Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- University of Nebraska - Lincoln (84)
- Singapore Management University (28)
- University of Texas at El Paso (27)
- Marquette University (25)
- Technological University Dublin (15)
-
- University of Dayton (14)
- Edith Cowan University (12)
- University of New Haven (10)
- Washington University in St. Louis (10)
- Old Dominion University (7)
- Fordham University (6)
- Florida International University (5)
- The University of Maine (5)
- University of Pennsylvania Carey Law School (5)
- Western University (5)
- Embry-Riddle Aeronautical University (4)
- University of New Mexico (4)
- Bowling Green State University (3)
- Tennessee State University (3)
- American University in Cairo (2)
- California Polytechnic State University, San Luis Obispo (2)
- Morehead State University (2)
- Purdue University (2)
- San Jose State University (2)
- University of Louisville (2)
- University of North Dakota (2)
- University of South Carolina (2)
- Virginia Commonwealth University (2)
- Chapman University (1)
- Cleveland State University (1)
- Keyword
-
- Digital forensics (10)
- Robotics (5)
- Approximate matching (4)
- Interpolation (4)
- Machine learning (4)
-
- Mrsh-v2 (4)
- Social media (4)
- UAV (4)
- Cloud computing (3)
- Human action recognition (3)
- Sdhash (3)
- Agriculture (2)
- Algorithms (2)
- Automation (2)
- Autonomy (2)
- Bag-of-words (2)
- Beamforming (2)
- Big data (2)
- Bloom filter (2)
- Cassandra (2)
- Cloud forensics (2)
- Cloud storage (2)
- Cluster (2)
- Communications (2)
- Condition monitoring (2)
- Cryptography (2)
- Cubic spline (2)
- Curricula (2)
- Cyberinfrastructure (2)
- DNN image representation (2)
- Publication
-
- Department of Electrical and Computer Engineering: Faculty Publications (52)
- Research Collection School Of Computing and Information Systems (28)
- Departmental Technical Reports (CS) (27)
- Electrical and Computer Engineering Faculty Research and Publications (25)
- Electrical and Computer Engineering Faculty Publications (14)
-
- Department of Computer Science and Engineering: Dissertations, Theses, and Student Research (12)
- Australian Digital Forensics Conference (11)
- All Computer Science and Engineering Research (10)
- Electrical & Computer Engineering and Computer Science Faculty Publications (10)
- Faculty Publications (9)
- CSE Conference and Workshop Papers (8)
- Dissertations (7)
- Engineering Technology Faculty Publications (6)
- All Faculty Scholarship (5)
- Conference papers (5)
- Electrical and Computer Engineering Publications (5)
- FIU Electronic Theses and Dissertations (5)
- Branch Mathematics and Statistics Faculty and Staff Publications (4)
- University of Maine Office of Research Administration: Grant Reports (4)
- CSE Technical Reports (3)
- Computer Science Faculty Research (3)
- Computer and Electronics Engineering: Dissertations, Theses, and Student Research (3)
- Visual Communications and Technology Education Faculty Publications (3)
- Articles (2)
- Computer Science Faculty Publications (2)
- Computer Science Publications (2)
- Department of Electrical Engineering and Computer Science - Daytona Beach (2)
- Department of Electrical and Computer Engineering: Dissertations, Theses, and Student Research (2)
- ENSI Informer Magazine Archive (2)
- Faculty Scholarship (2)
- File Type
Articles 1 - 30 of 304
Full-Text Articles in Engineering
A Kinect-Based System For Automatic Recording Of Some Pigeon Behaviors, Damian Lyons, James Macdonall, Kelly Cunningham
A Kinect-Based System For Automatic Recording Of Some Pigeon Behaviors, Damian Lyons, James Macdonall, Kelly Cunningham
Faculty Publications
Contact switches and touch screens are the state of the art for recording pigeons’ pecking behavior. Recording other behavior, however, requires a different sensor for each behavior, and some behaviors cannot easily be recorded. We present a flexible and inexpensive image-based approach to detecting and counting pigeon behaviors that is based on the Kinect sensor from Microsoft. Although the system is as easy to set up and use as the standard approaches, it is more flexible because it can record behaviors in addition to key pecking. In this article, we show how both the fast, fine motion of key pecking …
Responses To Catastrophic Agi Risk: A Survey, Kaj Sotala, Roman V. Yampolskiy
Responses To Catastrophic Agi Risk: A Survey, Kaj Sotala, Roman V. Yampolskiy
Faculty Scholarship
Many researchers have argued that humanity will create artificial general intelligence (AGI) within the next twenty to one hundred years. It has been suggested that AGI may inflict serious damage to human well-being on a global scale ('catastrophic risk'). After summarizing the arguments for why AGI may pose such a risk, we review the fields proposed responses to AGI risk. We consider societal proposals, proposals for external constraints on AGI behaviors and proposals for creating AGIs that are safe due to their internal design.
