Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

PDF

Institution
Keyword
Publication Year
Publication
Publication Type

Articles 31 - 60 of 15188

Full-Text Articles in Engineering

A Design Science Approach To Investigating Decentralized Identity Technology, Janelle Krupicka Apr 2024

A Design Science Approach To Investigating Decentralized Identity Technology, Janelle Krupicka

Cybersecurity Undergraduate Research Showcase

The internet needs secure forms of identity authentication to function properly, but identity authentication is not a core part of the internet’s architecture. Instead, approaches to identity verification vary, often using centralized stores of identity information that are targets of cyber attacks. Decentralized identity is a secure way to manage identity online that puts users’ identities in their own hands and that has the potential to become a core part of cybersecurity. However, decentralized identity technology is new and continually evolving, which makes implementing this technology in an organizational setting challenging. This paper suggests that, in the future, decentralized identity …


Anomaly Detection With Spiking Neural Networks (Snn), Shruti Bhandari, Vyshnavi Gogineni Apr 2024

Anomaly Detection With Spiking Neural Networks (Snn), Shruti Bhandari, Vyshnavi Gogineni

ATU Research Symposium

Abstract:

Anomaly detection, the identification of rare or unusual patterns that deviate from normal behavior, is a fundamental task with wide-ranging applications across various domains. Traditional machine learning techniques often struggle to effectively capture the complex temporal dynamics present in real-world data streams. Spiking Neural Networks (SNNs), inspired by the spiking nature of biological neurons, offer a promising approach by inherently modeling temporal information through precise spike timing. In this study, we investigate the use of Spiking Neural Networks (SNNs) for detecting anomalies or unusual patterns in data. We propose an SNN model that can learn what constitutes normal …


Research On Theoretical Framework Of Simulative Experiment Evalution For Intelligent Unmanned Swarm Cooperation, Jipeng Wang, Xing Zhang, Hao Wu, Yu Gu, Huijie Yang Apr 2024

Research On Theoretical Framework Of Simulative Experiment Evalution For Intelligent Unmanned Swarm Cooperation, Jipeng Wang, Xing Zhang, Hao Wu, Yu Gu, Huijie Yang

Journal of System Simulation

Abstract: As a typical representative of intelligent equipment, the technology, equipment and combat applications of intelligent unmanned swarm are being promoted globally. However, the research on experimental theory of unmanned swarm lags behind the technology and equipment in general. The emergence of swarm ability and complexity of confrontation of unmanned swarm, the nonrepeatability and non-generalization of swam experiment take great challenge to the basic theory and methods of unmanned swarm. The four experimental models including intelligent technology, intelligent equipment, intelligent swarm, and intelligent sos(system of systems) experiment from the perspective of system engineering and the whole life cycle of equipment …


Research On Cross-Domain Unmanned Swarm Cooperative Anti-Submarine Search Method, Ning Wang, Xiaolong Liang, Jiaqiang Zhang, Yueqi Hou, Aiwu Yang Apr 2024

Research On Cross-Domain Unmanned Swarm Cooperative Anti-Submarine Search Method, Ning Wang, Xiaolong Liang, Jiaqiang Zhang, Yueqi Hou, Aiwu Yang

Journal of System Simulation

Abstract: For the maritime ASW search, a cross-domain unmanned swarm cooperative search method is proposed in which USVs are used as the communication relay of UAVs. The digital grid map is used to characterize the mission area and the kinematic model of cross-domain platform is constructed. The cooperative method of cross-domain unmanned systems is proposed, and the distributed information fusion mechanism of unmanned systems is designed. The search objective function for heterogeneous platforms is designed to guide the unmanned systems to make real-time decisions in search task. The simulation results show that the proposed method can be effective to the …


Simulation Verification And Decision-Making Key Technologies Of Unmanned Swarm Game Confrontation: A Survey, Xiaolong Liang, Aiwu Yang, Jiaqiang Zhang, Yueqi Hou, Ning Wang, Xiao Huang, Junbin Gong Apr 2024

Simulation Verification And Decision-Making Key Technologies Of Unmanned Swarm Game Confrontation: A Survey, Xiaolong Liang, Aiwu Yang, Jiaqiang Zhang, Yueqi Hou, Ning Wang, Xiao Huang, Junbin Gong

