systems Science (3284)
- Digital Communications and Networking (2128)
- Computer and Systems Architecture (1644)
- Data Storage Systems (1465)
- Social and Behavioral Sciences (1415)
- Other Computer Engineering (1371)
- Robotics (1206)
- Civil and Environmental Engineering (1184)
- Civil Engineering (1103)
- Electrical and Electronics (984)
- Mechanical Engineering (861)
- Information Security (725)
- Environmental Engineering (657)
- Other Civil and Environmental Engineering (646)
- Systems and Communications (637)
- Hydraulic Engineering (575)
- Law (567)
- Hardware Systems (530)
- Business (511)
- Ocean Engineering (491)
- Materials Science and Engineering (476)
- Legal Studies (473)
- Institution
-
- China Simulation Federation (3264)
- TÜBİTAK (2998)
- Wright State University (1749)
- University of Nebraska - Lincoln (1089)
- University of Texas at El Paso (841)
-
- Selected Works (836)
- Washington University in St. Louis (717)
- Technological University Dublin (654)
- Brigham Young University (642)
- California Polytechnic State University, San Luis Obispo (594)
- Embry-Riddle Aeronautical University (519)
- Singapore Management University (482)
- Universitas Indonesia (433)
- Old Dominion University (390)
- Marquette University (387)
- Air Force Institute of Technology (356)
- Santa Clara University (302)
- University of South Carolina (276)
- SelectedWorks (275)
- Portland State University (244)
- University of Central Florida (244)
- California State University, San Bernardino (242)
- Purdue University (212)
- Western University (191)
- Nova Southeastern University (170)
- New Jersey Institute of Technology (166)
- University of Arkansas, Fayetteville (164)
- University of Massachusetts Amherst (164)
- University of Nevada, Las Vegas (162)
- University of South Florida (156)
- Keyword
-
- Machine learning (341)
- Computer Science (312)
- Department of Computer Science and Engineering (255)
- Engineering (240)
- Deep learning (238)
-
- Simulation (229)
- Robotics (205)
- Machine Learning (192)
- Security (177)
- College of Engineering and Computer Science (157)
- Newsletters (157)
- Science news (157)
- Technical writing (157)
- Optimization (156)
- Classification (146)
- Artificial intelligence (125)
- Deep Learning (123)
- Computer Science and Engineering (121)
- Cybersecurity (108)
- Genetic algorithm (107)
- Internet (106)
- Computer vision (101)
- Computer Engineering (100)
- Data mining (96)
- Computer science (94)
- Privacy (93)
- Particle swarm optimization (87)
- Cloud computing (85)
- Clustering (85)
- Blockchain (84)
- Publication Year
- Publication
-
- Journal of System Simulation (3264)
- Turkish Journal of Electrical Engineering and Computer Sciences (2998)
- Computer Science & Engineering Syllabi (1312)
- Departmental Technical Reports (CS) (760)
- All Computer Science and Engineering Research (683)
-
- International Congress on Environmental Modelling and Software (630)
- Theses and Dissertations (537)
- Department of Electrical and Computer Engineering: Faculty Publications (483)
- Research Collection School Of Computing and Information Systems (450)
- Makara Journal of Technology (431)
- Electrical and Computer Engineering Faculty Research and Publications (367)
- Electronic Theses and Dissertations (351)
- Faculty Publications (315)
- Dissertations (308)
- Journal of Digital Forensics, Security and Law (299)
- Browse all Theses and Dissertations (278)
- Computer Engineering (272)
- Masters Theses (206)
- Computer Science and Engineering Senior Theses (201)
- Department of Computer Science and Engineering: Dissertations, Theses, and Student Research (190)
- Doctoral Dissertations (183)
- Master's Theses (177)
- Electrical and Computer Engineering Faculty Publications (171)
- Conference papers (163)
- BITs and PCs Newsletter (157)
- College of Engineering and Computing Course Catalogs (152)
- Chulalongkorn University Theses and Dissertations (Chula ETD) (149)
- USF Tampa Graduate Theses and Dissertations (133)
- Articles (130)
- Publications (130)
- Publication Type
Articles 31 - 60 of 23583
Full-Text Articles in Computer Engineering
Human-Machine Communication: Complete Volume. Volume 7 Special Issue: Mediatization
