Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

PDF

Series

Institution
Keyword
Publication Year
Publication

Articles 31 - 60 of 4806

Full-Text Articles in Engineering

A Chinese Power Text Classification Algorithm Based On Deep Active Learning, Song Deng, Qianliang Li, Renjie Dai, Siming Wei, Di Wu, Yi He, Xindong Wu Jan 2024

A Chinese Power Text Classification Algorithm Based On Deep Active Learning, Song Deng, Qianliang Li, Renjie Dai, Siming Wei, Di Wu, Yi He, Xindong Wu

Computer Science Faculty Publications

The construction of knowledge graph is beneficial for grid production, electrical safety protection, fault diagnosis and traceability in an observable and controllable way. Highly-precision text classification algorithm is crucial to build a professional knowledge graph in power system. Unfortunately, there are a large number of poorly described and specialized texts in the power business system, and the amount of data containing valid labels in these texts is low. This will bring great challenges to improve the precision of text classification models. To offset the gap, we propose a classification algorithm for Chinese text in the power system based on deep …


Applications Of Ai/Ml In Maritime Cyber Supply Chains, Rafael Diaz, Ricardo Ungo, Katie Smith, Lida Haghnegahdar, Bikash Singh, Tran Phuong Jan 2024

Applications Of Ai/Ml In Maritime Cyber Supply Chains, Rafael Diaz, Ricardo Ungo, Katie Smith, Lida Haghnegahdar, Bikash Singh, Tran Phuong

School of Cybersecurity Faculty Publications

Digital transformation is a new trend that describes enterprise efforts in transitioning manual and likely outdated processes and activities to digital formats dominated by the extensive use of Industry 4.0 elements, including the pervasive use of cyber-physical systems to increase efficiency, reduce waste, and increase responsiveness. A new domain that intersects supply chain management and cybersecurity emerges as many processes as possible of the enterprise require the convergence and synchronizing of resources and information flows in data-driven environments to support planning and execution activities. Protecting the information becomes imperative as big data flows must be parsed and translated into actions …


Anonymous Attribute-Based Broadcast Encryption With Hidden Multiple Access Structures, Tran Viet Xuan Phuong Jan 2024

Anonymous Attribute-Based Broadcast Encryption With Hidden Multiple Access Structures, Tran Viet Xuan Phuong

School of Cybersecurity Faculty Publications

Due to the high demands of data communication, the broadcasting system streams the data daily. This service not only sends out the message to the correct participant but also respects the security of the identity user. In addition, when delivered, all the information must be protected for the party who employs the broadcasting service. Currently, Attribute-Based Broadcast Encryption (ABBE) is useful to apply for the broadcasting service. (ABBE) is a combination of Attribute-Based Encryption (ABE) and Broadcast Encryption (BE), which allows a broadcaster (or encrypter) to broadcast an encrypted message, including a predefined user set and specified access policy to …


An Algorithm Based On Priority Rules For Solving A Multi-Drone Routing Problem In Hazardous Waste Collection, Youssef Harrath Dr., Jihene Kaabi Dr. Jan 2024

An Algorithm Based On Priority Rules For Solving A Multi-Drone Routing Problem In Hazardous Waste Collection, Youssef Harrath Dr., Jihene Kaabi Dr.

Research & Publications

This research investigates the problem of assigning pre-scheduled trips to multiple drones to collect hazardous waste from different sites in the minimum time. Each drone is subject to essential restrictions: maximum flying capacity and recharge operation. The goal is to assign the trips to the drones so that the waste is collected in the minimum time. This is done if the total flying time is equally distributed among the drones. An algorithm was developed to solve the problem. The algorithm is based on two main ideas: sort the trips according to a given priority rule and assign the current trip …


Optimal Algorithm For Managing On-Campus Student Transportation, Youssef Harrath Dr. Jan 2024

Optimal Algorithm For Managing On-Campus Student Transportation, Youssef Harrath Dr.

