Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Wright State University (1492)
- Singapore Management University (766)
- Washington University in St. Louis (683)
- Old Dominion University (305)
- University of Nebraska - Lincoln (240)
-
- Missouri University of Science and Technology (178)
- Portland State University (102)
- Technological University Dublin (94)
- Chapman University (80)
- University of New Haven (70)
- University of Nevada, Las Vegas (68)
- University of Kentucky (50)
- Loyola University Chicago (49)
- Air Force Institute of Technology (42)
- Florida International University (37)
- University of South Carolina (36)
- Western University (36)
- Edith Cowan University (34)
- Embry-Riddle Aeronautical University (30)
- San Jose State University (27)
- Michigan Technological University (25)
- Western Kentucky University (23)
- City University of New York (CUNY) (19)
- Purdue University (18)
- Wayne State University (15)
- Dartmouth College (14)
- Fordham University (13)
- MBZUAI (11)
- University of Dayton (11)
- Syracuse University (10)
- Keyword
-
- Deep learning (71)
- Machine learning (71)
- Artificial intelligence (47)
- Security (43)
- Algorithms (37)
-
- Optimization (35)
- Machine Learning (33)
- Cybersecurity (30)
- Robotics (28)
- Classification (26)
- Reinforcement learning (25)
- Neural networks (24)
- Simulation (23)
- Digital forensics (22)
- Computer science (21)
- Deep Learning (19)
- Undergraduate students (19)
- Blockchain (18)
- Clustering (18)
- Computer vision (18)
- IoT (18)
- Scheduling (18)
- Vehicle routing problem (18)
- Visualization (18)
- College seniors (17)
- Convolutional neural networks (17)
- Science projects (17)
- Adaptive computing systems (16)
- Cloud computing (16)
- Feature extraction (16)
- Publication Year
- Publication
-
- Computer Science & Engineering Syllabi (1312)
- Research Collection School Of Computing and Information Systems (760)
- All Computer Science and Engineering Research (683)
- Computer Science and Engineering Faculty Publications (180)
- Department of Computer Science and Engineering: Dissertations, Theses, and Student Research (140)
-
- Faculty Publications (111)
- Electrical and Computer Engineering Faculty Research & Creative Works (110)
- Electrical & Computer Engineering Faculty Publications (92)
- Computer Science Faculty Publications and Presentations (85)
- Computer Science Faculty Publications (82)
- Engineering Faculty Articles and Research (69)
- Electrical & Computer Engineering and Computer Science Faculty Publications (68)
- Computer Science: Faculty Publications and Other Works (49)
- Dissertations (47)
- CSE Conference and Workshop Papers (46)
- Publications (41)
- Electrical and Computer Engineering Publications (36)
- FIU Electronic Theses and Dissertations (35)
- Engineering Management & Systems Engineering Faculty Publications (31)
- Computer Science Faculty Research & Creative Works (26)
- Separations Campaign (TRP) (25)
- Engineering Technology Faculty Publications (24)
- VMASC Publications (23)
- Computational Modeling & Simulation Engineering Faculty Publications (22)
- Articles (21)
- Michigan Tech Publications (19)
- Fred and Harriet Cox Senior Design Competition Projects (18)
- Publications and Research (17)
- Australian Digital Forensics Conference (14)
- Biosystems and Agricultural Engineering Faculty Publications (14)
Articles 31 - 60 of 4806
Full-Text Articles in Engineering
A Chinese Power Text Classification Algorithm Based On Deep Active Learning, Song Deng, Qianliang Li, Renjie Dai, Siming Wei, Di Wu, Yi He, Xindong Wu
A Chinese Power Text Classification Algorithm Based On Deep Active Learning, Song Deng, Qianliang Li, Renjie Dai, Siming Wei, Di Wu, Yi He, Xindong Wu
Computer Science Faculty Publications