Human-Machine Communication: Complete Volume. Volume 7 Special Issue: Mediatization
Human-Machine Communication
This is the complete volume of HMC Volume 7. Special Issue on Mediatization
Artificial Sociality, Simone Natale, Iliana Depounti
Artificial Sociality, Simone Natale, Iliana Depounti
Human-Machine Communication
This article proposes the notion of Artificial Sociality to describe communicative AI technologies that create the impression of social behavior. Existing tools that activate Artificial Sociality include, among others, Large Language Models (LLMs) such as ChatGPT, voice assistants, virtual influencers, socialbots and companion chatbots such as Replika. The article highlights three key issues that are likely to shape present and future debates about these technologies, as well as design practices and regulation efforts: the modelling of human sociality that foregrounds it, the problem of deception and the issue of control from the part of the users. Ethical, social and cultural …
Mediatization And Human-Machine Communication: Trajectories, Discussions, Perspectives, Andreas Hepp, Göran Bolin, Andrea L. Guzman, Wiebke Loosen
Mediatization And Human-Machine Communication: Trajectories, Discussions, Perspectives, Andreas Hepp, Göran Bolin, Andrea L. Guzman, Wiebke Loosen
Human-Machine Communication
As research fields, mediatization and Human-Machine Communication (HMC) have distinct historical trajectories. While mediatization research is concerned with the fundamental interrelation between the transformation of media and communications and cultural and societal changes, the much younger field of HMC delves into human meaning-making in interactions with machines. However, the recent wave of “deep mediatization,” characterized by an increasing emphasis on general communicative automation and the rise of communicative AI, highlights a shared interest in technology’s role within human interaction. This introductory article examines the trajectories of both fields, demonstrating how mediatization research “zooms out” from overarching questions of societal and …
2024 (Spring) Ensi Informer Magazine, Morehead State University. Engineering Sciences Department
2024 (Spring) Ensi Informer Magazine, Morehead State University. Engineering Sciences Department
ENSI Informer Magazine Archive
The ENSI Informer Magazine published in the spring of 2024.
Implementation Of Path Planning Methods To Detect And Avoid Gps Signal Degradation In Urban Environments, Ayush Raminedi
Implementation Of Path Planning Methods To Detect And Avoid Gps Signal Degradation In Urban Environments, Ayush Raminedi
Doctoral Dissertations and Master's Theses
In the modern world, various missions are being carried out under the assistance of autonomous flight vehicles due to their ability to operate in a wide range of flight conditions. Regardless, these autonomous vehicles are prone to GPS signal loss in urban environments due to obstructions that cause scintillation, multi-path, and shadowing. These effects that decrease the GPS functionality can deteriorate the accuracy of GPS positioning causing losses in signal tracking leading to a decrease in navigation performance. These effects are modeled into the simulation environment and are used as part of the path planning algorithm to provide better navigation …
Reducing Bias In Cyberbullying Detection With Advanced Llms And Transformer Models, Dahana Moz Ruiz, Annaliese Watson, Anjana Manikandan, Zachary Gordon
Reducing Bias In Cyberbullying Detection With Advanced Llms And Transformer Models, Dahana Moz Ruiz, Annaliese Watson, Anjana Manikandan, Zachary Gordon
Center for Cybersecurity
This paper delved into a comprehensive exploration of the inherent biases present in Large Language Models (LLMs) and various Transformer models, with a focus on their role in identifying and addressing instances of cyberbullying. The objective was to refine and enhance the accuracy and fairness of these models by mitigating the biases deeply ingrained in their structures. This was crucial because language models could inadvertently perpetuate and amplify existing biases present in the data they were trained on.