Journal of System Simulation

Abstract: Unmanned swarm game confrontation is a new combat mode and plays a crucial role in intelligent warfare. Its core is the autonomous generation of a series of game confrontation decision sequences to "empower" the swarm. The progress of system simulation verification for the unmanned swarm game confrontation is analyzed. The key technologies of the autonomous decision-making are discussed from three aspects, technology based on expert systems and game theory, technology based on swarm intelligence and optimization theory, and technology based on neural networks and reinforcement learning. The key technology research conducted by the author's team on the autonomous decisionmaking …


Research On Integration Of Virtual-Real Hybrid Simulation Experiment Environment For Unmanned Swarm, Huijie Yang, Taoshun Xiao, Chen Wu, Lingfeng Guo Apr 2024

Research On Integration Of Virtual-Real Hybrid Simulation Experiment Environment For Unmanned Swarm, Huijie Yang, Taoshun Xiao, Chen Wu, Lingfeng Guo

Journal of System Simulation

Abstract: Constructing the experiment environment and researching the core technology, key equipment and operation theory is the key step for the development of unmanned swarm. Based on the requirement of hybrid simulation environment for unmanned swarm, the elements of the experiment environment are analyzed, and the architecture is proposed, which is composed of common infrastructure, general experiment services, special experiment tools, security and support tool. The key experiment environment integration technology is studied from the aspects of experiment network, model data and experiment application. The feasibility of the method to construct the virtual-real hybrid simulation environment is verified by an …


Mixed-Variable Particle Swarm Optimization Algorithm Based On Competitive Coevolution, Hu Zhang, Heng Zhang, Zilu Huang, Zhe Wang, Qingpo Fu, Jin Peng, Feng Wang Apr 2024

Mixed-Variable Particle Swarm Optimization Algorithm Based On Competitive Coevolution, Hu Zhang, Heng Zhang, Zilu Huang, Zhe Wang, Qingpo Fu, Jin Peng, Feng Wang

Journal of System Simulation

Abstract: For the current algorithm, it is difficult to obtain the available solution due to the irregularity of problem decision space caused by the numerous mixed variable optimization problems during real industrial applications. The coevolution strategy is introduced and a mixed variable particle swarm optimization algorithm(CCPSO) based on competitive coevolution is proposed. The search direction adjustment mechanism based on tolerance is designed to judge the evolution state of particles, adaptively adjust the search direction of particles, avoid falling into local optimum, and balance the convergence and diversity of the population. The learning object generation mechanism is adopted for each particle …


Distributed Energy Management Strategy Of Microgrid Based On Master-Slave Game, Miaomiao Ma, Hao Wang, Lipeng Dong, Xiangjie Liu Apr 2024

Distributed Energy Management Strategy Of Microgrid Based On Master-Slave Game, Miaomiao Ma, Hao Wang, Lipeng Dong, Xiangjie Liu

Journal of System Simulation

Abstract: Under the operation mode of power market, based on two-layer master-slave game, a distributed energy management strategy for the microgrid is proposed to tackle the conflict between the overall optimal operation of renewable microgrid and the maximum profit of each investor. To fully consider the balance between energy supply and demand, the concept of power trading agent is introduced, and an integrated demand response strategy based on consumer satisfaction and adjustable load is proposed on the user side. Considering the initiative and decision-making ability of power supply and load, the decision-making game model is established with power trading agent …


Optimization Of Urban Traffic Microsimulation Model For Carbon Emission Reduction, Bo Liu, Jianxin Lin, Yini Liu, Dong Zhang Apr 2024

Optimization Of Urban Traffic Microsimulation Model For Carbon Emission Reduction, Bo Liu, Jianxin Lin, Yini Liu, Dong Zhang

Journal of System Simulation

Abstract: To assess the environmental benefits of transportation management or control strategies, a method to effectively integrate the micro-traffic simulation model and the micro-vehicle emission model is proposed. VISSIM platform is used to build a case micro traffic simulation model. K-means clustering method is used to divide the driving behavior into 4 types based on the acceleration and deceleration characteristics of different speed intervals of the trajectory data, and the global parameters of the simulation model are calibrated based on the driving characteristics, which quantitatively describe the total sensitivity of the parameters and the sensitivity of the interactions between the …


Asl-Catboost Method For Wind Turbine Fault Detection Integrated With Digital Twin, Hongtao Liang, Lingchao Kong, Guozhu Liu, Wenxuan Dong, Xiangyi Liu Apr 2024

Asl-Catboost Method For Wind Turbine Fault Detection Integrated With Digital Twin, Hongtao Liang, Lingchao Kong, Guozhu Liu, Wenxuan Dong, Xiangyi Liu