The construction of knowledge graph is beneficial for grid production, electrical safety protection, fault diagnosis and traceability in an observable and controllable way. Highly-precision text classification algorithm is crucial to build a professional knowledge graph in power system. Unfortunately, there are a large number of poorly described and specialized texts in the power business system, and the amount of data containing valid labels in these texts is low. This will bring great challenges to improve the precision of text classification models. To offset the gap, we propose a classification algorithm for Chinese text in the power system based on deep …
Applications Of Ai/Ml In Maritime Cyber Supply Chains, Rafael Diaz, Ricardo Ungo, Katie Smith, Lida Haghnegahdar, Bikash Singh, Tran Phuong
Applications Of Ai/Ml In Maritime Cyber Supply Chains, Rafael Diaz, Ricardo Ungo, Katie Smith, Lida Haghnegahdar, Bikash Singh, Tran Phuong
School of Cybersecurity Faculty Publications
Digital transformation is a new trend that describes enterprise efforts in transitioning manual and likely outdated processes and activities to digital formats dominated by the extensive use of Industry 4.0 elements, including the pervasive use of cyber-physical systems to increase efficiency, reduce waste, and increase responsiveness. A new domain that intersects supply chain management and cybersecurity emerges as many processes as possible of the enterprise require the convergence and synchronizing of resources and information flows in data-driven environments to support planning and execution activities. Protecting the information becomes imperative as big data flows must be parsed and translated into actions …
Anonymous Attribute-Based Broadcast Encryption With Hidden Multiple Access Structures, Tran Viet Xuan Phuong
Anonymous Attribute-Based Broadcast Encryption With Hidden Multiple Access Structures, Tran Viet Xuan Phuong
School of Cybersecurity Faculty Publications
Due to the high demands of data communication, the broadcasting system streams the data daily. This service not only sends out the message to the correct participant but also respects the security of the identity user. In addition, when delivered, all the information must be protected for the party who employs the broadcasting service. Currently, Attribute-Based Broadcast Encryption (ABBE) is useful to apply for the broadcasting service. (ABBE) is a combination of Attribute-Based Encryption (ABE) and Broadcast Encryption (BE), which allows a broadcaster (or encrypter) to broadcast an encrypted message, including a predefined user set and specified access policy to …
An Algorithm Based On Priority Rules For Solving A Multi-Drone Routing Problem In Hazardous Waste Collection, Youssef Harrath Dr., Jihene Kaabi Dr.
An Algorithm Based On Priority Rules For Solving A Multi-Drone Routing Problem In Hazardous Waste Collection, Youssef Harrath Dr., Jihene Kaabi Dr.
Research & Publications
This research investigates the problem of assigning pre-scheduled trips to multiple drones to collect hazardous waste from different sites in the minimum time. Each drone is subject to essential restrictions: maximum flying capacity and recharge operation. The goal is to assign the trips to the drones so that the waste is collected in the minimum time. This is done if the total flying time is equally distributed among the drones. An algorithm was developed to solve the problem. The algorithm is based on two main ideas: sort the trips according to a given priority rule and assign the current trip …
Optimal Algorithm For Managing On-Campus Student Transportation, Youssef Harrath Dr.
Optimal Algorithm For Managing On-Campus Student Transportation, Youssef Harrath Dr.