Cyber Attacks Against Industrial Control Systems, Adam Kardorff
Cyber Attacks Against Industrial Control Systems, Adam Kardorff
LSU Master's Theses
Industrial Control Systems (ICS) are the foundation of our critical infrastructure, and allow for the manufacturing of the products we need. These systems monitor and control power plants, water treatment plants, manufacturing plants, and much more. The security of these systems is crucial to our everyday lives and to the safety of those working with ICS. In this thesis we examined how an attacker can take control of these systems using a power plant simulator in the Applied Cybersecurity Lab at LSU. Running experiments on a live environment can be costly and dangerous, so using a simulated environment is the …
Enhancing Information Architecture With Machine Learning For Digital Media Platforms, Taylor N. Mietzner
Enhancing Information Architecture With Machine Learning For Digital Media Platforms, Taylor N. Mietzner
Honors College Theses
Modern advancements in machine learning are transforming the technological landscape, including information architecture within user experience design. With the unparalleled amount of user data generated on online media platforms and applications, an adjustment in the design process to incorporate machine learning for categorizing the influx of semantic data while maintaining a user-centric structure is essential. Machine learning tools, such as the classification and recommendation system, need to be incorporated into the design for user experience and marketing success. There is a current gap between incorporating the backend modeling algorithms and the frontend information architecture system design together. The aim of …
In-Depth Examination Of Gas Consumption In E-Will Smart Contract: A Case Study, Manal Mansour, May Salama, Hala Helmi, Mona F.M Mursi
In-Depth Examination Of Gas Consumption In E-Will Smart Contract: A Case Study, Manal Mansour, May Salama, Hala Helmi, Mona F.M Mursi
Journal of Engineering Research
In recent years, blockchain technology, coupled with smart contracts, has played a pivotal role in the development of distributed applications. Numerous case studies have emerged, showcasing the remarkable potential of this technology across various applications. Despite its widespread adoption in the industry, there exists a significant gap between the practical implementation of blockchain and the analytical and academic studies dedicated to understanding its nuances.
This paper aims to bridge this divide by presenting an empirical case study focused on the e-will contract, with a specific emphasis on gas-related challenges. By closely examining the e-will contract case study, we seek to …
A Soft Two-Layers Voting Model For Fake News Detection, Hnin Ei Wynne, Khaing Thanda Swe
A Soft Two-Layers Voting Model For Fake News Detection, Hnin Ei Wynne, Khaing Thanda Swe
Journal of Engineering Research
The proliferation of fake news has become a complex and challenge problem in recent year, and presenting various unsolved issues within the research domain. Among these challenges, a critical concern is the development of effective models capable of accurately distinguish between fake and real news. While numerous techniques have been proposed for fake news detection, achieving optimal accuracy remains elusive. This paper introduces a novel fake news detection approach employing a two-layered weighted voting classifier. In contrast to conventional methods that assign equal weights to all classifiers, our proposed approach utilizes a selective weighting approach to solve the current issue. …
Exploring Human Aging Proteins Based On Deep Autoencoders And K-Means Clustering, Sondos M. Hammad, Mohamed Talaat Saidahmed, Elsayed A. Sallam, Reda Elbasiony
Exploring Human Aging Proteins Based On Deep Autoencoders And K-Means Clustering, Sondos M. Hammad, Mohamed Talaat Saidahmed, Elsayed A. Sallam, Reda Elbasiony
Journal of Engineering Research
Aging significantly affects human health and the overall economy, yet understanding of the underlying molecular mechanisms remains limited. Among all human genes, almost three hundred and five have been linked to human aging. While certain subsets of these genes or specific aging-related genes have been extensively studied. There has been a lack of comprehensive examination encompassing the entire set of aging-related genes. Here, the main objective is to overcome understanding based on an innovative approach that combines the capabilities of deep learning. Particularly using One-Dimensional Deep AutoEncoder (1D-DAE). Followed by the K-means clustering technique as a means of unsupervised learning. …
Protecting Return Address Integrity For Risc-V Via Pointer Authentication, Yuhe Zhao
Protecting Return Address Integrity For Risc-V Via Pointer Authentication, Yuhe Zhao
Masters Theses
Embedded systems based on lightweight microprocessors are becoming more prevalent in various applications. However, the security of them remains a significant challenge due to the limited resources and exposure to external threats. Especially, some of these devices store sensitive data and control critical devices, making them high-value targets for attackers. Software security is particularly important because attackers can easily access these devices on the internet and obtain control of them by injecting malware.
