Open Access. Powered by Scholars. Published by Universities.®
Electrical and Computer Engineering Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Computer Engineering (9)
- Computer Sciences (7)
- Physical Sciences and Mathematics (7)
- Artificial Intelligence and Robotics (5)
- Other Electrical and Computer Engineering (4)
-
- Software Engineering (4)
- Systems and Communications (4)
- Data Science (2)
- Digital Communications and Networking (2)
- Library and Information Science (2)
- Medicine and Health Sciences (2)
- Power and Energy (2)
- Social and Behavioral Sciences (2)
- Systems Architecture (2)
- Analytical, Diagnostic and Therapeutic Techniques and Equipment (1)
- Anatomy (1)
- Applied Behavior Analysis (1)
- Applied Mathematics (1)
- Archival Science (1)
- Bioinformatics (1)
- Biomedical (1)
- Biomedical Engineering and Bioengineering (1)
- Biostatistics (1)
- Business (1)
- Business Administration, Management, and Operations (1)
- Business Intelligence (1)
- Cancer Biology (1)
- Cataloging and Metadata (1)
- Institution
Articles 1 - 17 of 17
Full-Text Articles in Electrical and Computer Engineering
A Novel Graph Neural Network-Based Framework For Automatic Modulation Classification In Mobile Environments, Pejman Ghasemzadeh
A Novel Graph Neural Network-Based Framework For Automatic Modulation Classification In Mobile Environments, Pejman Ghasemzadeh
Department of Electrical and Computer Engineering: Dissertations, Theses, and Student Research
Automatic modulation classification (AMC) refers to a signal processing procedure through which the modulation type and order of an observed signal are identified without any prior information about the communications setup. AMC has been recognized as one of the essential measures in various communications research fields such as intelligent modem design, spectrum sensing and management, and threat detection. The research literature in AMC is limited to accounting only for the noise that affects the received signal, which makes their models applicable for stationary environments. However, a more practical and real-world application of AMC can be found in mobile environments where …
Chatgpt As Metamorphosis Designer For The Future Of Artificial Intelligence (Ai): A Conceptual Investigation, Amarjit Kumar Singh (Library Assistant), Dr. Pankaj Mathur (Deputy Librarian)
Chatgpt As Metamorphosis Designer For The Future Of Artificial Intelligence (Ai): A Conceptual Investigation, Amarjit Kumar Singh (Library Assistant), Dr. Pankaj Mathur (Deputy Librarian)
Library Philosophy and Practice (e-journal)
Abstract
Purpose: The purpose of this research paper is to explore ChatGPT’s potential as an innovative designer tool for the future development of artificial intelligence. Specifically, this conceptual investigation aims to analyze ChatGPT’s capabilities as a tool for designing and developing near about human intelligent systems for futuristic used and developed in the field of Artificial Intelligence (AI). Also with the helps of this paper, researchers are analyzed the strengths and weaknesses of ChatGPT as a tool, and identify possible areas for improvement in its development and implementation. This investigation focused on the various features and functions of ChatGPT that …
Rafid: A Lightweight Approach To Radio Frequency Interference Detection In Time Domain Using Lstm And Statistical Analysis, Luke A. Smith, Vishesh Kumar Tanwar, Maciej Jan Zawodniok, Sanjay Kumar Madria
Rafid: A Lightweight Approach To Radio Frequency Interference Detection In Time Domain Using Lstm And Statistical Analysis, Luke A. Smith, Vishesh Kumar Tanwar, Maciej Jan Zawodniok, Sanjay Kumar Madria
Electrical and Computer Engineering Faculty Research & Creative Works
Recently, the utilization of Radio Frequency (RF) devices has increased exponentially over numerous vertical platforms. This rise has led to an abundance of Radio Frequency Interference (RFI) continues to plague RF systems today. The continued crowding of the RF spectrum makes RFI efficient and lightweight mitigation critical. Detecting and localizing the interfering signals is the foremost step for mitigating RFI concerns. Addressing these challenges, we propose a novel and lightweight approach, namely RaFID, to detect and locate the RFI by incorporating deep neural networks (DNNs) and statistical analysis via batch-wise mean aggregation and standard deviation (SD) calculations. RaFID investigates the …
Knowledge-Driven Drug-Use Namedentity Recognition With Distant Supervision, Goonmeet Bajaj, Ugur Kursuncu, Manas Gaur, Usha Lokala, Ayaz Hyder, Srinivasan Parthasarathy, Amit Sheth
Knowledge-Driven Drug-Use Namedentity Recognition With Distant Supervision, Goonmeet Bajaj, Ugur Kursuncu, Manas Gaur, Usha Lokala, Ayaz Hyder, Srinivasan Parthasarathy, Amit Sheth
Publications