Research & Publications

This study analyzed the transportation issues at the University of Bahrain Sakhir campus, where a bus system with an unorganized and fixed number of buses allocated each semester was in place. Data was collected through a survey, on-site observations, and student schedules to estimate the number of buses needed. The study was limited to students who require to move between buildings for academic purposes and not those who choose to ride buses for other reasons. An algorithm was designed to calculate the optimal number of buses for each time slot, and for each day. This solution could improve transportation efficiency, …


A New Cache Replacement Policy In Named Data Network Based On Fib Table Information, Mehran Hosseinzadeh, Neda Moghim, Samira Taheri, Nasrin Gholami Jan 2024

A New Cache Replacement Policy In Named Data Network Based On Fib Table Information, Mehran Hosseinzadeh, Neda Moghim, Samira Taheri, Nasrin Gholami

VMASC Publications

Named Data Network (NDN) is proposed for the Internet as an information-centric architecture. Content storing in the router’s cache plays a significant role in NDN. When a router’s cache becomes full, a cache replacement policy determines which content should be discarded for the new content storage. This paper proposes a new cache replacement policy called Discard of Fast Retrievable Content (DFRC). In DFRC, the retrieval time of the content is evaluated using the FIB table information, and the content with less retrieval time receives more discard priority. An impact weight is also used to involve both the grade of retrieval …


Gnss Software Defined Radio: History, Current Developments, And Standardization Efforts, Thomas Pany, Dennis Akos, Javier Arribas, M. Zahidul H. Bhuiyan, Pau Closas, Fabio Dovis, Ignacio Fernandez-Hernandez, Carles Fernandez-Prades, Sanjeev Gunawardena, Todd Humphreys, Zaher M. Kassas, Jose A. Lopez Salcedo, Mario Nicola, Mario L. Psiaki, Alexander Rugamer, Yong-Jin Song, Jong-Hoon Won Jan 2024

Gnss Software Defined Radio: History, Current Developments, And Standardization Efforts, Thomas Pany, Dennis Akos, Javier Arribas, M. Zahidul H. Bhuiyan, Pau Closas, Fabio Dovis, Ignacio Fernandez-Hernandez, Carles Fernandez-Prades, Sanjeev Gunawardena, Todd Humphreys, Zaher M. Kassas, Jose A. Lopez Salcedo, Mario Nicola, Mario L. Psiaki, Alexander Rugamer, Yong-Jin Song, Jong-Hoon Won

Faculty Publications

Taking the work conducted by the global navigation satellite system (GNSS) software-defined radio (SDR) working group during the last decade as a seed, this contribution summarizes, for the first time, the history of GNSS SDR development. This report highlights selected SDR implementations and achievements that are available to the public or that influenced the general development of SDR. Aspects related to the standardization process of intermediate-frequency sample data and metadata are discussed, and an update of the Institute of Navigation SDR Standard is proposed. This work focuses on GNSS SDR implementations in general-purpose processors and leaves aside developments conducted on …


An Analysis Of Precision: Occlusion And Perspective Geometry’S Role In 6d Pose Estimation, Jeffrey Choate, Derek Worth, Scott Nykl, Clark N. Taylor, Brett J. Borghetti, Christine M. Schubert Kabban Jan 2024

An Analysis Of Precision: Occlusion And Perspective Geometry’S Role In 6d Pose Estimation, Jeffrey Choate, Derek Worth, Scott Nykl, Clark N. Taylor, Brett J. Borghetti, Christine M. Schubert Kabban

Faculty Publications

Achieving precise 6 degrees of freedom (6D) pose estimation of rigid objects from color images is a critical challenge with wide-ranging applications in robotics and close-contact aircraft operations. This study investigates key techniques in the application of YOLOv5 object detection convolutional neural network (CNN) for 6D pose localization of aircraft using only color imagery. Traditional object detection labeling methods suffer from inaccuracies due to perspective geometry and being limited to visible key points. This research demonstrates that with precise labeling, a CNN can predict object features with near-pixel accuracy, effectively learning the distinct appearance of the object due to perspective …


Segac: Sample Efficient Generalized Actor Critic For The Stochastic On-Time Arrival Problem, Honglian Guo, Zhi He, Wenda Sheng, Zhiguang Cao, Yingjie Zhou, Weinan Gao Jan 2024

Segac: Sample Efficient Generalized Actor Critic For The Stochastic On-Time Arrival Problem, Honglian Guo, Zhi He, Wenda Sheng, Zhiguang Cao, Yingjie Zhou, Weinan Gao