Research & Publications
This study analyzed the transportation issues at the University of Bahrain Sakhir campus, where a bus system with an unorganized and fixed number of buses allocated each semester was in place. Data was collected through a survey, on-site observations, and student schedules to estimate the number of buses needed. The study was limited to students who require to move between buildings for academic purposes and not those who choose to ride buses for other reasons. An algorithm was designed to calculate the optimal number of buses for each time slot, and for each day. This solution could improve transportation efficiency, …
A New Cache Replacement Policy In Named Data Network Based On Fib Table Information, Mehran Hosseinzadeh, Neda Moghim, Samira Taheri, Nasrin Gholami
A New Cache Replacement Policy In Named Data Network Based On Fib Table Information, Mehran Hosseinzadeh, Neda Moghim, Samira Taheri, Nasrin Gholami
VMASC Publications
Named Data Network (NDN) is proposed for the Internet as an information-centric architecture. Content storing in the router’s cache plays a significant role in NDN. When a router’s cache becomes full, a cache replacement policy determines which content should be discarded for the new content storage. This paper proposes a new cache replacement policy called Discard of Fast Retrievable Content (DFRC). In DFRC, the retrieval time of the content is evaluated using the FIB table information, and the content with less retrieval time receives more discard priority. An impact weight is also used to involve both the grade of retrieval …
Gnss Software Defined Radio: History, Current Developments, And Standardization Efforts, Thomas Pany, Dennis Akos, Javier Arribas, M. Zahidul H. Bhuiyan, Pau Closas, Fabio Dovis, Ignacio Fernandez-Hernandez, Carles Fernandez-Prades, Sanjeev Gunawardena, Todd Humphreys, Zaher M. Kassas, Jose A. Lopez Salcedo, Mario Nicola, Mario L. Psiaki, Alexander Rugamer, Yong-Jin Song, Jong-Hoon Won
Gnss Software Defined Radio: History, Current Developments, And Standardization Efforts, Thomas Pany, Dennis Akos, Javier Arribas, M. Zahidul H. Bhuiyan, Pau Closas, Fabio Dovis, Ignacio Fernandez-Hernandez, Carles Fernandez-Prades, Sanjeev Gunawardena, Todd Humphreys, Zaher M. Kassas, Jose A. Lopez Salcedo, Mario Nicola, Mario L. Psiaki, Alexander Rugamer, Yong-Jin Song, Jong-Hoon Won
Faculty Publications
Taking the work conducted by the global navigation satellite system (GNSS) software-defined radio (SDR) working group during the last decade as a seed, this contribution summarizes, for the first time, the history of GNSS SDR development. This report highlights selected SDR implementations and achievements that are available to the public or that influenced the general development of SDR. Aspects related to the standardization process of intermediate-frequency sample data and metadata are discussed, and an update of the Institute of Navigation SDR Standard is proposed. This work focuses on GNSS SDR implementations in general-purpose processors and leaves aside developments conducted on …
An Analysis Of Precision: Occlusion And Perspective Geometry’S Role In 6d Pose Estimation, Jeffrey Choate, Derek Worth, Scott Nykl, Clark N. Taylor, Brett J. Borghetti, Christine M. Schubert Kabban
An Analysis Of Precision: Occlusion And Perspective Geometry’S Role In 6d Pose Estimation, Jeffrey Choate, Derek Worth, Scott Nykl, Clark N. Taylor, Brett J. Borghetti, Christine M. Schubert Kabban
Faculty Publications
Achieving precise 6 degrees of freedom (6D) pose estimation of rigid objects from color images is a critical challenge with wide-ranging applications in robotics and close-contact aircraft operations. This study investigates key techniques in the application of YOLOv5 object detection convolutional neural network (CNN) for 6D pose localization of aircraft using only color imagery. Traditional object detection labeling methods suffer from inaccuracies due to perspective geometry and being limited to visible key points. This research demonstrates that with precise labeling, a CNN can predict object features with near-pixel accuracy, effectively learning the distinct appearance of the object due to perspective …
Segac: Sample Efficient Generalized Actor Critic For The Stochastic On-Time Arrival Problem, Honglian Guo, Zhi He, Wenda Sheng, Zhiguang Cao, Yingjie Zhou, Weinan Gao
Segac: Sample Efficient Generalized Actor Critic For The Stochastic On-Time Arrival Problem, Honglian Guo, Zhi He, Wenda Sheng, Zhiguang Cao, Yingjie Zhou, Weinan Gao
Research Collection School Of Computing and Information Systems