Coordinated Control And Estimation Of Multiagent Systems With Engineering Applications, Housheng Su, Michael Z.Q. Chen, Qing Hui, Wei Zhang, Fanglai Zhu
Coordinated Control And Estimation Of Multiagent Systems With Engineering Applications, Housheng Su, Michael Z.Q. Chen, Qing Hui, Wei Zhang, Fanglai Zhu
Department of Electrical and Computer Engineering: Faculty Publications
Recently, coordinated control and estimation problems have attracted a great deal of attention in different fields especially in biology, physics, computer science, and control engineering. Coordinated control and estimation problems have prominent characteristics of distributed control, local interaction, and self-organization. Research on multiagent coordinated control and estimation problems not only helps better understand the mechanisms of natural collective phenomena but also benefits the applications of cyberphysical systems.
This special issue focuses on theoretical and technological achievements in cooperative multiagent Systems. It contains twenty-six papers, the contents of which are summarized below.
Effects Of Training Datasets On Both The Extreme Learning Machine And Support Vector Machine For Target Audience Identification On Twitter, Siaw Ling Lo, David Cornforth, Raymond Chiong
Effects Of Training Datasets On Both The Extreme Learning Machine And Support Vector Machine For Target Audience Identification On Twitter, Siaw Ling Lo, David Cornforth, Raymond Chiong
Research Collection School Of Computing and Information Systems
The ability to identify or predict a target audience from the increasingly crowded social space will provide a company some competitive advantage over other companies. In this paper, we analyze various training datasets, which include Twitter contents of an account owner and its list of followers, using features generated in different ways for two machine learning approaches - the Extreme Learning Machine (ELM) and Support Vector Machine (SVM). Various configurations of the ELM and SVM have been evaluated. The results indicate that training datasets using features generated from the owner tweets achieve the best performance, relative to other feature sets. …
Human Action Classification Based On Sequential Bag-Of-Words Model, Hong Liu, Qiaoduo Zhang, Qianru Sun
Human Action Classification Based On Sequential Bag-Of-Words Model, Hong Liu, Qiaoduo Zhang, Qianru Sun
Research Collection School Of Computing and Information Systems
Recently, approaches utilizing spatial-temporal features have achieved great success in human action classification. However, they typically rely on bag-of-words (BoWs) model, and ignore the spatial and temporal structure information of visual words, bringing ambiguities among similar actions. In this paper, we present a novel approach called sequential BoWs for efficient human action classification. It captures temporal sequential structure by segmenting the entire action into sub-actions. Each sub-action has a tiny movement within a narrow range of action. Then the sequential BoWs are created, in which each sub-action is assigned with a certain weight and salience to highlight the distinguishing sections. …
Online Learning On Incremental Distance Metric For Person Re-Identification, Yuke Sun, Hong Liu, Qianru Sun
Online Learning On Incremental Distance Metric For Person Re-Identification, Yuke Sun, Hong Liu, Qianru Sun
Research Collection School Of Computing and Information Systems
Person re-identification is to match persons appearing across non-overlapping cameras. The matching is challenging due to visual ambiguities and disparities of human bodies. Most previous distance metrics are learned by off-line and supervised approaches. However, they are not practical in real-world applications in which online data comes in without any label. In this paper, a novel online learning approach on incremental distance metric, OL-IDM, is proposed. The approach firstly modifies Self-Organizing Incremental Neural Network (SOINN) using Mahalanobis distance metric to cluster incoming data into neural nodes. Such metric maximizes the likelihood of a true image pair matches with a smaller …
Media Usage Survey: Overall Comparison Of Faculty And Students, Gerd Gidion, Michael Grosch, Luiz Fernando Capretz, Ken Meadows Dr.
