Open Access. Powered by Scholars. Published by Universities.®

Other Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

2020

Discipline
Institution
Keyword
Publication
Publication Type
File Type

Articles 1 - 30 of 99

Full-Text Articles in Other Computer Engineering

Treated Hfo2 Based Rram Devices With Ru, Tan, Tin As Top Electrode For In-Memory Computing Hardware, Yuvraj Dineshkumar Patel Dec 2020

Treated Hfo2 Based Rram Devices With Ru, Tan, Tin As Top Electrode For In-Memory Computing Hardware, Yuvraj Dineshkumar Patel

Theses

The scalability and power efficiency of the conventional CMOS technology is steadily coming to a halt due to increasing problems and challenges in fabrication technology. Many non-volatile memory devices have emerged recently to meet the scaling challenges. Memory devices such as RRAMs or ReRAM (Resistive Random-Access Memory) have proved to be a promising candidate for analog in memory computing applications related to inference and learning in artificial intelligence. A RRAM cell has a MIM (Metal insulator metal) structure that exhibits reversible resistive switching on application of positive or negative voltage. But detailed studies on the power consumption, repeatability and retention …


Recent Advances And Machine Learning Techniques On Sickle Cell Disease, Noorh H. Alharbi, Rana O. Bameer, Shahad S. Geddan, Hajar M. Alharbi Dec 2020

Recent Advances And Machine Learning Techniques On Sickle Cell Disease, Noorh H. Alharbi, Rana O. Bameer, Shahad S. Geddan, Hajar M. Alharbi

Future Computing and Informatics Journal

Sickle cell disease is a severe hereditary disease caused by an abnormality of the red blood cells. The current therapeutic decision-making process applied to sickle cell disease includes monitoring a patient’s symptoms and complications and then adjusting the treatment accordingly. This process is time-consuming, which might result in serious consequences for patients’ lives and could lead to irreversible disease complications. Artificial intelligence, specifically machine learning, is a powerful technique that has been used to support medical decisions. This paper aims to review the recently developed machine learning models designed to interpret medical data regarding sickle cell disease. To propose an …


Models And Methods Of Designing Human-Machine Interaction-Oriented Interfaces, Ozod Radjabov, Shakhrillo Bobokulov, Behruz Boboqulov, Hojiyev Sunatullo Dec 2020

Models And Methods Of Designing Human-Machine Interaction-Oriented Interfaces, Ozod Radjabov, Shakhrillo Bobokulov, Behruz Boboqulov, Hojiyev Sunatullo

Bulletin of TUIT: Management and Communication Technologies

Formalization approaches of user interface design (UID) in conjunction with model driven techniques aim to improve the usability in terms of conformity to standards or style guides and to leverage code generation of interactive software systems, so that various UI platforms for web, desktop or mobile Applications are supported. Because large parts of the UI are described platform independent instead of platform dependent implementations, re-usability of the UI concept is also improved. However, UI formalization requires the usage of a formal UI description language and a higher level of abstractness compared to concrete UI code. These languages need to be …


Use Of Image Processing Algorithms For Mine Originating Waste Grain Size Determination, Sebastian Iwaszenko Dec 2020

Use Of Image Processing Algorithms For Mine Originating Waste Grain Size Determination, Sebastian Iwaszenko

Journal of Sustainable Mining

The utilization of mineral wastes from the mining industry is one of most challenging phases in the raw materials life cycle. In many countries, there are piles of mineral waste materials that date back to the previous century. There is also a constant stream of accompanying mineral matter excavated during everyday mine operation. This stream of waste matter is particularly notable for deep coal mining. Grain size composition of waste mineral matter is one of most important characteristics of coal originating waste material. This paper presents the use of image analysis for the determination of grain size composition of mineral …


A Bibliographic Survey On Detection Of Covid-19 Patients Using Various Sensors In The Field Of Iot, Rutuja Patil, Akshay Sharma, Divya Bhatia, Mugdha Kulkarni, Yashika Patl Dec 2020

A Bibliographic Survey On Detection Of Covid-19 Patients Using Various Sensors In The Field Of Iot, Rutuja Patil, Akshay Sharma, Divya Bhatia, Mugdha Kulkarni, Yashika Patl

Library Philosophy and Practice (e-journal)