This paper studies the problem in transportation networks and introduces a novel reinforcement learning-based algorithm, namely. Different from almost all canonical sota solutions, which are usually computationally expensive and lack generalizability to unforeseen destination nodes, segac offers the following appealing characteristics. segac updates the ego vehicle’s navigation policy in a sample efficient manner, reduces the variance of both value network and policy network during training, and is automatically adaptive to new destinations. Furthermore, the pre-trained segac policy network enables its real-time decision-making ability within seconds, outperforming state-of-the-art sota algorithms in simulations across various transportation networks. We also successfully deploy segac …
Cooperative Trucks And Drones For Rural Last-Mile Delivery With Steep Roads, Jiuhong Xiao, Ying Li, Zhiguang Cao, Jianhua Xiao
Cooperative Trucks And Drones For Rural Last-Mile Delivery With Steep Roads, Jiuhong Xiao, Ying Li, Zhiguang Cao, Jianhua Xiao
Research Collection School Of Computing and Information Systems
The cooperative delivery of trucks and drones promises considerable advantages in delivery efficiency and environmental friendliness over pure fossil fuel fleets. As the prosperity of rural B2C e-commerce grows, this study intends to explore the prospect of this cooperation mode for rural last-mile delivery by developing a green vehicle routing problem with drones that considers the presence of steep roads (GVRPD-SR). Realistic energy consumption calculations for trucks and drones that both consider the impacts of general factors and steep roads are incorporated into the GVRPD-SR model, and the objective is to minimize the total energy consumption. To solve the proposed …
Effect Of Resin Bleed Out On Compaction Behavior Of The Fiber Tow Gap Region During Automated Fiber Placement Manufacturing, Von Clyde Jamora, Virginia Rauch, Sergii G. Kravchenko, Oleksandr G. Kravchenko
Effect Of Resin Bleed Out On Compaction Behavior Of The Fiber Tow Gap Region During Automated Fiber Placement Manufacturing, Von Clyde Jamora, Virginia Rauch, Sergii G. Kravchenko, Oleksandr G. Kravchenko
Mechanical & Aerospace Engineering Faculty Publications
Automated fiber placement is a state-of-the-art manufacturing method which allows for precise control over layup design. However, AFP results in irregular morphology due to fiber tow deposition induced features such as tow gaps and overlaps. Factors such as the squeeze flow and resin bleed out, combined with large non-linear deformation, lead to morphological variability. To understand these complex interacting phenomena, a coupled multiphysics finite element framework was developed to simulate the compaction behavior around fiber tow gap regions, which consists of coupled chemo-rheological and flow-compaction analysis. The compaction analysis incorporated a visco-hyperelastic constitutive model with anisotropic tensorial prepreg viscosity, which …
Development Of A Two-Finger Haptic Robotic Hand With Novel Stiffness Detection And Impedance Control, Vahid Mohammadi, Ramin Shahbad, Mojtaba Hosseini, Mohammad Hossein Gholampour, Saeed Shiry Ghidary, Farshid Najafi, Ahad Behboodi
Development Of A Two-Finger Haptic Robotic Hand With Novel Stiffness Detection And Impedance Control, Vahid Mohammadi, Ramin Shahbad, Mojtaba Hosseini, Mohammad Hossein Gholampour, Saeed Shiry Ghidary, Farshid Najafi, Ahad Behboodi
Mechanical & Aerospace Engineering Faculty Publications
Haptic hands and grippers, designed to enable skillful object manipulation, are pivotal for high-precision interaction with environments. These technologies are particularly vital in fields such as minimally invasive surgery, where they enhance surgical accuracy and tactile feedback: in the development of advanced prosthetic limbs, offering users improved functionality and a more natural sense of touch, and within industrial automation and manufacturing, they contribute to more efficient, safe, and flexible production processes. This paper presents the development of a two-finger robotic hand that employs simple yet precise strategies to manipulate objects without damaging or dropping them. Our innovative approach fused force-sensitive …
Multimodal Fusion For Audio-Image And Video Action Recognition, Muhammad B. Shaikh, Douglas Chai, Syed M. S. Islam, Naveed Akhtar
Multimodal Fusion For Audio-Image And Video Action Recognition, Muhammad B. Shaikh, Douglas Chai, Syed M. S. Islam, Naveed Akhtar
Research outputs 2022 to 2026