As Named Entity Recognition (NER) has been essential in identifying critical elements of unstructured content, generic NER tools remain limited in recognizing entities specific to a domain, such as drug use and public health. For such high-impact areas, accurately capturing relevant entities at a more granular level is critical, as this information influences real-world processes. On the other hand, training NER models for a specific domain without handcrafted features requires an extensive amount of labeled data, which is expensive in human effort and time. In this study, we employ distant supervision utilizing a domain-specific ontology to reduce the need for …
A Machine Learning Framework For Identifying Molecular Biomarkers From Transcriptomic Cancer Data, Md Abdullah Al Mamun
A Machine Learning Framework For Identifying Molecular Biomarkers From Transcriptomic Cancer Data, Md Abdullah Al Mamun
FIU Electronic Theses and Dissertations
Cancer is a complex molecular process due to abnormal changes in the genome, such as mutation and copy number variation, and epigenetic aberrations such as dysregulations of long non-coding RNA (lncRNA). These abnormal changes are reflected in transcriptome by turning oncogenes on and tumor suppressor genes off, which are considered cancer biomarkers.
However, transcriptomic data is high dimensional, and finding the best subset of genes (features) related to causing cancer is computationally challenging and expensive. Thus, developing a feature selection framework to discover molecular biomarkers for cancer is critical.
Traditional approaches for biomarker discovery calculate the fold change for each …
A Deep Learning Approach To Design And Discover Sustainable Cementitious Binders: Strategies To Learn From Small Databases And Develop Closed-Form Analytical Models, Taihao Han, Sai Akshay Ponduru, Rachel Cook, Jie Huang, Gaurav Sant, Aditya Kumar
A Deep Learning Approach To Design And Discover Sustainable Cementitious Binders: Strategies To Learn From Small Databases And Develop Closed-Form Analytical Models, Taihao Han, Sai Akshay Ponduru, Rachel Cook, Jie Huang, Gaurav Sant, Aditya Kumar
Electrical and Computer Engineering Faculty Research & Creative Works
To reduce the energy-intensity and carbon footprint of Portland cement (PC), the prevailing practice embraced by concrete technologists is to partially replace the PC in concrete with supplementary cementitious materials [SCMs: geological materials (e.g., limestone); industrial by-products (e.g., fly ash); and processed materials (e.g., calcined clay)]. Chemistry and content of the SCM profoundly affect PC hydration kinetics; which, in turn, dictates the evolutions of microstructure and properties of the [PC + SCM] binder. Owing to the substantial diversity in SCMs' compositions-plus the massive combinatorial spaces, and the highly nonlinear and mutually-interacting processes that arise from SCM-PC interactions-state-of-the-art computational models are …
Class-Incremental Learning For Wireless Device Identification In Iot, Yongxin Liu, Jian Wang, Jianqiang Li, Shuteng Niu, Houbing Song
Class-Incremental Learning For Wireless Device Identification In Iot, Yongxin Liu, Jian Wang, Jianqiang Li, Shuteng Niu, Houbing Song
Publications
Deep Learning (DL) has been utilized pervasively in the Internet of Things (IoT). One typical application of DL in IoT is device identification from wireless signals, namely Noncryptographic Device Identification (NDI). However, learning components in NDI systems have to evolve to adapt to operational variations, such a paradigm is termed as Incremental Learning (IL). Various IL algorithms have been proposed and many of them require dedicated space to store the increasing amount of historical data, and therefore, they are not suitable for IoT or mobile applications. However, conventional IL schemes can not provide satisfying performance when historical data are not …
Zero-Bias Deep Learning Enabled Quick And Reliable Abnormality Detection In Iot, Yongxin Liu, Jian Wang, Jianqiang Li, Shuteng Niu, Houbing Song
Zero-Bias Deep Learning Enabled Quick And Reliable Abnormality Detection In Iot, Yongxin Liu, Jian Wang, Jianqiang Li, Shuteng Niu, Houbing Song
Publications
Abnormality detection is essential to the performance of safety-critical and latency-constrained systems. However, as systems are becoming increasingly complicated with a large quantity of heterogeneous data, conventional statistical change point detection methods are becoming less effective and efficient. Although Deep Learning (DL) and Deep Neural Networks (DNNs) are increasingly employed to handle heterogeneous data, they still lack theoretic assurable performance and explainability. This paper integrates zero-bias DNN and Quickest Event Detection algorithms to provide a holistic framework for quick and reliable detection of both abnormalities and time-dependent abnormal events in Internet of Things (IoT).We first use the zero bias dense …
Bibliometric Survey On Multipurpose Face Recognition System Using Deep Learning, Priyanka Tupe-Waghmare, Rahul Raghvendra Joshi Prof.