Journal of System Simulation

Abstract: In view of the low visibility of the current wind farm status monitoring and insufficient realtime operation and maintenance, based on the concept of digital twin five-dimensional model, the framework of wind farm digital twin five-dimensional model is constructed. Aiming at the insufficient fault detection capability of traditional algorithms and unbalanced positive and negative samples in fan fault data set, the improved ASL-CatBoost algorithm is proposed to achieve the accurate detection of fan fault status. Based on the digital twinning platform, combined with MATLAB/Simulink, the simulation mathematical model of doubly-fed wind turbine under the condition of blade mass imbalance …


Handling Constrained Multi-Objective Optimization Problems Based On Relationship Between Pareto Fronts, Yubo Wang, Chengyu Hu, Wenyin Gong Apr 2024

Handling Constrained Multi-Objective Optimization Problems Based On Relationship Between Pareto Fronts, Yubo Wang, Chengyu Hu, Wenyin Gong

Journal of System Simulation

Abstract: To address the challenges of balancing the constraint satisfaction and objective function optimization, and dealing with the complex feasible regions in constrained multi-objective optimization problems(CMOPs), a classification-based search approach is proposed based on different Pareto front relationships. A dual-population dual-phase framework is proposed in which an auxiliary population Pa and a main population Pm are evolved and the evolution process is divided into a learning phase and a search phase. During the learning phase, Pa explores unconstrained Pareto front (UPF) and Pm explores constrained Pareto front(CPF), through which the relationship between UPF and CPF is determined. After completing the …


Path Planning Rapid Algorithm Based On Modified Rrt* For Unmanned Surface Vessel, Zhaozhen Jiang, Wenlong Wang, Wenqi Sun Apr 2024

Path Planning Rapid Algorithm Based On Modified Rrt* For Unmanned Surface Vessel, Zhaozhen Jiang, Wenlong Wang, Wenqi Sun

Journal of System Simulation

Abstract: Aiming at the weak purposiveness of rapidly exploring random tree algorithm in USV path planning, a modified rapid algorithm is proposed. The artificial potential field method is improved and the force analysis in four directions is added to comprehensively calculate the resultant force on USV. The calculation method of steering angle is redefined to avoid entering the local optimal trap and can reach the target point smoothly to obtain an initial path. The initial path is used to set the random point sampling area of rapidly exploring random tree algorithm. By reducing the probability of random points generated in …


Intelligent Optimization Method Of Cloud Manufacturing Swarm Based On Incomplete Information Game, Kunpeng Zhang, Yan Wang, Zhicheng Ji Apr 2024

Intelligent Optimization Method Of Cloud Manufacturing Swarm Based On Incomplete Information Game, Kunpeng Zhang, Yan Wang, Zhicheng Ji

Journal of System Simulation

Abstract: In the process of cloud manufacturing, the incomplete information status and the mutual competition and restriction relationship between cloud platform operator and demander lead to the difficult choice of manufacturing services. A cloud manufacturing swarm intelligent optimization method based on incomplete information game model is proposed. A static game model based on incomplete information is established for the interest competition between demand-side and cloud platform, with the goal of rationally pursuing the maximization of their own revenue function. The competition rules between demand-side and cloud platform are proposed, which are introduced into nature through Harsanyi transformation and converted into …


Modeling And Analysis Of Hybrid Traffic Flow Considering Actual Behavior Of Platoon, Xi Wang, Xiujian Yang, Xiaohan Jia, Shenyi Wang Apr 2024

Modeling And Analysis Of Hybrid Traffic Flow Considering Actual Behavior Of Platoon, Xi Wang, Xiujian Yang, Xiaohan Jia, Shenyi Wang

Journal of System Simulation

Abstract: To explore the effect of actual behavior of autonomous vehicular platoon on traffic flow, aiming at the hybrid traffic flow mixed with predecessor following(PF) platoon which is modeled according to the actual control strategy, a hybrid traffic flow model is established based on cellular automata(CA) modeling method. Simulation analysis shows that the effect of platoon characteristics such as time headway, market penetration, platoon size, and control gains on hybrid traffic flow presents coupling and nonlinear properties. The spatiotemporal behavior of hybrid traffic flow with different platoon characteristics is generally much different. Reducing time headway or increasing platoon market penetration …


Hyper-Heuristic Approach With K-Means Clustering For Inter-Cell Scheduling, Yanlin Zhao, Yunna Tian Apr 2024

Hyper-Heuristic Approach With K-Means Clustering For Inter-Cell Scheduling, Yanlin Zhao, Yunna Tian