Research Collection School Of Computing and Information Systems

This paper studies the problem in transportation networks and introduces a novel reinforcement learning-based algorithm, namely. Different from almost all canonical sota solutions, which are usually computationally expensive and lack generalizability to unforeseen destination nodes, segac offers the following appealing characteristics. segac updates the ego vehicle’s navigation policy in a sample efficient manner, reduces the variance of both value network and policy network during training, and is automatically adaptive to new destinations. Furthermore, the pre-trained segac policy network enables its real-time decision-making ability within seconds, outperforming state-of-the-art sota algorithms in simulations across various transportation networks. We also successfully deploy segac …


Cooperative Trucks And Drones For Rural Last-Mile Delivery With Steep Roads, Jiuhong Xiao, Ying Li, Zhiguang Cao, Jianhua Xiao Jan 2024

Cooperative Trucks And Drones For Rural Last-Mile Delivery With Steep Roads, Jiuhong Xiao, Ying Li, Zhiguang Cao, Jianhua Xiao

Research Collection School Of Computing and Information Systems

The cooperative delivery of trucks and drones promises considerable advantages in delivery efficiency and environmental friendliness over pure fossil fuel fleets. As the prosperity of rural B2C e-commerce grows, this study intends to explore the prospect of this cooperation mode for rural last-mile delivery by developing a green vehicle routing problem with drones that considers the presence of steep roads (GVRPD-SR). Realistic energy consumption calculations for trucks and drones that both consider the impacts of general factors and steep roads are incorporated into the GVRPD-SR model, and the objective is to minimize the total energy consumption. To solve the proposed …


Effect Of Resin Bleed Out On Compaction Behavior Of The Fiber Tow Gap Region During Automated Fiber Placement Manufacturing, Von Clyde Jamora, Virginia Rauch, Sergii G. Kravchenko, Oleksandr G. Kravchenko Jan 2024

Effect Of Resin Bleed Out On Compaction Behavior Of The Fiber Tow Gap Region During Automated Fiber Placement Manufacturing, Von Clyde Jamora, Virginia Rauch, Sergii G. Kravchenko, Oleksandr G. Kravchenko

Mechanical & Aerospace Engineering Faculty Publications

Automated fiber placement is a state-of-the-art manufacturing method which allows for precise control over layup design. However, AFP results in irregular morphology due to fiber tow deposition induced features such as tow gaps and overlaps. Factors such as the squeeze flow and resin bleed out, combined with large non-linear deformation, lead to morphological variability. To understand these complex interacting phenomena, a coupled multiphysics finite element framework was developed to simulate the compaction behavior around fiber tow gap regions, which consists of coupled chemo-rheological and flow-compaction analysis. The compaction analysis incorporated a visco-hyperelastic constitutive model with anisotropic tensorial prepreg viscosity, which …


Development Of A Two-Finger Haptic Robotic Hand With Novel Stiffness Detection And Impedance Control, Vahid Mohammadi, Ramin Shahbad, Mojtaba Hosseini, Mohammad Hossein Gholampour, Saeed Shiry Ghidary, Farshid Najafi, Ahad Behboodi Jan 2024

Development Of A Two-Finger Haptic Robotic Hand With Novel Stiffness Detection And Impedance Control, Vahid Mohammadi, Ramin Shahbad, Mojtaba Hosseini, Mohammad Hossein Gholampour, Saeed Shiry Ghidary, Farshid Najafi, Ahad Behboodi

Mechanical & Aerospace Engineering Faculty Publications

Haptic hands and grippers, designed to enable skillful object manipulation, are pivotal for high-precision interaction with environments. These technologies are particularly vital in fields such as minimally invasive surgery, where they enhance surgical accuracy and tactile feedback: in the development of advanced prosthetic limbs, offering users improved functionality and a more natural sense of touch, and within industrial automation and manufacturing, they contribute to more efficient, safe, and flexible production processes. This paper presents the development of a two-finger robotic hand that employs simple yet precise strategies to manipulate objects without damaging or dropping them. Our innovative approach fused force-sensitive …


Multimodal Fusion For Audio-Image And Video Action Recognition, Muhammad B. Shaikh, Douglas Chai, Syed M. S. Islam, Naveed Akhtar Jan 2024

Multimodal Fusion For Audio-Image And Video Action Recognition, Muhammad B. Shaikh, Douglas Chai, Syed M. S. Islam, Naveed Akhtar