Media Usage Survey: Overall Comparison Of Faculty And Students, Gerd Gidion, Michael Grosch, Luiz Fernando Capretz, Ken Meadows Dr.
Electrical and Computer Engineering Publications
Recent developments in the use of technologies in education have provided unique opportunities for teaching and learning. This paper describes the results of a survey conducted at Western University (Canada) in 2013, regarding the use of media by students and instructors. The results of this study support the assumption that the media usage of students and instructors include a mixture of traditional and new media. The main traditional media continue to be important, and some new media have emerged as seemingly on equal footing or even more important than the traditional forms of media. Some new media that have recently …
Media Usage In Post-Secondary Education And Implications For Teaching And Learning, Gerd Gidion, Luiz Fernando Capretz, Ken Mead Dr., Michael Grosch Dr.
Media Usage In Post-Secondary Education And Implications For Teaching And Learning, Gerd Gidion, Luiz Fernando Capretz, Ken Mead Dr., Michael Grosch Dr.
Electrical and Computer Engineering Publications
The Web 2.0 has permeated academic life. The use of online information services in post-secondary education has led to dramatic changes in faculty teaching methods as well as in the learning and study behavior of students. At the same time, traditional information media, such as textbooks and printed handouts, still form the basic pillars of teaching and learning. This paper reports the results of a survey about media usage in teaching and learning conducted with Western University students and instructors, highlighting trends in the usage of new and traditional media in higher education by instructors and students. In addition, the …
Security Issues In Data Warehouse, Saiqa Aleem, Luiz Fernando Capretz, Faheem Ahmed Dr.
Security Issues In Data Warehouse, Saiqa Aleem, Luiz Fernando Capretz, Faheem Ahmed Dr.
Electrical and Computer Engineering Publications
Data Warehouse (DWH) provides storage for huge amounts of historical data from heterogeneous operational sources in the form of multidimensional views, thus supplying sensitive and useful information which help decision-makers to improve the organization’s business processes. A data warehouse environment must ensure that data collected and stored in one big repository are not vulnerable. A review of security approaches specifically for data warehouse environment and issues concerning each type of security approach have been provided in this paper.
Granularity Helps Explain Seemingly Irrational Features Of Human Decision Making, Joe Lorkowski, Vladik Kreinovich
Granularity Helps Explain Seemingly Irrational Features Of Human Decision Making, Joe Lorkowski, Vladik Kreinovich
Departmental Technical Reports (CS)
Starting from well-known studies by Kahmenan and Tarsky, researchers have found many examples when our decision making -- and our decision making -- seem to be irrational. In this chapter, we show that this seemingly irrational decision making can be explained if we take into account that human abilities to process information are limited; as a result, instead of the exact values of different quantities, we operate with granules that contain these values. On several examples, we show that optimization under such granularity restriction indeed leads to observed human decision making. Thus, granularity helps explain seemingly irrational human decision making.