Due to a pandemic situation arising from the past few decades and the covid -19 patients are increasing at the rapid rate. Looking in the near future an IOT model is build which can be useful for people in coming years and allows rapid testing and efficient testing methodologies using various sensors such as Temperature, Respiration, RFID etc which takes various parameters. The study focuses around 412 scientific documents such as Journals, articles, book chapters and Patents in various papers. These documents are extracted from the scopus databases after querying with the keywords related to covid patients and IOT. The …


Efficient End-To-End Autonomous Driving, Hesham Eraqi Dec 2020

Efficient End-To-End Autonomous Driving, Hesham Eraqi

Theses and Dissertations

Steering a car through traffic is a complex task that is difficult to cast into algorithms. Therefore, researchers turn to train artificial neural networks from front-facing camera data stream along with the associated steering angles. Nevertheless, most existing solutions consider only the visual camera frames as input, thus ignoring the temporal relationship between frames. In this work, we propose a Convolution Long Short-Term Memory Recurrent Neural Network (C-LSTM), which is end-to-end trainable, to learn both visual and dynamic temporal dependencies of driving. Additionally, We introduce posing the steering angle regression problem as classification while imposing a spatial relationship between the …


The Ftc And Ai Governance: A Regulatory Proposal, Michael Spiro Dec 2020

The Ftc And Ai Governance: A Regulatory Proposal, Michael Spiro

Seattle Journal of Technology, Environmental & Innovation Law

No abstract provided.


Survey On Deep Neural Networks In Speech And Vision Systems, M. Alam, Manar D. Samad, Lasitha Vidyaratne, ‪Alexander Glandon, Khan M. Iftekharuddin Dec 2020

Survey On Deep Neural Networks In Speech And Vision Systems, M. Alam, Manar D. Samad, Lasitha Vidyaratne, ‪Alexander Glandon, Khan M. Iftekharuddin

Computer Science Faculty Research

This survey presents a review of state-of-the-art deep neural network architectures, algorithms, and systems in speech and vision applications. Recent advances in deep artificial neural network algorithms and architectures have spurred rapid innovation and development of intelligent speech and vision systems. With availability of vast amounts of sensor data and cloud computing for processing and training of deep neural networks, and with increased sophistication in mobile and embedded technology, the next-generation intelligent systems are poised to revolutionize personal and commercial computing. This survey begins by providing background and evolution of some of the most successful deep learning models for intelligent …


Imparting 3d Representations To Artificial Intelligence For A Full Assessment Of Pressure Injuries., Sofia Zahia Dec 2020

Imparting 3d Representations To Artificial Intelligence For A Full Assessment Of Pressure Injuries., Sofia Zahia

Electronic Theses and Dissertations

During recent decades, researches have shown great interest to machine learning techniques in order to extract meaningful information from the large amount of data being collected each day. Especially in the medical field, images play a significant role in the detection of several health issues. Hence, medical image analysis remarkably participates in the diagnosis process and it is considered a suitable environment to interact with the technology of intelligent systems. Deep Learning (DL) has recently captured the interest of researchers as it has proven to be efficient in detecting underlying features in the data and outperformed the classical machine learning …


Automatic Target Recognition With Convolutional Neural Networks., Nada Baili Dec 2020

Automatic Target Recognition With Convolutional Neural Networks., Nada Baili

Electronic Theses and Dissertations

Automatic Target Recognition (ATR) characterizes the ability for an algorithm or device to identify targets or other objects based on data obtained from sensors, being commonly thermal. ATR is an important technology for both civilian and military computer vision applications. However, the current level of performance that is available is largely deficient compared to the requirements. This is mainly due to the difficulty of acquiring targets in realistic environments, and also to limitations of the distribution of classified data to the academic community for research purposes. This thesis proposes to solve the ATR task using Convolutional Neural Networks (CNN). We …


Global Privacy Concerns Of Facial Recognition Big Data, Myranda Westbrook Dec 2020

Global Privacy Concerns Of Facial Recognition Big Data, Myranda Westbrook

Honors Theses

Facial recognition technology is a system of automatic acknowledgement that recognizes individuals by categorizing specific features of their facial structure to link the scanned information to stored data. Within the past few decades facial recognition technology has been implemented on a large scale to increase the security measures needed to access personal information. This has been specifically used in surveillance systems, social media platforms, and mobile device access control. The extensive use of facial recognition systems has created challenges as it relates to biometric information control and privacy concerns. This concern raises the cost and benefit analysis of an individual’s …