Multimodal Human Action Recognition (MHAR) is an important research topic in computer vision and event recognition fields. In this work, we address the problem of MHAR by developing a novel audio-image and video fusion-based deep learning framework that we call Multimodal Audio-Image and Video Action Recognizer (MAiVAR). We extract temporal information using image representations of audio signals and spatial information from video modality with the help of Convolutional Neutral Networks (CNN)-based feature extractors and fuse these features to recognize respective action classes. We apply a high-level weights assignment algorithm for improving audio-visual interaction and convergence. This proposed fusion-based framework utilizes …
Enhancing Water Safety: Exploring Recent Technological Approaches For Drowning Detection, Salman Jalalifar, Andrew Belford, Eila Erfani, Amir Razmjou, Rouzbeh Abbassi, Masoud Mohseni-Dargah, Mohsen Asadnia
Enhancing Water Safety: Exploring Recent Technological Approaches For Drowning Detection, Salman Jalalifar, Andrew Belford, Eila Erfani, Amir Razmjou, Rouzbeh Abbassi, Masoud Mohseni-Dargah, Mohsen Asadnia
Research outputs 2022 to 2026
Drowning poses a significant threat, resulting in unexpected injuries and fatalities. To promote water sports activities, it is crucial to develop surveillance systems that enhance safety around pools and waterways. This paper presents an overview of recent advancements in drowning detection, with a specific focus on image processing and sensor-based methods. Furthermore, the potential of artificial intelligence (AI), machine learning algorithms (MLAs), and robotics technology in this field is explored. The review examines the technological challenges, benefits, and drawbacks associated with these approaches. The findings reveal that image processing and sensor-based technologies are the most effective approaches for drowning detection …
Detection Of Tooth Position By Yolov4 And Various Dental Problems Based On Cnn With Bitewing Radiograph, Kuo Chen Li, Yi-Cheng Mao, Mu-Feng Lin, Yi-Qian Li, Chiung-An Chen, Tsung-Yi Chen, Patricia Angela R. Abu
Detection Of Tooth Position By Yolov4 And Various Dental Problems Based On Cnn With Bitewing Radiograph, Kuo Chen Li, Yi-Cheng Mao, Mu-Feng Lin, Yi-Qian Li, Chiung-An Chen, Tsung-Yi Chen, Patricia Angela R. Abu
Department of Information Systems & Computer Science Faculty Publications
Periodontitis is a high prevalence dental disease caused by bacterial infection of the bone that surrounds the tooth. Early detection and precision treatment can prevent more severe symptoms such as tooth loss. Traditionally, periodontal disease is identified and labeled manually by dental professionals. The task requires expertise and extensive experience, and it is highly repetitive and time-consuming. The aim of this study is to explore the application of AI in the field of dental medicine. With the inherent learning capabilities, AI exhibits remarkable proficiency in processing extensive datasets and effectively managing repetitive tasks. This is particularly advantageous in professions demanding …
Physics-Informed Deep Learning With Kalman Filter Mixture For Traffic State Prediction, Niharika Deshpande, Hyoshin (John) Park
Physics-Informed Deep Learning With Kalman Filter Mixture For Traffic State Prediction, Niharika Deshpande, Hyoshin (John) Park
Engineering Management & Systems Engineering Faculty Publications
Accurate traffic forecasting is crucial for understanding and managing congestion for efficient transportation planning. However, conventional approaches often neglect epistemic uncertainty, which arises from incomplete knowledge across different spatiotemporal scales. This study addresses this challenge by introducing a novel methodology to establish dynamic spatiotemporal correlations that captures the unobserved heterogeneity in travel time through distinct peaks in probability density functions, guided by physics-based principles. We propose an innovative approach to modifying both prediction and correction steps of the Kalman Filter (KF) algorithm by leveraging established spatiotemporal correlations. Central to our approach is the development of a novel deep learning model …
Abmscore: A Heuristic Algorithm For Forming Strategic Coalitions In Agent-Based Simulation, Andrew J. Collins, Gayane Grigoryan
Abmscore: A Heuristic Algorithm For Forming Strategic Coalitions In Agent-Based Simulation, Andrew J. Collins, Gayane Grigoryan
Engineering Management & Systems Engineering Faculty Publications