When Can We Reduce Multi-Variable Range Estimation Problem To Two Fewer-Variable Problems?, Joe Lorkowski, Olga Kosheleva, Luc Longpre, Vladik Kreinovich
When Can We Reduce Multi-Variable Range Estimation Problem To Two Fewer-Variable Problems?, Joe Lorkowski, Olga Kosheleva, Luc Longpre, Vladik Kreinovich
Departmental Technical Reports (CS)
Sometimes, a function f of n variables can be represented as a composition of two functions of fewer variables. In this case, the problem of computing the range of f on given intervals can be reduced to two range-computation problems with fewer variables. In this paper, we describe a feasible algorithm that checks whether such a reduction is possible -- and, if it is possible, produces the desired reduction.
Interval Computations And Interval-Related Statistical Techniques: Estimating Uncertainty Of The Results Of Data Processing And Indirect Measurements, Vladik Kreinovich
Interval Computations And Interval-Related Statistical Techniques: Estimating Uncertainty Of The Results Of Data Processing And Indirect Measurements, Vladik Kreinovich
Departmental Technical Reports (CS)
In many practical situations, we only know the upper bound Δ on the measurement error: |Δx| ≤ Δ. In other words, we only know that the measurement error is located on the interval [−Δ, Δ]. The traditional approach is to assume that Δx is uniformly distributed on [−Δ, Δ]. In some situations, however, this approach underestimates the error of indirect measurements. It is therefore desirable to directly process this interval uncertainty. Such "interval computations" methods have been developed since the 1950s. In this paper, we provide a brief overview of related algorithms and results.
Every Sue Function Is A Ratio Of Two Multi-Linear Functions, Joe Lorkowski, Olga Kosheleva, Vladik Kreinovich
Every Sue Function Is A Ratio Of Two Multi-Linear Functions, Joe Lorkowski, Olga Kosheleva, Vladik Kreinovich
Departmental Technical Reports (CS)
We prove that the function computed by each single-use expression is a ratio of two multi-linear functions.
50 Years Of Fuzzy: From Discrete To Continuous To -- Where?, Vladik Kreinovich, Hung T. Nguyen, Olga Kosheleva, Rujira Ouncharoen
50 Years Of Fuzzy: From Discrete To Continuous To -- Where?, Vladik Kreinovich, Hung T. Nguyen, Olga Kosheleva, Rujira Ouncharoen
Departmental Technical Reports (CS)
While many objects and processes in the real world are discrete, from the computational viewpoint, discrete objects and processes are much more difficult to handle than continuous ones. As a result, a continuous approximation is often a useful way to describe discrete objects and processes. We show that the need for such an approximation explains many features of fuzzy techniques, and we speculate on to which promising future directions of fuzzy research this need can lead us.
How Much For An Interval? A Set? A Twin Set? A P-Box? A Kaucher Interval? Towards An Economics-Motivated Approach To Decision Making Under Uncertainty, Joe Lorkowski, Vladik Kreinovich
How Much For An Interval? A Set? A Twin Set? A P-Box? A Kaucher Interval? Towards An Economics-Motivated Approach To Decision Making Under Uncertainty, Joe Lorkowski, Vladik Kreinovich
Departmental Technical Reports (CS)
A natural idea of decision making under uncertainty is to assign a fair price to different alternatives, and then to use these fair prices to select the best alternative. In this paper, we show how to assign a fair price under different types of uncertainty.
Need For Data Processing Naturally Leads To Fuzzy Logic (And Neural Networks): Fuzzy Beyond Experts And Beyond Probabilities, Vladik Kreinovich, Hung T. Nguyen, Songsak Sriboonchitta
Need For Data Processing Naturally Leads To Fuzzy Logic (And Neural Networks): Fuzzy Beyond Experts And Beyond Probabilities, Vladik Kreinovich, Hung T. Nguyen, Songsak Sriboonchitta
Departmental Technical Reports (CS)
Fuzzy techniques have been originally designed to describe imprecise ("fuzzy") expert knowledge. Somewhat surprisingly, fuzzy techniques have also been successfully used in situations without expert knowledge, when all we have is data. In this paper, we explain this surprising phenomenon by showing that the need for optimal processing of data (including crisp data) naturally leads to fuzzy and neural data processing techniques.