Inverse Mapping Of Generative Adversarial Networks, Nicky Bayat Nov 2020

Inverse Mapping Of Generative Adversarial Networks, Nicky Bayat

Electronic Thesis and Dissertation Repository

Generative adversarial networks (GANs) synthesize realistic samples (image, audio, video, etc.) from a random latent vector. While many studies have explored various training configurations and architectures for GANs, the problem of inverting a generative model to extract latent vectors of given input images/audio has been inadequately investigated. Although there is exactly one generated output per given random vector, the mapping from an image/audio to its recovered latent vector can have more than one solution. We train a deep residual neural network (ResNet18) architecture to recover a latent vector for a given target that can be used to generate a face …


Machine Learning Prediction Of Shear Capacity Of Steel Fiber Reinforced Concrete, Wassim Ben Chaabene Nov 2020

Machine Learning Prediction Of Shear Capacity Of Steel Fiber Reinforced Concrete, Wassim Ben Chaabene

Electronic Thesis and Dissertation Repository

The use of steel fibers for concrete reinforcement has been growing in recent years owing to the improved shear strength and post-cracking toughness imparted by fiber inclusion. Yet, there is still lack of design provisions for steel fiber-reinforced concrete (SFRC) in building codes. This is mainly due to the complex shear transfer mechanism in SFRC. Existing empirical equations for SFRC shear strength have been developed with relatively limited data examples, making their accuracy restricted to specific ranges. To overcome this drawback, the present study suggests novel machine learning models based on artificial neural network (ANN) and genetic programming (GP) to …


A Systematic Literature Review With Bibliometric Meta-Analysis Of Deep Learning And 3d Reconstruction Methods In Image Based Food Volume Estimation Using Scopus, Web Of Science And Ieee Database, Prachi Kadam, Nayana Petkar, Shraddha Phansalkar Dr. Nov 2020

A Systematic Literature Review With Bibliometric Meta-Analysis Of Deep Learning And 3d Reconstruction Methods In Image Based Food Volume Estimation Using Scopus, Web Of Science And Ieee Database, Prachi Kadam, Nayana Petkar, Shraddha Phansalkar Dr.

Library Philosophy and Practice (e-journal)

Purpose- Estimation of food portions is necessary in image based dietary monitoring techniques. The purpose of this systematic survey is to identify peer reviewed literature in image-based food volume estimation methods in Scopus, Web of Science and IEEE database. It further analyzes bibliometric survey of image-based food volume estimation methods with 3D reconstruction and deep learning techniques.

Design/methodology/approach- Scopus, Web of Science and IEEE citation databases are used to gather the data. Using advanced keyword search and PRISMA approach, relevant papers were extracted, selected and analyzed. The bibliographic data of the articles published in the journals over the past …


A Structural Equation Model Analysis Of Computing Identity Sub-Constructs And Student Academic Persistence, Mohsen Taheri Nov 2020

A Structural Equation Model Analysis Of Computing Identity Sub-Constructs And Student Academic Persistence, Mohsen Taheri

FIU Electronic Theses and Dissertations

This dissertation explores the impact of computing identity sub-constructs on the academic persistence of computing students. This research provides models, quantified relationships, and insights to increase the number of graduates with the intention of pursuing a career in computing. Despite the growing significance of computer science and all the projected new jobs in computer science, many university and college programs suffer from low student persistence rates. One theoretical framework used to better understand persistence in other STEM disciplines is disciplinary identity. Disciplinary identity refers to how students see themselves with respect to a discipline. This study examines the effects of …


A Bibliometric Survey Of Smart Wearable In The Health Insurance Industry, Apeksha Shah, Swati Ahirrao, Shraddha Phansalkar, Ketan Kotecha Nov 2020

A Bibliometric Survey Of Smart Wearable In The Health Insurance Industry, Apeksha Shah, Swati Ahirrao, Shraddha Phansalkar, Ketan Kotecha

Library Philosophy and Practice (e-journal)