Return address (RA) hijacking is a common software attack technique used to compromise control flow integrity (CFI) by manipulating memory, such as return-to-libc attacks. Several methods have …
Blockchain Design For A Secure Pharmaceutical Supply Chain, Zhe Xu
Blockchain Design For A Secure Pharmaceutical Supply Chain, Zhe Xu
Masters Theses
In the realm of pharmaceuticals, particularly during the challenging times of the COVID-19 pandemic, the supply chain for drugs has faced significant strains. The increased demand for vaccines and therapeutics has revealed critical weaknesses in the current drug supply chain management systems. If not addressed, these challenges could lead to severe societal impacts, including the rise of counterfeit medications and diminishing trust in government authorities.
The study identified that more than the current strategies, such as the Drug Supply Chain Security Act (DSCSA) in the U.S., which focuses on unique authentication and traceability codes for prescription drugs, is needed to …
Extracting Dnn Architectures Via Runtime Profiling On Mobile Gpus, Dong Hyub Kim
Extracting Dnn Architectures Via Runtime Profiling On Mobile Gpus, Dong Hyub Kim
Masters Theses
Due to significant investment, research, and development efforts over the past decade, deep neural networks (DNNs) have achieved notable advancements in classification and regression domains. As a result, DNNs are considered valuable intellectual property for artificial intelligence providers. Prior work has demonstrated highly effective model extraction attacks which steal a DNN, dismantling the provider’s business model and paving the way for unethical or malicious activities, such as misuse of personal data, safety risks in critical systems, or spreading misinformation. This thesis explores the feasibility of model extraction attacks on mobile devices using aggregated runtime profiles as a side-channel to leak …
An Efficient Privacy-Preserving Framework For Video Analytics, Tian Zhou
An Efficient Privacy-Preserving Framework For Video Analytics, Tian Zhou
Doctoral Dissertations
With the proliferation of video content from surveillance cameras, social media, and live streaming services, the need for efficient video analytics has grown immensely. In recent years, machine learning based computer vision algorithms have shown great success in various video analytic tasks. Specifically, neural network models have dominated in visual tasks such as image and video classification, object recognition, object detection, and object tracking. However, compared with classic computer vision algorithms, machine learning based methods are usually much more compute-intensive. Powerful servers are required by many state-of-the-art machine learning models. With the development of cloud computing infrastructures, people are able …
Revolutionizing Feature Selection: A Breakthrough Approach For Enhanced Accuracy And Reduced Dimensions, With Implications For Early Medical Diagnostics, Shabia Shabir Khan, Majid Shafi Kawoosa, Bonny Bannerjee, Subhash C. Chauhan, Sheema Khan
Revolutionizing Feature Selection: A Breakthrough Approach For Enhanced Accuracy And Reduced Dimensions, With Implications For Early Medical Diagnostics, Shabia Shabir Khan, Majid Shafi Kawoosa, Bonny Bannerjee, Subhash C. Chauhan, Sheema Khan
Research Symposium
Background: The system's performance may be impacted by the high-dimensional feature dataset, attributed to redundant, non-informative, or irrelevant features, commonly referred to as noise. To mitigate inefficiency and suboptimal performance, our goal is to identify the optimal and minimal set of features capable of representing the entire dataset. Consequently, the Feature Selector (Fs) serves as an operator, transforming an m-dimensional feature set into an n-dimensional feature set. This process aims to generate a filtered dataset with reduced dimensions, enhancing the algorithm's efficiency.