This result shows the potential of fuzzy data processing. To maximally utilize this potential, we need to provide an operational meaning of the corresponding fuzzy degrees. We show that such a meaning can be extracted from the above …
Split-Step Approach To Electromagnetic Propagation Through Atmospheric Turbulence Using The Modified Von Karman Spectrum And Planar Apertures, Monish Ranjan Chatterjee, Fathi H.A. Mohamed
Split-Step Approach To Electromagnetic Propagation Through Atmospheric Turbulence Using The Modified Von Karman Spectrum And Planar Apertures, Monish Ranjan Chatterjee, Fathi H.A. Mohamed
Electrical and Computer Engineering Faculty Publications
The impact of atmospheric phase turbulence on Gaussian beam propagation along propagation paths of varying lengths is examined using multiple random phase screens. The work is motivated by research involving generation and encryption of acousto-optic chaos, and the interest in examining propagation of such chaotic waves through atmospheric turbulence. A phase screen technique is used to simulate perturbations to the refractive index of the medium through the propagation path. A power spectral density based on the modified von Karman spectrum model for turbulence is used to describe the random phase behavior of the medium.
In recent work, results for the …
Improved Performance Of Analog And Digital Acousto-Optic Modulation With Feedback Under Profiled Beam Propagation For Secure Communication Using Chaos, Fares S. Almehmadi, Monish Ranjan Chatterjee
Improved Performance Of Analog And Digital Acousto-Optic Modulation With Feedback Under Profiled Beam Propagation For Secure Communication Using Chaos, Fares S. Almehmadi, Monish Ranjan Chatterjee
Electrical and Computer Engineering Faculty Publications
Using intensity feedback, the closed-loop behavior of an acousto-optic hybrid device under profiled beam propagation has been recently shown to exhibit wider chaotic bands potentially leading to an increase in both the dynamic range and sensitivity to key parameters that characterize the encryption. In this work, a detailed examination is carried out vis-à-vis the robustness of the encryption/decryption process relative to parameter mismatch for both analog and pulse code modulation signals, and bit error rate (BER) curves are used to examine the impact of additive white noise.
The simulations with profiled input beams are shown to produce a stronger encryption …
Homogenous Ensemble Phonotactic Language Recognition Based On Svm Supervector Reconstruction, Wei-Wei Liu, Wei-Qiang Zhang, Michael T. Johnson, Jia Liu
Homogenous Ensemble Phonotactic Language Recognition Based On Svm Supervector Reconstruction, Wei-Wei Liu, Wei-Qiang Zhang, Michael T. Johnson, Jia Liu
Electrical and Computer Engineering Faculty Research and Publications
Currently, acoustic spoken language recognition (SLR) and phonotactic SLR systems are widely used language recognition systems. To achieve better performance, researchers combine multiple subsystems with the results often much better than a single SLR system. Phonotactic SLR subsystems may vary in the acoustic features vectors or include multiple language-specific phone recognizers and different acoustic models. These methods achieve good performance but usually compute at high computational cost. In this paper, a new diversification for phonotactic language recognition systems is proposed using vector space models by support vector machine (SVM) supervector reconstruction (SSR). In this architecture, the subsystems share the same …
Data Transport System, Rahav Dor
Data Transport System, Rahav Dor
All Computer Science and Engineering Research
To facilitate the WU Smart Home research [21] we built a system that collects data from sensors and uploads the data to the cloud. The system supports data collection from multiple locations (typically apartments) that are independent from each other, endowing the system with two benefit: distributed data collection and alleviating privacy concerns. Each location is managed by a local micro-server (μServer) that is responsible for receiving data packets from sensors and managing their transient storage. Periodically the μServer triggers a data transport process that moves the data to a cloud server where it is stored in a centralized database. …
A Performance Study Of Genetic Algorithm-Assisted Beamforming In Distributed Cognitive Radio Networks, Andrew Minturn
A Performance Study Of Genetic Algorithm-Assisted Beamforming In Distributed Cognitive Radio Networks, Andrew Minturn
Computer and Electronics Engineering: Dissertations, Theses, and Student Research