Integrating human behavior into agent-based models has been challenging due to its diversity. An example is strategic coalition formation, which occurs when an individual decides to collaborate with others because it strategically benefits them, thereby increasing the expected utility of the situation. An algorithm called ABMSCORE was developed to help model strategic coalition formation in agent-based models. The ABMSCORE algorithm employs hedonic games from cooperative game theory and has been applied to various situations, including refugee egress and smallholder farming cooperatives. This paper discusses ABMSCORE, including its mechanism, requirements, limitations, and application. To demonstrate the potential of ABMSCORE, a new …
Using Feature Selection Enhancement To Evaluate Attack Detection In The Internet Of Things Environment, Khawlah Harahsheh, Rami Al-Naimat, Chung-Hao Chen
Using Feature Selection Enhancement To Evaluate Attack Detection In The Internet Of Things Environment, Khawlah Harahsheh, Rami Al-Naimat, Chung-Hao Chen
Electrical & Computer Engineering Faculty Publications
The rapid evolution of technology has given rise to a connected world where billions of devices interact seamlessly, forming what is known as the Internet of Things (IoT). While the IoT offers incredible convenience and efficiency, it presents a significant challenge to cybersecurity and is characterized by various power, capacity, and computational process limitations. Machine learning techniques, particularly those encompassing supervised classification techniques, offer a systematic approach to training models using labeled datasets. These techniques enable intrusion detection systems (IDSs) to discern patterns indicative of potential attacks amidst the vast amounts of IoT data. Our investigation delves into various aspects …
Sub-Band Backdoor Attack In Remote Sensing Imagery, Kazi Aminul Islam, Hongyi Wu, Chunsheng Xin, Rui Ning, Liuwan Zhu, Jiang Li
Sub-Band Backdoor Attack In Remote Sensing Imagery, Kazi Aminul Islam, Hongyi Wu, Chunsheng Xin, Rui Ning, Liuwan Zhu, Jiang Li
Electrical & Computer Engineering Faculty Publications
Remote sensing datasets usually have a wide range of spatial and spectral resolutions. They provide unique advantages in surveillance systems, and many government organizations use remote sensing multispectral imagery to monitor security-critical infrastructures or targets. Artificial Intelligence (AI) has advanced rapidly in recent years and has been widely applied to remote image analysis, achieving state-of-the-art (SOTA) performance. However, AI models are vulnerable and can be easily deceived or poisoned. A malicious user may poison an AI model by creating a stealthy backdoor. A backdoored AI model performs well on clean data but behaves abnormally when a planted trigger appears in …
Domain Adaptive Federated Learning For Multi-Institution Molecular Mutation Prediction And Bias Identification, W. Farzana, M. A. Witherow, I. Longoria, M. S. Sadique, A. Temtam, K. M. Iftekharuddin
Domain Adaptive Federated Learning For Multi-Institution Molecular Mutation Prediction And Bias Identification, W. Farzana, M. A. Witherow, I. Longoria, M. S. Sadique, A. Temtam, K. M. Iftekharuddin
Electrical & Computer Engineering Faculty Publications
Deep learning models have shown potential in medical image analysis tasks. However, training a generalized deep learning model requires huge amounts of patient data that is usually gathered from multiple institutions which may raise privacy concerns. Federated learning (FL) provides an alternative to sharing data across institutions. Nonetheless, FL is susceptible to a few challenges including inversion attacks on model weights, heterogenous data distributions, and bias. This study addresses heterogeneity and bias issues for multi-institution patient data by proposing domain adaptive FL modeling using several radiomics (volume, fractal, texture) features for O6-methylguanine-DNA methyltransferase (MGMT) classification across multiple institutions. The proposed …
Adaptive Resilient Control For A Class Of Nonlinear Distributed Parameter Systems With Actuator Faults, Hasan Ferdowsi, Jia Cai, Sarangapani Jagannathan
Adaptive Resilient Control For A Class Of Nonlinear Distributed Parameter Systems With Actuator Faults, Hasan Ferdowsi, Jia Cai, Sarangapani Jagannathan
Electrical and Computer Engineering Faculty Research & Creative Works
This paper presents a new model-based fault resilient control scheme for a class of nonlinear distributed parameter systems (DPS) represented by parabolic partial differential equations (PDE) in the presence of actuator faults. A Luenberger-like observer on the basis of nonlinear PDE representation of DPS is developed with boundary measurements. A detection residual is generated by taking the difference between the measured output of the DPS and the estimated one given by the observer. Once a fault is detected, an unknown actuator fault parameter vector together with a known basis function is utilized to adaptively estimate the fault dynamics. A novel …