Methods: This paper introduces an innovative feature selection approach utilizing a genetic algorithm with an ensemble crossover operation …
Comparing Anova And Powershap Feature Selection Methods Via Shapley Additive Explanations Of Models Of Mental Workload Built With The Theta And Alpha Eeg Band Ratios, Bujar Raufi, Luca Longo
Comparing Anova And Powershap Feature Selection Methods Via Shapley Additive Explanations Of Models Of Mental Workload Built With The Theta And Alpha Eeg Band Ratios, Bujar Raufi, Luca Longo
Articles
Background: Creating models to differentiate self-reported mental workload perceptions is challenging and requires machine learning to identify features from EEG signals. EEG band ratios quantify human activity, but limited research on mental workload assessment exists. This study evaluates the use of theta-to-alpha and alpha-to-theta EEG band ratio features to distinguish human self-reported perceptions of mental workload. Methods: In this study, EEG data from 48 participants were analyzed while engaged in resting and task-intensive activities. Multiple mental workload indices were developed using different EEG channel clusters and band ratios. ANOVA’s F-score and PowerSHAP were used to extract the statistical features. At …
Intelligent Protection Scheme Using Combined Stockwell-Transform And Deep Learning-Based Fault Diagnosis For The Active Distribution System, Latha Maheswari Kandasamy, Kanakaraj Jaganathan
Intelligent Protection Scheme Using Combined Stockwell-Transform And Deep Learning-Based Fault Diagnosis For The Active Distribution System, Latha Maheswari Kandasamy, Kanakaraj Jaganathan
Turkish Journal of Electrical Engineering and Computer Sciences
This study aims to perform fast fault diagnosis and intelligent protection in an active distribution network (ADN) with high renewable energy penetration. Several time-domain simulations are carried out in EMTP-RV to extract time-synchronized current and voltage data. The Stockwell transform (ST) was used in MATLAB/SIMULINK to preprocess these input datasets to train the adaptive fault diagnosis deep convolutional neural network (AFDDCNN) for fault location identification, fault type identification, and fault phase-detection for different penetration levels. Based on the AFDDCNN output, the intelligent protection scheme (IDOCPS) generates the signal for isolating a faulty section of the ADN. An intelligent fault diagnosis …
Consensus-Based Virtual Leader Tracking Algorithm For Flight Formation Control Of Swarm Uavs, Berat Yıldız, Akif Durdu, Ahmet Kayabaşi
Consensus-Based Virtual Leader Tracking Algorithm For Flight Formation Control Of Swarm Uavs, Berat Yıldız, Akif Durdu, Ahmet Kayabaşi
Turkish Journal of Electrical Engineering and Computer Sciences
Technological developments in industrial areas also impact unmanned aerial vehicles (UAVs). Recent improvements in both software and hardware have significantly increased the use of many UAVs in social and military fields. In particular, the widespread use of these vehicles in social areas such as entertainment, shipping, transportation, and delivery and military areas such as surveillance, tracking, and offensive measures has accelerated the research on swarm systems. This study examined the previous investigations on swarm UAVs and aimed to create a more efficient algorithm. The effectiveness of the proposed algorithm was compared with other leader-based applications. A swarm consisting of 5 …
Lower Data Attacks On Advanced Encryption Standard, Orhun Kara
Lower Data Attacks On Advanced Encryption Standard, Orhun Kara
Turkish Journal of Electrical Engineering and Computer Sciences
The Advanced Encryption Standard (AES) is one of the most commonly used and analyzed encryption algorithms. In this work, we present new combinations of some prominent attacks on AES, achieving new records in data requirements among attacks, utilizing only 2 4 and 2 16 chosen plaintexts (CP) for 6-round and 7-round AES 192/256, respectively. One of our attacks is a combination of a meet-in-the-middle (MiTM) attack with a square attack mounted on 6-round AES-192/256 while another attack combines an MiTM attack and an integral attack, utilizing key space partitioning technique, on 7-round AES-192/256. Moreover, we illustrate that impossible differential (ID) …
Cascade Controller Design Via Controller Synthesis For Load Frequency Control Of Electrical Power Systems, Yavuz Güler, Mustafa Nalbantoğlu, Ibrahim Kaya
Cascade Controller Design Via Controller Synthesis For Load Frequency Control Of Electrical Power Systems, Yavuz Güler, Mustafa Nalbantoğlu, Ibrahim Kaya
Turkish Journal of Electrical Engineering and Computer Sciences