Research outputs 2022 to 2026

Multimodal Human Action Recognition (MHAR) is an important research topic in computer vision and event recognition fields. In this work, we address the problem of MHAR by developing a novel audio-image and video fusion-based deep learning framework that we call Multimodal Audio-Image and Video Action Recognizer (MAiVAR). We extract temporal information using image representations of audio signals and spatial information from video modality with the help of Convolutional Neutral Networks (CNN)-based feature extractors and fuse these features to recognize respective action classes. We apply a high-level weights assignment algorithm for improving audio-visual interaction and convergence. This proposed fusion-based framework utilizes …


Enhancing Water Safety: Exploring Recent Technological Approaches For Drowning Detection, Salman Jalalifar, Andrew Belford, Eila Erfani, Amir Razmjou, Rouzbeh Abbassi, Masoud Mohseni-Dargah, Mohsen Asadnia Jan 2024

Enhancing Water Safety: Exploring Recent Technological Approaches For Drowning Detection, Salman Jalalifar, Andrew Belford, Eila Erfani, Amir Razmjou, Rouzbeh Abbassi, Masoud Mohseni-Dargah, Mohsen Asadnia

Research outputs 2022 to 2026

Drowning poses a significant threat, resulting in unexpected injuries and fatalities. To promote water sports activities, it is crucial to develop surveillance systems that enhance safety around pools and waterways. This paper presents an overview of recent advancements in drowning detection, with a specific focus on image processing and sensor-based methods. Furthermore, the potential of artificial intelligence (AI), machine learning algorithms (MLAs), and robotics technology in this field is explored. The review examines the technological challenges, benefits, and drawbacks associated with these approaches. The findings reveal that image processing and sensor-based technologies are the most effective approaches for drowning detection …


Detection Of Tooth Position By Yolov4 And Various Dental Problems Based On Cnn With Bitewing Radiograph, Kuo Chen Li, Yi-Cheng Mao, Mu-Feng Lin, Yi-Qian Li, Chiung-An Chen, Tsung-Yi Chen, Patricia Angela R. Abu Jan 2024

Detection Of Tooth Position By Yolov4 And Various Dental Problems Based On Cnn With Bitewing Radiograph, Kuo Chen Li, Yi-Cheng Mao, Mu-Feng Lin, Yi-Qian Li, Chiung-An Chen, Tsung-Yi Chen, Patricia Angela R. Abu

Department of Information Systems & Computer Science Faculty Publications

Periodontitis is a high prevalence dental disease caused by bacterial infection of the bone that surrounds the tooth. Early detection and precision treatment can prevent more severe symptoms such as tooth loss. Traditionally, periodontal disease is identified and labeled manually by dental professionals. The task requires expertise and extensive experience, and it is highly repetitive and time-consuming. The aim of this study is to explore the application of AI in the field of dental medicine. With the inherent learning capabilities, AI exhibits remarkable proficiency in processing extensive datasets and effectively managing repetitive tasks. This is particularly advantageous in professions demanding …


Physics-Informed Deep Learning With Kalman Filter Mixture For Traffic State Prediction, Niharika Deshpande, Hyoshin (John) Park Jan 2024

Physics-Informed Deep Learning With Kalman Filter Mixture For Traffic State Prediction, Niharika Deshpande, Hyoshin (John) Park

Engineering Management & Systems Engineering Faculty Publications

Accurate traffic forecasting is crucial for understanding and managing congestion for efficient transportation planning. However, conventional approaches often neglect epistemic uncertainty, which arises from incomplete knowledge across different spatiotemporal scales. This study addresses this challenge by introducing a novel methodology to establish dynamic spatiotemporal correlations that captures the unobserved heterogeneity in travel time through distinct peaks in probability density functions, guided by physics-based principles. We propose an innovative approach to modifying both prediction and correction steps of the Kalman Filter (KF) algorithm by leveraging established spatiotemporal correlations. Central to our approach is the development of a novel deep learning model …


Abmscore: A Heuristic Algorithm For Forming Strategic Coalitions In Agent-Based Simulation, Andrew J. Collins, Gayane Grigoryan Jan 2024

Abmscore: A Heuristic Algorithm For Forming Strategic Coalitions In Agent-Based Simulation, Andrew J. Collins, Gayane Grigoryan