Smart wearables help real-time and remote monitoring of health data for effective diagnostic and preventive health care services. Wearable devices have the ability to track and monitor healthcare vitals such as heart rate, physical activities, BMI (Body Mass Index), blood pressure, and keeps an individual notified about the health status. Artificial Intelligence-enabled wearables show an ability to transform the health insurance sector. This would not only enable self-management of individual health but also help them focus from treatments to the preventions of health hazards. With this customer-centric approach to health care, it will enable the insurance companies to track the …


An Approach To Counting Vehicles From Pre-Recorded Video Using Computer Algorithms, Mishuk Majumder Nov 2020

An Approach To Counting Vehicles From Pre-Recorded Video Using Computer Algorithms, Mishuk Majumder

LSU Master's Theses

One of the fundamental sources of data for traffic analysis is vehicle counts, which can be conducted either by the traditional manual method or by automated means. Different agencies have guidelines for manual counting, but they are typically prepared for particular conditions. In the case of automated counting, different methods have been applied, but You Only Look Once (YOLO), a recently developed object detection model, presents new potential in automated vehicle counting. The first objective of this study was to formulate general guidelines for manual counting based on experience gained in the field. Another goal of this study was to …


Understanding Event Structure In Text, Mohammed Aldawsari Oct 2020

Understanding Event Structure In Text, Mohammed Aldawsari

FIU Electronic Theses and Dissertations

Stories often appear in textual form, for example, news stories are found in the form of newspaper articles, blogs, or broadcast transcripts, and so forth. These contain descriptions of current, past, or future events. Automatically extracting knowledge from these events descriptions is an important natural language processing (NLP) task, and understanding event structure aids in this knowledge extraction. Event structure is the fact that events may have relationships or internal structure, for example, be in a co-reference relationship with another event mention, or composed of subevents.

Understanding event structure has received less attention in NLP than is due. This work …


Optimizing The Performance Of Multi-Threaded Linear Algebra Libraries Based On Task Granularity, Shahrzad Shirzad Oct 2020

Optimizing The Performance Of Multi-Threaded Linear Algebra Libraries Based On Task Granularity, Shahrzad Shirzad

LSU Doctoral Dissertations

Linear algebra libraries play a very important role in many HPC applications. As larger datasets are created everyday, it also becomes crucial for the multi-threaded linear algebra libraries to utilize the compute resources properly. Moving toward exascale computing, the current programming models would not be able to fully take advantage of the advances in memory hierarchies, computer architectures, and networks. Asynchronous Many-Task(AMT) Runtime systems would be the solution to help the developers to manage the available parallelism. In this Dissertation we propose an adaptive solution to improve the performance of a linear algebra library based on a set of compile-time …


Challenges To Adopting Hybrid Methodology: Addressing Organizational Culture And Change Control Problems In Enterprise It Infrastructure Projects, Harishankar Krishnakumar Oct 2020

Challenges To Adopting Hybrid Methodology: Addressing Organizational Culture And Change Control Problems In Enterprise It Infrastructure Projects, Harishankar Krishnakumar

Dissertations and Theses

IT infrastructure projects have long been an overlooked field superseded by the more popular software development silos and cross-functional project teams when it comes to enterprise Agile transformations. This paper presents a systematic literature review by leveraging a qualitative research methodology based on empirical evidence provided in contemporary scholarly research articles to explore how certain variables such as organizational culture- including team structure, leadership hierarchy, geolocation, etc. along with an organization’s change management processes affect the adoption of a Hybrid/Agile project management methodology, focusing on reported challenges and critical success factors that define such large-scale enterprise transformations. The salient features …


3d Reconstruction Of Spine Image From 2d Mri Slices Along One Axis, Somoballi Ghoshal, Sourav Banu, Amlan Chakrabarti, Susmita Sur-Kolay, Alok Pandit Oct 2020

3d Reconstruction Of Spine Image From 2d Mri Slices Along One Axis, Somoballi Ghoshal, Sourav Banu, Amlan Chakrabarti, Susmita Sur-Kolay, Alok Pandit

Journal Articles

Magnetic resonance imaging (MRI) is a very effective method for identifying any abnormality in the structure and physiology of the spine. However, MRI is time consuming as well as costly. In this work, the authors propose an algorithm which can reduce the time of MRI and thus the cost, with minimal compromise on accuracy. They reconstruct a three-dimensional (3D) image of the spine from a sequence of 2D MRI slices along any one axis with reasonable slice gap. In order to preserve the image at the edges properly, they regenerate the 3D image by using a combination of bicubic and …