Meta-Icvi: Ensemble Validity Metrics For Concise Labeling Of Correct, Under- Or Over-Partitioning In Streaming Clustering, Niklas M. Melton, Sasha A. Petrenko, Donald C. Wunsch
Meta-Icvi: Ensemble Validity Metrics For Concise Labeling Of Correct, Under- Or Over-Partitioning In Streaming Clustering, Niklas M. Melton, Sasha A. Petrenko, Donald C. Wunsch
Electrical and Computer Engineering Faculty Research & Creative Works
Understanding the performance and validity of clustering algorithms is both challenging and crucial, particularly when clustering must be done online. Until recently, most validation methods have relied on batch calculation and have required considerable human expertise in their interpretation. Improving real-time performance and interpretability of cluster validation, therefore, continues to be an important theme in unsupervised learning. Building upon previous work on incremental cluster validity indices (iCVIs), this paper introduces the Meta- iCVI as a tool for explainable and concise labeling of partition quality in online clustering. Leveraging a time-series classifier and data-fusion techniques, the Meta- iCVI combines the outputs …
Optimal Trajectory Tracking For Uncertain Linear Discrete-Time Systems Using Time-Varying Q-Learning, Maxwell Geiger, Vignesh Narayanan, Sarangapani Jagannathan
Optimal Trajectory Tracking For Uncertain Linear Discrete-Time Systems Using Time-Varying Q-Learning, Maxwell Geiger, Vignesh Narayanan, Sarangapani Jagannathan
Electrical and Computer Engineering Faculty Research & Creative Works
This Article Introduces a Novel Optimal Trajectory Tracking Control Scheme Designed for Uncertain Linear Discrete-Time (DT) Systems. in Contrast to Traditional Tracking Control Methods, Our Approach Removes the Requirement for the Reference Trajectory to Align with the Generator Dynamics of an Autonomous Dynamical System. Moreover, It Does Not Demand the Complete Desired Trajectory to Be Known in Advance, Whether through the Generator Model or Any Other Means. Instead, Our Approach Can Dynamically Incorporate Segments (Finite Horizons) of Reference Trajectories and Autonomously Learn an Optimal Control Policy to Track Them in Real Time. to Achieve This, We Address the Tracking Problem …
Passive Physical Layer Distinct Native Attribute Cyber Security Monitor, Christopher M. Rondeau, Michael A. Temple, Juan Lopez Jr, J. Addison Betances
Passive Physical Layer Distinct Native Attribute Cyber Security Monitor, Christopher M. Rondeau, Michael A. Temple, Juan Lopez Jr, J. Addison Betances
AFIT Patents
A method for cyber security monitor includes monitoring a network interface that is input-only configured to surreptitiously and covertly receive bit-level, physical layer communication between networked control and sensor field devices. During a training mode, a baseline distinct native attribute (DNA) fingerprint is generated for each networked field device. During a protection mode, a current DNA fingerprint is generated for each networked field device. The current DNA fingerprint is compared to the baseline DNA fingerprint for each networked field device. In response to detect at least one of RAA and PAA based on a change in the current DNA fingerprint …
Neural Airport Ground Handling, Yaoxin Wu, Jianan Zhou, Yunwen Xia, Xianli Zhang, Zhiguang Cao, Jie Zhang
Neural Airport Ground Handling, Yaoxin Wu, Jianan Zhou, Yunwen Xia, Xianli Zhang, Zhiguang Cao, Jie Zhang
Research Collection School Of Computing and Information Systems
Airport ground handling (AGH) offers necessary operations to flights during their turnarounds and is of great importance to the efficiency of airport management and the economics of aviation. Such a problem involves the interplay among the operations that leads to NP-hard problems with complex constraints. Hence, existing methods for AGH are usually designed with massive domain knowledge but still fail to yield high-quality solutions efficiently. In this paper, we aim to enhance the solution quality and computation efficiency for solving AGH. Particularly, we first model AGH as a multiple-fleet vehicle routing problem (VRP) with miscellaneous constraints including precedence, time windows, …
Enhanced Privacy-Enabled Face Recognition Using Κ-Identity Optimization, Ryan Karl
Enhanced Privacy-Enabled Face Recognition Using Κ-Identity Optimization, Ryan Karl