Engineering Management & Systems Engineering Faculty Publications

Integrating human behavior into agent-based models has been challenging due to its diversity. An example is strategic coalition formation, which occurs when an individual decides to collaborate with others because it strategically benefits them, thereby increasing the expected utility of the situation. An algorithm called ABMSCORE was developed to help model strategic coalition formation in agent-based models. The ABMSCORE algorithm employs hedonic games from cooperative game theory and has been applied to various situations, including refugee egress and smallholder farming cooperatives. This paper discusses ABMSCORE, including its mechanism, requirements, limitations, and application. To demonstrate the potential of ABMSCORE, a new …


Using Feature Selection Enhancement To Evaluate Attack Detection In The Internet Of Things Environment, Khawlah Harahsheh, Rami Al-Naimat, Chung-Hao Chen Jan 2024

Using Feature Selection Enhancement To Evaluate Attack Detection In The Internet Of Things Environment, Khawlah Harahsheh, Rami Al-Naimat, Chung-Hao Chen

Electrical & Computer Engineering Faculty Publications

The rapid evolution of technology has given rise to a connected world where billions of devices interact seamlessly, forming what is known as the Internet of Things (IoT). While the IoT offers incredible convenience and efficiency, it presents a significant challenge to cybersecurity and is characterized by various power, capacity, and computational process limitations. Machine learning techniques, particularly those encompassing supervised classification techniques, offer a systematic approach to training models using labeled datasets. These techniques enable intrusion detection systems (IDSs) to discern patterns indicative of potential attacks amidst the vast amounts of IoT data. Our investigation delves into various aspects …


Sub-Band Backdoor Attack In Remote Sensing Imagery, Kazi Aminul Islam, Hongyi Wu, Chunsheng Xin, Rui Ning, Liuwan Zhu, Jiang Li Jan 2024

Sub-Band Backdoor Attack In Remote Sensing Imagery, Kazi Aminul Islam, Hongyi Wu, Chunsheng Xin, Rui Ning, Liuwan Zhu, Jiang Li

Electrical & Computer Engineering Faculty Publications

Remote sensing datasets usually have a wide range of spatial and spectral resolutions. They provide unique advantages in surveillance systems, and many government organizations use remote sensing multispectral imagery to monitor security-critical infrastructures or targets. Artificial Intelligence (AI) has advanced rapidly in recent years and has been widely applied to remote image analysis, achieving state-of-the-art (SOTA) performance. However, AI models are vulnerable and can be easily deceived or poisoned. A malicious user may poison an AI model by creating a stealthy backdoor. A backdoored AI model performs well on clean data but behaves abnormally when a planted trigger appears in …


Domain Adaptive Federated Learning For Multi-Institution Molecular Mutation Prediction And Bias Identification, W. Farzana, M. A. Witherow, I. Longoria, M. S. Sadique, A. Temtam, K. M. Iftekharuddin Jan 2024

Domain Adaptive Federated Learning For Multi-Institution Molecular Mutation Prediction And Bias Identification, W. Farzana, M. A. Witherow, I. Longoria, M. S. Sadique, A. Temtam, K. M. Iftekharuddin

Electrical & Computer Engineering Faculty Publications

Deep learning models have shown potential in medical image analysis tasks. However, training a generalized deep learning model requires huge amounts of patient data that is usually gathered from multiple institutions which may raise privacy concerns. Federated learning (FL) provides an alternative to sharing data across institutions. Nonetheless, FL is susceptible to a few challenges including inversion attacks on model weights, heterogenous data distributions, and bias. This study addresses heterogeneity and bias issues for multi-institution patient data by proposing domain adaptive FL modeling using several radiomics (volume, fractal, texture) features for O6-methylguanine-DNA methyltransferase (MGMT) classification across multiple institutions. The proposed …


Adaptive Resilient Control For A Class Of Nonlinear Distributed Parameter Systems With Actuator Faults, Hasan Ferdowsi, Jia Cai, Sarangapani Jagannathan Jan 2024

Adaptive Resilient Control For A Class Of Nonlinear Distributed Parameter Systems With Actuator Faults, Hasan Ferdowsi, Jia Cai, Sarangapani Jagannathan

Electrical and Computer Engineering Faculty Research & Creative Works

This paper presents a new model-based fault resilient control scheme for a class of nonlinear distributed parameter systems (DPS) represented by parabolic partial differential equations (PDE) in the presence of actuator faults. A Luenberger-like observer on the basis of nonlinear PDE representation of DPS is developed with boundary measurements. A detection residual is generated by taking the difference between the measured output of the DPS and the estimated one given by the observer. Once a fault is detected, an unknown actuator fault parameter vector together with a known basis function is utilized to adaptively estimate the fault dynamics. A novel …