Cognitive Radio (CR) is a technology that has gained much interest recently due to the increasing scarcity of the radio frequency spectrum. Large portions of the radio frequency spectrum are licensed to users who then have exclusive access to the bandwidth, and unlicensed bands can be a challenge to use due to interference from unlicensed users. Despite the seeming scarcity, tests of bands allocated by the Federal Communications Committee (FCC) to licensed and unlicensed user have shown that many are underutilized and often unoccupied by the user to whom they are licensed. CR aims to exploit this unused spectrum and …
A Comparative Study Of Generalized Arc-Consistency Algorithms, Olufikayo S. Adetunji
A Comparative Study Of Generalized Arc-Consistency Algorithms, Olufikayo S. Adetunji
Department of Computer Science and Engineering: Dissertations, Theses, and Student Research
In this thesis, we study several algorithms for enforcing Generalized Arc-Consistency (GAC), which is the most popular consistency property for solving Constraint Satisfaction Problems (CSPs) with backtrack search. The popularity of such algorithms stems from their relative low cost and effectiveness in improving the performance of search. Virtually all commercial and public- domain constraint solvers include some implementation of a generic GAC algorithm. In recent years, several algorithms for enforcing GAC have been proposed in the literature that relies on increasingly complex data structures and mechanisms to improve performance. In this thesis, we study, assess, and compare a basic algorithm …
Is The Smartphone Smart In Kathmandu?, Seth Bird
Is The Smartphone Smart In Kathmandu?, Seth Bird
Independent Study Project (ISP) Collection
This is the extensive study of the smartphone in the developing country of Nepal, specifically the Kathmandu valley. Throughout my research I conducted various interviews with businesses, Tibetan refugees, and Nepali millennials (18yrs-33yrs) with the goal of identifying how the smartphone is used and understood. I chose the Kathmandu valley as my main area of research because the usage of smartphones in rural Nepal is extremely limited, and the valley represents the economic hub where progressive thinking flourishes. As a main objective I sought to understand how, if at all, the smartphone is used differently between Nepal and America. All …
Exploring User-Provided Connectivity, Mohammad H. Afrasiabi, Roch Guerin
Exploring User-Provided Connectivity, Mohammad H. Afrasiabi, Roch Guerin
All Computer Science and Engineering Research
Network services often exhibit positive and negative externalities that affect users' adoption decisions. One such service is "user-provided connectivity" or UPC. The service offers an alternative to traditional infrastructure-based communication services by allowing users to share their "home base" connectivity with other users, thereby increasing their access to connectivity. More users mean more connectivity alternatives, i.e., a positive externality, but also greater odds of having to share one's own connectivity, i.e., a negative externality. The tug of war between positive and negative externalities together with the fact that they often depend not just on how many but also which users …
Design And Development Of Geographical Information System (Gis) Map For Nuclear Waste Streams, Sandhya Appunni
Design And Development Of Geographical Information System (Gis) Map For Nuclear Waste Streams, Sandhya Appunni
FIU Electronic Theses and Dissertations
A nuclear waste stream is the complete flow of waste material from origin to treatment facility to final disposal. The objective of this study was to design and develop a Geographic Information Systems (GIS) module using Google Application Programming Interface (API) for better visualization of nuclear waste streams that will identify and display various nuclear waste stream parameters. A proper display of parameters would enable managers at Department of Energy waste sites to visualize information for proper planning of waste transport. The study also developed an algorithm using quadratic Bézier curve to make the map more understandable and usable. Microsoft …
Trends In Multimodal Human-Computer Interfaces, Jerry C. Schnepp
Trends In Multimodal Human-Computer Interfaces, Jerry C. Schnepp
Visual Communications and Technology Education Faculty Publications
Touch screens, voice commands and wireless gesture controllers have the potential to provide a more natural human-computer interface than traditional mice and keyboards. While these technologies are still evolving, the usefulness of such interfaces across industries is undeniable. In this presentation, the state of the art of human-computer interfaces will be explored. We will examine the qualifications necessary for these technologies to replace traditional interface hardware and project how far this interface revolution can take us.