Department of Electrical and Computer Engineering: Dissertations, Theses, and Student Research
Facial recognition is becoming more and more prevalent in the daily lives of the common person. Law enforcement utilizes facial recognition to find and track suspects. The newest smartphones have the ability to unlock using the user's face. Some door locks utilize facial recognition to allow correct users to enter restricted spaces. The list of applications that use facial recognition will only increase as hardware becomes more cost-effective and more computationally powerful. As this technology becomes more prevalent in our lives, it is important to understand and protect the data provided to these companies. Any data transmitted should be encrypted …
On Dyadic Parity Check Codes And Their Generalizations, Meraiah Martinez
On Dyadic Parity Check Codes And Their Generalizations, Meraiah Martinez
Department of Mathematics: Dissertations, Theses, and Student Research
In order to communicate information over a noisy channel, error-correcting codes can be used to ensure that small errors don’t prevent the transmission of a message. One family of codes that has been found to have good properties is low-density parity check (LDPC) codes. These are represented by sparse bipartite graphs and have low complexity graph-based decoding algorithms. Various graphical properties, such as the girth and stopping sets, influence when these algorithms might fail. Additionally, codes based on algebraically structured parity check matrices are desirable in applications due to their compact representations, practical implementation advantages, and tractable decoder performance analysis. …
Pollutant Forecasting Using Neural Network-Based Temporal Models, Richard Pike
Pollutant Forecasting Using Neural Network-Based Temporal Models, Richard Pike
Masters Theses & Specialist Projects
The Jing-Jin-Ji region of China is a highly industrialized and populated area of the country. Its periodic high pollution and smog includes particles smaller than 2.5 μm, known as PM2.5, linked to many respiratory and cardiovascular illnesses. PM2.5 concentration around Jing-Jin-Ji has exceeded China’s urban air quality safety threshold for over 20% of all days in 2017 through 2020.
The quantity of ground weather stations that measure the concentrations of these pollutants, and their valuable data, is unfortunately small. By employing many machine learning strategies, many researchers have focused on interpolating finer spatial grids of PM2.5, or hindcasting PM2.5. However, …
Vertical Free-Swinging Photovoltaic Racking Energy Modeling: A Novel Approach To Agrivoltaics, Koami Soulemane Hayibo, Joshua M. Pearce
Vertical Free-Swinging Photovoltaic Racking Energy Modeling: A Novel Approach To Agrivoltaics, Koami Soulemane Hayibo, Joshua M. Pearce
Electrical and Computer Engineering Publications
To enable lower-cost building materials, a free-swinging bifacial vertical solar photovoltaic (PV) rack has been proposed, which complies with Canadian building codes and is the lowest capital-cost agrivoltaics rack. The wind force applied to the free-swinging PV, however, causes it to have varying tilt angles depending on the wind speed and direction. No energy performance model accurately describes such a system. To provide a simulation model for the free-swinging PV, where wind speed and direction govern the array tilt angle, this study builds upon the open-source System Advisor Model (SAM) using Python. After the SAM python model is validated, a …
Understanding The Impact Of Trade Policy Effect Uncertainty On Firm-Level Innovation Investment: A Deep Learning Approach, Daniel Chang, Nan Hu, Peng Liang, Morgan Swink
Understanding The Impact Of Trade Policy Effect Uncertainty On Firm-Level Innovation Investment: A Deep Learning Approach, Daniel Chang, Nan Hu, Peng Liang, Morgan Swink
Research Collection School Of Computing and Information Systems
Integrating the real options perspective and resource dependence theory, this study examines how firms adjust their innovation investments to trade policy effect uncertainty (TPEU), a less studied type of firm specific, perceived environmental uncertainty in which managers have difficulty predicting how potential policy changes will affect business operations. To develop a text-based, context-dependent, time-varying measure of firm-level perceived TPEU, we apply Bidirectional Encoder Representations from Transformers (BERT), a state-of-the-art deep learning approach. We apply BERT to analyze the texts of mandatory Management Discussion and Analysis (MD&A) sections of annual reports for a sample of 22,669 firm-year observations from 3,181 unique …