Meta-Icvi: Ensemble Validity Metrics For Concise Labeling Of Correct, Under- Or Over-Partitioning In Streaming Clustering, Niklas M. Melton, Sasha A. Petrenko, Donald C. Wunsch Jan 2024

Meta-Icvi: Ensemble Validity Metrics For Concise Labeling Of Correct, Under- Or Over-Partitioning In Streaming Clustering, Niklas M. Melton, Sasha A. Petrenko, Donald C. Wunsch

Electrical and Computer Engineering Faculty Research & Creative Works

Understanding the performance and validity of clustering algorithms is both challenging and crucial, particularly when clustering must be done online. Until recently, most validation methods have relied on batch calculation and have required considerable human expertise in their interpretation. Improving real-time performance and interpretability of cluster validation, therefore, continues to be an important theme in unsupervised learning. Building upon previous work on incremental cluster validity indices (iCVIs), this paper introduces the Meta- iCVI as a tool for explainable and concise labeling of partition quality in online clustering. Leveraging a time-series classifier and data-fusion techniques, the Meta- iCVI combines the outputs …


Optimal Trajectory Tracking For Uncertain Linear Discrete-Time Systems Using Time-Varying Q-Learning, Maxwell Geiger, Vignesh Narayanan, Sarangapani Jagannathan Jan 2024

Optimal Trajectory Tracking For Uncertain Linear Discrete-Time Systems Using Time-Varying Q-Learning, Maxwell Geiger, Vignesh Narayanan, Sarangapani Jagannathan

Electrical and Computer Engineering Faculty Research & Creative Works

This Article Introduces a Novel Optimal Trajectory Tracking Control Scheme Designed for Uncertain Linear Discrete-Time (DT) Systems. in Contrast to Traditional Tracking Control Methods, Our Approach Removes the Requirement for the Reference Trajectory to Align with the Generator Dynamics of an Autonomous Dynamical System. Moreover, It Does Not Demand the Complete Desired Trajectory to Be Known in Advance, Whether through the Generator Model or Any Other Means. Instead, Our Approach Can Dynamically Incorporate Segments (Finite Horizons) of Reference Trajectories and Autonomously Learn an Optimal Control Policy to Track Them in Real Time. to Achieve This, We Address the Tracking Problem …


Passive Physical Layer Distinct Native Attribute Cyber Security Monitor, Christopher M. Rondeau, Michael A. Temple, Juan Lopez Jr, J. Addison Betances Dec 2023

Passive Physical Layer Distinct Native Attribute Cyber Security Monitor, Christopher M. Rondeau, Michael A. Temple, Juan Lopez Jr, J. Addison Betances

AFIT Patents

A method for cyber security monitor includes monitoring a network interface that is input-only configured to surreptitiously and covertly receive bit-level, physical layer communication between networked control and sensor field devices. During a training mode, a baseline distinct native attribute (DNA) fingerprint is generated for each networked field device. During a protection mode, a current DNA fingerprint is generated for each networked field device. The current DNA fingerprint is compared to the baseline DNA fingerprint for each networked field device. In response to detect at least one of RAA and PAA based on a change in the current DNA fingerprint …


Neural Airport Ground Handling, Yaoxin Wu, Jianan Zhou, Yunwen Xia, Xianli Zhang, Zhiguang Cao, Jie Zhang Dec 2023

Neural Airport Ground Handling, Yaoxin Wu, Jianan Zhou, Yunwen Xia, Xianli Zhang, Zhiguang Cao, Jie Zhang

Research Collection School Of Computing and Information Systems

Airport ground handling (AGH) offers necessary operations to flights during their turnarounds and is of great importance to the efficiency of airport management and the economics of aviation. Such a problem involves the interplay among the operations that leads to NP-hard problems with complex constraints. Hence, existing methods for AGH are usually designed with massive domain knowledge but still fail to yield high-quality solutions efficiently. In this paper, we aim to enhance the solution quality and computation efficiency for solving AGH. Particularly, we first model AGH as a multiple-fleet vehicle routing problem (VRP) with miscellaneous constraints including precedence, time windows, …