Interactive Virtual Training: Implementation For Early Career Teachers To Practice Classroom Behavior Management, Alban Delamarre Oct 2020

Interactive Virtual Training: Implementation For Early Career Teachers To Practice Classroom Behavior Management, Alban Delamarre

FIU Electronic Theses and Dissertations

Teachers that are equipped with the skills to manage and prevent disruptive behaviors increase the potential for their students to achieve academically and socially. Student success increases when prevention strategies and effective classroom behavior management (CBM) are implemented in the classroom. However, teachers with less than 5 years of experience, early career teachers (ECTs), are ill equipped to handle disruptive students. ECTs describe disruptive behaviors as a major factor for stress given their limited training in CBM. As a result, disruptive behaviors are reported by ECTs as one of the main reasons for leaving the field.

Virtual training environments (VTEs) …


Bibliometric Survey On Biometric Iris Liveness Detection, Smita Khade, Dr.Swati Ahirrao, Dr. Sudeep Thepade Oct 2020

Bibliometric Survey On Biometric Iris Liveness Detection, Smita Khade, Dr.Swati Ahirrao, Dr. Sudeep Thepade

Library Philosophy and Practice (e-journal)

Authentication is an essential step for giving access to resources to authorized individuals and prevent leakage of confidential information. The traditional authentication systems like a pin, card, a password could not differentiate among the authorized users and fakers who have an illegal access to the system. Traditional authentication technique never alerts about the unwanted access to the system. The device that allows the automatic identification of an individual is known as a biometric system. It is not required to remember a password, card, and pin code in the Bio-metric system. Numerous biometric characteristics like the fingerprint, iris, palm print, face …


A Bibliometric Analysis Of Online Extremism Detection, Mayur Gaikwad, Swati Ahirrao, Shraddha Pankaj Phansalkar, Ketan Kotecha Oct 2020

A Bibliometric Analysis Of Online Extremism Detection, Mayur Gaikwad, Swati Ahirrao, Shraddha Pankaj Phansalkar, Ketan Kotecha

Library Philosophy and Practice (e-journal)

The Internet has become an essential part of modern communication. People are sharing ideas, thoughts, and beliefs easily, using social media. This sharing of ideas has raised a big problem like the spread of the radicalized extremist ideas. The various extremist organizations use the social media as a propaganda tool. The extremist organizations actively radicalize and recruit youths by sharing inciting material on social media. Extremist organizations use social media to influence people to carry out lone-wolf attacks. Social media platforms employ various strategies to identify and remove the extremist content. But due to the sheer amount of data and …


A Bibliometric Survey On Cognitive Document Processing, Dipali Baviskar, Swati Ahirrao, Ketan Kotecha Oct 2020

A Bibliometric Survey On Cognitive Document Processing, Dipali Baviskar, Swati Ahirrao, Ketan Kotecha

Library Philosophy and Practice (e-journal)

Heterogenous and voluminous unstructured data is produced from various sources like emails, social media tweets, reviews, videos, audio, images, PDFs, scanned documents, etc. Organizations need to store this wide range of unstructured data for more and longer periods so that they can examine information all the more profoundly to make a better decision and extracting useful insights. Manual processing of such unstructured data is always a challenging, time-consuming, and expensive task for any organization. Automating unstructured document processing using Optical Character Recognition (OCR) and Robotics Process Automation (RPA), seems to have limitations, as those techniques are driven by rules or …


A Bibliometric Survey On The Reliable Software Delivery Using Predictive Analysis, Jalaj Pachouly, Swati Ahirrao, Ketan Kotecha Oct 2020

A Bibliometric Survey On The Reliable Software Delivery Using Predictive Analysis, Jalaj Pachouly, Swati Ahirrao, Ketan Kotecha

Library Philosophy and Practice (e-journal)

Delivering a reliable software product is a fairly complex process, which involves proper coordination from the various teams in planning, execution, and testing for delivering software. Most of the development time and the software budget's cost is getting spent finding and fixing bugs. Rework and side effect costs are mostly not visible in the planned estimates, caused by inherent bugs in the modified code, which impact the software delivery timeline and increase the cost. Artificial intelligence advancements can predict the probable defects with classification based on the software code changes, helping the software development team make rational decisions. Optimizing the …