Stable And Metastable Nanowires Displaying Locally Controllable Properties, Eli A. Sutter, Peter Werner Sutter
Stable And Metastable Nanowires Displaying Locally Controllable Properties, Eli A. Sutter, Peter Werner Sutter
Department of Electrical and Computer Engineering: Faculty Publications
(57) ABSTRACT Vapor-liquid-solid growth of nanowires is tailored to achieve complex one-dimensional material geometries using phase diagrams determined for nanoscale materials. Segmented one-dimensional nanowires having constant composition dis play locally variable electronic band structures that are deter mined by the diameter of the nanowires. The unique electrical and optical properties of the segmented nanowires are exploited to form electronic and optoelectronic devices. Using gold-germanium as a model system, in situ transmis sion electron microscopy establishes, for nanometer-sized Au Ge alloy drops at the tips of Ge nanowires (NWs), the parts of the phase diagram that determine their temperature dependent equilibrium …
Techniques For Efficient Execution Of Large-Scale Scientific Workflows In Distributed Environments, Selim Kalayci
Techniques For Efficient Execution Of Large-Scale Scientific Workflows In Distributed Environments, Selim Kalayci
FIU Electronic Theses and Dissertations
Scientific exploration demands heavy usage of computational resources for large-scale and deep analysis in many different fields. The complexity or the sheer scale of the computational studies can sometimes be encapsulated in the form of a workflow that is made up of numerous dependent components. Due to its decomposable and parallelizable nature, different components of a scientific workflow may be mapped over a distributed resource infrastructure to reduce time to results. However, the resource infrastructure may be heterogeneous, dynamic, and under diverse administrative control. Workflow management tools are utilized to help manage and deal with various aspects in the lifecycle …
Identifying The High-Value Social Audience From Twitter Through Text-Mining Methods, Siaw Ling Lo, David Cornforth, Raymond Chiong
Identifying The High-Value Social Audience From Twitter Through Text-Mining Methods, Siaw Ling Lo, David Cornforth, Raymond Chiong
Research Collection School Of Computing and Information Systems
Doing business on social media has become a common practice for many companies these days. While the contents shared on Twitter and Facebook offer plenty of opportunities to uncover business insights, it remains a challenge to sift through the huge amount of social media data and identify the potential social audience who is highly likely to be interested in a particular company. In this paper, we analyze the Twitter content of an account owner and its list of followers through various text mining methods, which include fuzzy keyword matching, statistical topic modeling and machine learning approaches. We use tweets of …
Low Cost Infrared And Near Infrared Sensors For Uavs, Samuel T. Aden, James P. Bialas, Zachary Champion, Eugene Levin, Jessica L. Mccarty
Low Cost Infrared And Near Infrared Sensors For Uavs, Samuel T. Aden, James P. Bialas, Zachary Champion, Eugene Levin, Jessica L. Mccarty
Michigan Tech Research Institute Publications
Thermal remote sensing has a wide range of applications, though the extent of its use is inhibited by cost. Robotic and computer components are now widely available to consumers on a scale that makes thermal data a readily accessible resource. In this project, thermal imagery collected via a lightweight remote sensing Unmanned Aerial Vehicle (UAV) was used to create a surface temperature map for the purpose of providing wildland firefighting crews with a cost-effective and time-saving resource. The UAV system proved to be flexible, allowing for customized sensor packages to be designed that could include visible or infrared cameras, GPS, …