Bibliometric Survey On Multipurpose Face Recognition System Using Deep Learning, Priyanka Tupe-Waghmare, Rahul Raghvendra Joshi Prof.
Library Philosophy and Practice (e-journal)
Face recognition is a new concept coming up lately and flourishing in the field of network access and multimedia information systems. Since humans are at the focus of attention in variety of applications containing videos, the concept of face recognition is rising in popularity. Several areas involving network security, retrieval and indexing of the content, and compression of videos gain a lot of benefit from the face recognition systems and related technology. Controlling the access of the networks with the help of facial recognition not only makes it difficult for the hackers to steal the information but also makes the …
Zero-Bias Deep Learning For Accurate Identification Of Internet Of Things (Iot) Devices, Yongxin Liu, Houbing Song, Thomas Yang, Jian Wang, Jianqiang Li, Shuteng Niu, Zhong Ming
Zero-Bias Deep Learning For Accurate Identification Of Internet Of Things (Iot) Devices, Yongxin Liu, Houbing Song, Thomas Yang, Jian Wang, Jianqiang Li, Shuteng Niu, Zhong Ming
Publications
The Internet of Things (IoT) provides applications and services that would otherwise not be possible. However, the open nature of IoT makes it vulnerable to cybersecurity threats. Especially, identity spoofing attacks, where an adversary passively listens to the existing radio communications and then mimic the identity of legitimate devices to conduct malicious activities. Existing solutions employ cryptographic signatures to verify the trustworthiness of received information. In prevalent IoT, secret keys for cryptography can potentially be disclosed and disable the verification mechanism. Noncryptographic device verification is needed to ensure trustworthy IoT. In this article, we propose an enhanced deep learning framework …
An End-To-End Trainable Method For Generating And Detecting Fiducial Markers, J Brennan Peace
An End-To-End Trainable Method For Generating And Detecting Fiducial Markers, J Brennan Peace
Department of Electrical and Computer Engineering: Dissertations, Theses, and Student Research
Existing fiducial markers are designed for efficient detection and decoding. The methods are computationally efficient and capable of demonstrating impressive results, however, the markers are not explicitly designed to stand out in natural environments and their robustness is difficult to infer from relatively limited analysis. Worsening performance in challenging image capture scenarios - such as poorly exposed images, motion blur, and off-axis viewing - sheds light on their limitations. The method introduced in this work is an end-to-end trainable method for designing fiducial markers and a complimentary detector. By introducing back-propagatable marker augmentation and superimposition into training, the method learns …
Artificial Intelligent Based Energy And Demand Side Management For Microgrids And Smart Homes Considering Customer Privacy, Ahmed F. Ebrahim
Artificial Intelligent Based Energy And Demand Side Management For Microgrids And Smart Homes Considering Customer Privacy, Ahmed F. Ebrahim
FIU Electronic Theses and Dissertations
The rapid development of various power electronics applications facilitates the integration of many smart grid applications in recent years. However, integration of intermittent renewable energy sources, highly stochastic electric vehicles (EVs) activities on the grid and time-varying smart loads have increased the level of grid vulnerability to unusual and high complexity and quality-related problems. Among these problems is to accurately estimate the real contribution and consumption of household loads, in the era of smart appliances and interoperability operation, and its relative impact to the grid’s operation. Specifically, household loads represent a significant percentage of electrical energy consumption and, therefore, could …
Modern Techniques For Discovering Digital Steganography, Michael Hegarty, Anthony Keane
Modern Techniques For Discovering Digital Steganography, Michael Hegarty, Anthony Keane
Conference papers
