Open Access. Powered by Scholars. Published by Universities.®
- Institution
Articles 1 - 4 of 4
Full-Text Articles in Other Computer Engineering
Framework For Collecting Data From Iot Device, Md Saiful Islam
Framework For Collecting Data From Iot Device, Md Saiful Islam
Symposium of Student Scholars
The Internet of Things (IoT) is the most significant and blooming technology in the 21st century. IoT has rapidly developed by covering hundreds of applications in the civil, health, military, and agriculture areas. IoT is based on the collection of sensor data through an embedded system, and this embedded system uploads the data on the internet. Devices and sensor technologies connected over a network can monitor and measure data in real-time. The main challenge is to collect data from IoT devices, transmit them to store in the Cloud, and later retrieve them at any time for visualization and data analysis. …
Data Analysis Methods For Health Monitoring Sensors, Shahriar Sobhan
Data Analysis Methods For Health Monitoring Sensors, Shahriar Sobhan
Symposium of Student Scholars
Innovations in health monitoring systems are fundamental for the continuous improvement of remote healthcare. With the current presence of SARS-CoV-2, better known as COVID-19, in people’s daily lives, solutions for monitoring heart and especially respiration and pulmonary functions are more needed than ever. Besides, health monitoring systems are widely used for patients who need isolated care, unconscious patients who cannot get medical attention for themselves. As it is well-known, monitoring systems rely on sensor technologies. Currently, there are multiple research studies for remote monitoring using different types of sensors. In this effort, we survey the current approaches that utilize the …
Source Anonymization Of Digital Images: A Counter–Forensic Attack On Prnu Based Source Identification Techniques, Prithviraj Sengupta, Venkata Udaya Sameer, Ruchira Naskar, Ezhil Kalaimannan
Source Anonymization Of Digital Images: A Counter–Forensic Attack On Prnu Based Source Identification Techniques, Prithviraj Sengupta, Venkata Udaya Sameer, Ruchira Naskar, Ezhil Kalaimannan
Annual ADFSL Conference on Digital Forensics, Security and Law
A lot of photographers and human rights advocates need to hide their identity while sharing their images on the internet. Hence, source–anonymization of digital images has become a critical issue in the present digital age. The current literature contains a number of digital forensic techniques for “source–identification” of digital images, one of the most efficient of them being Photo–Response Non–Uniformity (PRNU) sensor noise pattern based source detection. PRNU noise pattern being unique to every digital camera, such techniques prove to be highly robust way of source–identification. In this paper, we propose a counter–forensic technique to mislead this PRNU sensor noise …
Model-Free Method Of Reinforcement Learning For Visual Tasks, Jeff S. Soldate, Jonghoon Jin, Eugenio Culurciello
Model-Free Method Of Reinforcement Learning For Visual Tasks, Jeff S. Soldate, Jonghoon Jin, Eugenio Culurciello
The Summer Undergraduate Research Fellowship (SURF) Symposium
There has been success in recent years for neural networks in applications requiring high level intelligence such as categorization and assessment. In this work, we present a neural network model to learn control policies using reinforcement learning. It takes a raw pixel representation of the current state and outputs an approximation of a Q value function made with a neural network that represents the expected reward for each possible state-action pair. The action is chosen an \epsilon-greedy policy, choosing the highest expected reward with a small chance of random action. We used gradient descent to update the weights and biases …