The regulation of tie-line electricity flow and frequency of electrical power systems (EPS) is crucial for ensuring their robustness to parameter changes and efficient management of disturbances. To this end, a novel cascade control design approach utilizing a serial Proportional-Integral-Derivative controller with a filter (PIDF) is proposed in this paper. The parameters of the controllers are derived analytically, and it is employed in both loops of the cascade control system to regulate the Load Frequency Control (LFC) of EPS. The implementation of PIDF controllers in both loops is utilized in the cascade control scheme for various power systems featuring different …
Advanced Hyperthermia Treatment: Optimizing Microwave Energy Focus For Breast Cancer Therapy, Burak Acar, Tuba Yilmaz Abdolsaheb, Ali Yapar
Advanced Hyperthermia Treatment: Optimizing Microwave Energy Focus For Breast Cancer Therapy, Burak Acar, Tuba Yilmaz Abdolsaheb, Ali Yapar
Turkish Journal of Electrical Engineering and Computer Sciences
This paper presents a fast antenna phase optimization scheme to enable microwave power focusing for breast cancer hyperthermia. The power focusing is achieved through the maximization of the deposited electric field on the target malignant tumor tissue. To do so, a malignant breast tumor, the surrounding breast medium, and the skin of the breast are modeled as a cylindrical structure composed of eccentric cylinders, and electric field distribution is computed analytically in terms of cylindrical harmonics. This approach minimized the computational cost and simplified the breast medium model. To ensure applicability across various breast types, the dielectric properties (DPs) of …
Atomic Comagnetometer Gyroscopes For Inertial Navigation Systems: A Review, Murat Salim Karabinaoglu, Bekir Çakir, Mustafa Engin Başoğlu
Atomic Comagnetometer Gyroscopes For Inertial Navigation Systems: A Review, Murat Salim Karabinaoglu, Bekir Çakir, Mustafa Engin Başoğlu
Turkish Journal of Electrical Engineering and Computer Sciences
In recent years, developments in quantum sensing, laser, and atomic sensor technologies have also enabled advancement in the field of quantum navigation. Atomic-based gyroscopes have emerged as one of the most critical atomic sensors in this respect. In this review, a brief technology statement of spin exchange relaxation free (SERF) and nuclear magnetic resonance (NMR) type atomic comagnetometer gyroscope (CG) is presented. Related studies in the literature have been gathered, and the fundamental compositions of CGs with technical basics are presented. A comparison of SERF and NMR CGs is provided. A basic simulation of SERF CG was carried out because …
Uncovering And Mitigating Spurious Features In Domain Generalization, Saeed Karimi, Hamdi̇ Di̇bekli̇oğlu
Uncovering And Mitigating Spurious Features In Domain Generalization, Saeed Karimi, Hamdi̇ Di̇bekli̇oğlu
Turkish Journal of Electrical Engineering and Computer Sciences
Domain generalization (DG) techniques strive to attain the ability to generalize to an unfamiliar target domain solely based on training data originating from the source domains. Despite the increasing attention given to learning from multiple training domains through the application of various forms of invariance across those domains, the enhancements observed in comparison to ERM are nearly insignificant under specified evaluation rules. In this paper, we demonstrate that the disentanglement of spurious and invariant features is a challenging task in conventional training since ERM simply minimizes the loss and does not exploit invariance among domains. To address this issue, we …
Preprocessing Of Astronomical Images From The Neowise Survey For Near-Earth Asteroid Detection With Machine Learning, Rachel Meyer
Preprocessing Of Astronomical Images From The Neowise Survey For Near-Earth Asteroid Detection With Machine Learning, Rachel Meyer
ELAIA
Asteroid detection is a common field in astronomy for planetary defense, requiring observations from survey telescopes to detect and classify different objects. The amount of data collected each night is continually increasing as new and better-designed telescopes begin collecting information each year. This amount of data is quickly becoming unmanageable, and researchers are looking for ways to better process this data. The most feasible current solution is to implement computer algorithms to automatically detect these sources and then use machine learning to create a more efficient and accurate method of classification. Implementation of such methods has previously focused on larger …
Deepfake It Til You Make It: How To Make A Short Film, Adam G. Lee