A Novel Energy-Efficient Sensor Cloud Model Using Data Prediction And Forecasting Techniques, Kalyan Das, Satyabrata Das, Aurobindo Mohapatra Oct 2020

A Novel Energy-Efficient Sensor Cloud Model Using Data Prediction And Forecasting Techniques, Kalyan Das, Satyabrata Das, Aurobindo Mohapatra

Karbala International Journal of Modern Science

An energy-efficient sensor cloud model is proposed based on the combination of prediction and forecasting methods. The prediction using Artificial Neural Network (ANN) with single activation function and forecasting using Autoregressive Integrated Moving Average (ARIMA) models use to reduce the communication of data. The requests of the users generate in every second. These requests must be transferred to the wireless sensor network (WSN) through the cloud system in the traditional model, which consumes extra energy. In our approach, instead of one second, the sensors generally communicate with the cloud every 24 hours, and most of the requests reply using the …


A Novel Framework Using Neutrosophy For Integrated Speech And Text Sentiment Analysis, Florentin Smarandache, Kritika Mishra, Ilanthenral Kandasamy, Vasantha Kandasamy W.B. Oct 2020

A Novel Framework Using Neutrosophy For Integrated Speech And Text Sentiment Analysis, Florentin Smarandache, Kritika Mishra, Ilanthenral Kandasamy, Vasantha Kandasamy W.B.

Branch Mathematics and Statistics Faculty and Staff Publications

With increasing data on the Internet, it is becoming difficult to analyze every bit and make sure it can be used efficiently for all the businesses. One useful technique using Natural Language Processing (NLP) is sentiment analysis. Various algorithms can be used to classify textual data based on various scales ranging from just positive-negative, positive-neutral-negative to a wide spectrum of emotions. While a lot of work has been done on text, only a lesser amount of research has been done on audio datasets. An audio file contains more features that can be extracted from its amplitude and frequency than a …


Forecasting Vegetation Health In The Mena Region By Predicting Vegetation Indicators With Machine Learning Models, Sachi Perera, Wenzhao Li, Erik Linstead, Hesham El-Askary Sep 2020

Forecasting Vegetation Health In The Mena Region By Predicting Vegetation Indicators With Machine Learning Models, Sachi Perera, Wenzhao Li, Erik Linstead, Hesham El-Askary

Mathematics, Physics, and Computer Science Faculty Articles and Research

Machine learning (ML) techniques can be applied to predict and monitor drought conditions due to climate change. Predicting future vegetation health indicators (such as EVI, NDVI, and LAI) is one approach to forecast drought events for hotspots (e.g. Middle East and North Africa (MENA) regions). Recently, ML models were implemented to predict EVI values using parameters such as land types, time series, historical vegetation indices, land surface temperature, soil moisture, evapotranspiration etc. In this work, we collected the MODIS atmospherically corrected surface spectral reflectance imagery with multiple vegetation related indices for modeling and evaluation of drought conditions in the MENA …


Supporting Coordination Of Children With Asd Using Neurological Music Therapy: A Pilot Randomized Control Trial Comparing An Elastic Touch-Display With Tambourines, Franceli L. Cibrian, Melisa Madrigal, Marina Avelais, Monica Tentori Sep 2020

Supporting Coordination Of Children With Asd Using Neurological Music Therapy: A Pilot Randomized Control Trial Comparing An Elastic Touch-Display With Tambourines, Franceli L. Cibrian, Melisa Madrigal, Marina Avelais, Monica Tentori

Engineering Faculty Articles and Research

Aim

To evaluate the efficacy of Neurologic Music Therapy (NMT) using a traditional and a technological intervention (elastic touch-display) in improving the coordination of children with Autism Spectrum Disorder (ASD), as a primary outcome, and the timing and strength control of their movements as secondary outcomes.

Methods

Twenty-two children with ASD completed 8 NMT sessions, as a part of a 2-month intervention. Participants were randomly assigned to either use an elastic touch-display (experimental group) or tambourines (control group). We conducted pre- and post- assessment evaluations, including the Developmental Coordination Disorder Questionnaire (DCDQ) and motor assessments related to the control of …