Digital steganography can be difficult to detect and as such is an ideal way of engaging in covert communications across the Internet. This research paper is a work-in-progress report on instances of steganography that were identified on websites on the Internet including some from the DarkWeb using the application of new methods of deep learning algorithms. This approach to the identification of Least Significant Bit (LSB) Steganography using Convolutional Neural Networks (CNN) has demonstrated some efficiency for image classification. The CNN algorithm was trained using datasets of images with known steganography and then applied to datasets with images to identify …
Similarity-Based Chained Transfer Learning For Energy Forecasting With Big Data, Yifang Tian, Ljubisa Sehovac, Katarina Grolinger
Similarity-Based Chained Transfer Learning For Energy Forecasting With Big Data, Yifang Tian, Ljubisa Sehovac, Katarina Grolinger
Electrical and Computer Engineering Publications
Smart meter popularity has resulted in the ability to collect big energy data and has created opportunities for large-scale energy forecasting. Machine Learning (ML) techniques commonly used for forecasting, such as neural networks, involve computationally intensive training typically with data from a single building or a single aggregated load to predict future consumption for that same building or aggregated load. With hundreds of thousands of meters, it becomes impractical or even infeasible to individually train a model for each meter. Consequently, this paper proposes Similarity-Based Chained Transfer Learning (SBCTL), an approach for building neural network-based models for many meters by …
Forecasting Building Energy Consumption With Deep Learning: A Sequence To Sequence Approach, Ljubisa Sehovac, Cornelius Nesen, Katarina Grolinger
Forecasting Building Energy Consumption With Deep Learning: A Sequence To Sequence Approach, Ljubisa Sehovac, Cornelius Nesen, Katarina Grolinger
Electrical and Computer Engineering Publications
Energy Consumption has been continuously increasing due to the rapid expansion of high-density cities, and growth in the industrial and commercial sectors. To reduce the negative impact on the environment and improve sustainability, it is crucial to efficiently manage energy consumption. Internet of Things (IoT) devices, including widely used smart meters, have created possibilities for energy monitoring as well as for sensor based energy forecasting. Machine learning algorithms commonly used for energy forecasting such as feedforward neural networks are not well-suited for interpreting the time dimensionality of a signal. Consequently, this paper uses Recurrent Neural Networks (RNN) to capture time …
Deep Learning: Edge-Cloud Data Analytics For Iot, Katarina Grolinger, Ananda M. Ghosh
Deep Learning: Edge-Cloud Data Analytics For Iot, Katarina Grolinger, Ananda M. Ghosh
Electrical and Computer Engineering Publications
Sensors, wearables, mobile and other Internet of Thing (IoT) devices are becoming increasingly integrated in all aspects of our lives. They are capable of collecting massive quantities of data that are typically transmitted to the cloud for processing. However, this results in increased network traffic and latencies. Edge computing has a potential to remedy these challenges by moving computation physically closer to the network edge where data are generated. However, edge computing does not have sufficient resources for complex data analytics tasks. Consequently, this paper investigates merging cloud and edge computing for IoT data analytics and presents a deep learning-based …
Deep Neural Networks With Confidence Sampling For Electrical Anomaly Detection, Norman L. Tasfi, Wilson A. Higashino, Katarina Grolinger, Miriam A. M. Capretz
Deep Neural Networks With Confidence Sampling For Electrical Anomaly Detection, Norman L. Tasfi, Wilson A. Higashino, Katarina Grolinger, Miriam A. M. Capretz
Electrical and Computer Engineering Publications
The increase in electrical metering has created tremendous quantities of data and, as a result, possibilities for deep insights into energy usage, better energy management, and new ways of energy conservation. As buildings are responsible for a significant portion of overall energy consumption, conservation efforts targeting buildings can provide tremendous effect on energy savings. Building energy monitoring enables identification of anomalous or unexpected behaviors which, when corrected, can lead to energy savings. Although the available data is large, the limited availability of labels makes anomaly detection difficult. This research proposes a deep semi-supervised convolutional neural network with confidence sampling for …