Deepfake It Til You Make It: How To Make A Short Film, Adam G. Lee
ELAIA
A recent development in the realm of computer technology is the deepfake. Deepfakes, which train a computer model to digitally superimpose one person’s face onto another body in a separate video, has its uses for good and for ill, with the unfortunate tendency to the latter. The vast majority of deepfakes are used for pornography, most commonly depicting female celebrities as the subjects. At the less notable level, it is also often used for revenge pornography. These aspects of deepfake technology are rarely discussed in mainstream media, which tends to focus on the less harmful uses, such as those for …
Predicting The Water Situation In Jordan Using Auto Regressive Integrated Moving Average (Arima) Model, Shahed Al-Khateeb
Predicting The Water Situation In Jordan Using Auto Regressive Integrated Moving Average (Arima) Model, Shahed Al-Khateeb
Jerash for Research and Studies Journal مجلة جرش للبحوث والدراسات
Countries' water security is inextricably related to their economic position. Jordan is one of the world's five poorest countries regarding water resources. Climate change and water scarcity are threatening Jordan's economic growth and food security.
The objectives of the study are to use a statistical artificial intelligence model, which is called the Autoregressive Integrated Moving Average model to predict water productivity in Jordan and the world for the year 2021-2026, based on a real dataset from World Development Indicators from the World Bank. The study also aims to predict the total per capita share of fresh water based on the …
Performance Analysis Of Mobile Edge Computing Deployment Models In 5g Networks, Safaa Alali, Abdulkaim Assalem
Performance Analysis Of Mobile Edge Computing Deployment Models In 5g Networks, Safaa Alali, Abdulkaim Assalem
Jerash for Research and Studies Journal مجلة جرش للبحوث والدراسات
5G networks and Mobile Edge Computing (MEC) are two main pillars of the next technological revolution. The first pillar provides ultra-reliable, high-bandwidth connectivity with ultra-low latency, while the second pillar gives mobile networks cloud computing capabilities at the edge of the network, enabling compute-dense, context-aware services for mobile users. So the next generation of mobile networks will see close integration between computing and communication. Therefore, it was necessary to study the different deployment options for edge hosts in 5G network, to know the effect of those options on the overall performance of the network. In this research, (Omnetpp 6.0) network …
Requirements For Employing Artificial Intelligence Applications In Higher Education And Its Challenges, Nuha Musa Otoom
Requirements For Employing Artificial Intelligence Applications In Higher Education And Its Challenges, Nuha Musa Otoom
Jerash for Research and Studies Journal مجلة جرش للبحوث والدراسات
The study aimed to determine the requirements for applications of artificial intelligence in the field of higher education, and its challenges. The descriptive survey method (content analysis) was used, where the researcher collected information and documents about artificial intelligence and the requirements for employing its applications and challenges, by referring to many reliable sources and references that contributed to Reaching the results that the research seeks to achieve, The results showed that there are a set of requirements for employing artificial intelligence applications in higher education, the most prominent of which is spreading a culture that supports artificial intelligence in …
Insights Into Cellular Evolution: Temporal Deep Learning Models And Analysis For Cell Image Classification, Xinran Zhao
Insights Into Cellular Evolution: Temporal Deep Learning Models And Analysis For Cell Image Classification, Xinran Zhao
Master's Theses
Understanding the temporal evolution of cells poses a significant challenge in developmental biology. This study embarks on a comparative analysis of various machine-learning techniques to classify cell colony images across different timestamps, thereby aiming to capture dynamic transitions of cellular states. By performing Transfer Learning with state-of-the-art classification networks, we achieve high accuracy in categorizing single-timestamp images. Furthermore, this research introduces the integration of temporal models, notably LSTM (Long Short Term Memory Network), R-Transformer (Recurrent Neural Network enhanced Transformer) and ViViT (Video Vision Transformer), to undertake this classification task to verify the effectiveness of incorporating temporal features into the classification …