Enhanced Privacy-Enabled Face Recognition Using Κ-Identity Optimization, Ryan Karl Dec 2023

Enhanced Privacy-Enabled Face Recognition Using Κ-Identity Optimization, Ryan Karl

Department of Electrical and Computer Engineering: Dissertations, Theses, and Student Research

Facial recognition is becoming more and more prevalent in the daily lives of the common person. Law enforcement utilizes facial recognition to find and track suspects. The newest smartphones have the ability to unlock using the user's face. Some door locks utilize facial recognition to allow correct users to enter restricted spaces. The list of applications that use facial recognition will only increase as hardware becomes more cost-effective and more computationally powerful. As this technology becomes more prevalent in our lives, it is important to understand and protect the data provided to these companies. Any data transmitted should be encrypted …


On Dyadic Parity Check Codes And Their Generalizations, Meraiah Martinez Dec 2023

On Dyadic Parity Check Codes And Their Generalizations, Meraiah Martinez

Department of Mathematics: Dissertations, Theses, and Student Research

In order to communicate information over a noisy channel, error-correcting codes can be used to ensure that small errors don’t prevent the transmission of a message. One family of codes that has been found to have good properties is low-density parity check (LDPC) codes. These are represented by sparse bipartite graphs and have low complexity graph-based decoding algorithms. Various graphical properties, such as the girth and stopping sets, influence when these algorithms might fail. Additionally, codes based on algebraically structured parity check matrices are desirable in applications due to their compact representations, practical implementation advantages, and tractable decoder performance analysis. …


Pollutant Forecasting Using Neural Network-Based Temporal Models, Richard Pike Dec 2023

Pollutant Forecasting Using Neural Network-Based Temporal Models, Richard Pike

Masters Theses & Specialist Projects

The Jing-Jin-Ji region of China is a highly industrialized and populated area of the country. Its periodic high pollution and smog includes particles smaller than 2.5 μm, known as PM2.5, linked to many respiratory and cardiovascular illnesses. PM2.5 concentration around Jing-Jin-Ji has exceeded China’s urban air quality safety threshold for over 20% of all days in 2017 through 2020.

The quantity of ground weather stations that measure the concentrations of these pollutants, and their valuable data, is unfortunately small. By employing many machine learning strategies, many researchers have focused on interpolating finer spatial grids of PM2.5, or hindcasting PM2.5. However, …


Vertical Free-Swinging Photovoltaic Racking Energy Modeling: A Novel Approach To Agrivoltaics, Koami Soulemane Hayibo, Joshua M. Pearce Dec 2023

Vertical Free-Swinging Photovoltaic Racking Energy Modeling: A Novel Approach To Agrivoltaics, Koami Soulemane Hayibo, Joshua M. Pearce

Electrical and Computer Engineering Publications

To enable lower-cost building materials, a free-swinging bifacial vertical solar photovoltaic (PV) rack has been proposed, which complies with Canadian building codes and is the lowest capital-cost agrivoltaics rack. The wind force applied to the free-swinging PV, however, causes it to have varying tilt angles depending on the wind speed and direction. No energy performance model accurately describes such a system. To provide a simulation model for the free-swinging PV, where wind speed and direction govern the array tilt angle, this study builds upon the open-source System Advisor Model (SAM) using Python. After the SAM python model is validated, a …


Understanding The Impact Of Trade Policy Effect Uncertainty On Firm-Level Innovation Investment: A Deep Learning Approach, Daniel Chang, Nan Hu, Peng Liang, Morgan Swink Dec 2023

Understanding The Impact Of Trade Policy Effect Uncertainty On Firm-Level Innovation Investment: A Deep Learning Approach, Daniel Chang, Nan Hu, Peng Liang, Morgan Swink

Research Collection School Of Computing and Information Systems

Integrating the real options perspective and resource dependence theory, this study examines how firms adjust their innovation investments to trade policy effect uncertainty (TPEU), a less studied type of firm specific, perceived environmental uncertainty in which managers have difficulty predicting how potential policy changes will affect business operations. To develop a text-based, context-dependent, time-varying measure of firm-level perceived TPEU, we apply Bidirectional Encoder Representations from Transformers (BERT), a state-of-the-art deep learning approach. We apply BERT to analyze the texts of mandatory Management Discussion and Analysis (MD&A) sections of annual reports for a sample of 22,669 firm-year observations from 3,181 unique …