Journal of System Simulation

Abstract: According to the actual production situation of China's manufacturing industry, a hyperheuristic algorithm based on K-means clustering is proposed for inter-cell scheduling problem of flexible job-shop. K-means clustering is applied to group entities with similar attributes into the corresponding work cluster decision blocks, and the ant colony algorithm is used to select heuristic rules for each decision block. The optimal scheduling solutions are generated by using corresponding heuristic rules for scheduling of entities in each decision block. Computational results show that, the computational granularity is properly increased by the form of decision blocks, and the computational efficiency of the …


Dynamic Path Planning For Mobile Robot Based On Rrt* And Dynamic Window Approach, Rui Zhang, Li Zhou, Zhengyang Liu Apr 2024

Dynamic Path Planning For Mobile Robot Based On Rrt* And Dynamic Window Approach, Rui Zhang, Li Zhou, Zhengyang Liu

Journal of System Simulation

Abstract: A dynamic path planning method combining RRT* and dynamic window approach(DWA) is proposed to realize the obstacle avoidance of mobile robot in complex environment of dynamic obstacles. Improved RRT* algorithm is used to generate the global optimal safe path based on the known environment information. By eliminating the dangerous nodes generated by RRT* algorithm, the security of global path is ensured. Greedy algorithm is used to remove the redundant nodes in the path to reduce the length of global path. DWA is used to track along the global optimal path planned by the improved RRT* algorithm. When static obstacles …


Collaborative Navigation Method For 5g Cluster Uav Based On Configuration Optimization, Chao Gao, Zheng Huang, Xuan Zhao, Hongxing Wang, Tao Long Apr 2024

Collaborative Navigation Method For 5g Cluster Uav Based On Configuration Optimization, Chao Gao, Zheng Huang, Xuan Zhao, Hongxing Wang, Tao Long

Journal of System Simulation

Abstract: The existing range based cooperative navigation methods for clustered UAVs generally ignore the impact of space configuration on positioning and energy determination, which makes it difficult to obtain the accurate navigation and positioning results. In view of this, a collaborative navigation method is proposed for 5G clustered UAVs based on spatial configuration optimization. The relative ranging error model of UAVs based on 5G signals in complex environments is constructed, and the optimization strategy for collaborative navigation nodes is established based on the minimum geometric division of precision(GDOP) criterion to achieve the real-time optimization of collaborative navigation spatial configuration; A …


Incremental Image Dehazing Algorithm Based On Multiple Transfer Attention, Jinyang Wei, Keping Wang, Yi Yang, Shumin Fei Apr 2024

Incremental Image Dehazing Algorithm Based On Multiple Transfer Attention, Jinyang Wei, Keping Wang, Yi Yang, Shumin Fei

Journal of System Simulation

Abstract: In order to improve the processing ability of the depth-neural network dehazing algorithm to the supplementary data set, and to make the network differently process the image features of different importance to improve the dehazing ability of the network, an incremental dehazing algorithm based on multiple migration of attention is proposed. The teacher's attention generation network in the form of Encoder-Decoder extracts the multiple attention of labels and haze, which is used it as the label of the characteristic migration media network to constrain the network training to form the migration media attention as close as possible to the …


A Multi-Uav Collaborative Priority Coverage Search Algorithm, Xiang Yu, Qianrui Deng, Sirui Duan, Chen Jiang Apr 2024

A Multi-Uav Collaborative Priority Coverage Search Algorithm, Xiang Yu, Qianrui Deng, Sirui Duan, Chen Jiang

Journal of System Simulation

Abstract: For the challenges such as large disaster area, uneven distribution of key areas and limited rescue time in emergency rescue, a multi-UAV collaborative priority coverage search algorithm is proposed. The search area is rasterized, and each grid is probabilistically labeled according to the disaster prediction information. The search area is divided into sub-regions of similar size and equal number of UAVs by K-means++ algorithm, and the search starting point of each sub-region is determined based on the clustering center, so that the multiple UAVs can carry out the partition cooperative search of the whole area. The score of each …


Research On Dynamic Scene Slam Based On Improved Object Detection, Lanxi Shi, Wenxu Yan, Hongyu Ni, Feng Zhao Apr 2024

Research On Dynamic Scene Slam Based On Improved Object Detection, Lanxi Shi, Wenxu Yan, Hongyu Ni, Feng Zhao

Journal of System Simulation

Abstract: Aiming at the epipolar constraint matching problem of monocular SLAM in dynamic scenes a dynamic feature point selection method based on object detection is proposed, in which the dynamic feature points in the front-end image frame of SLAM system is eliminated during feature extraction to improve the localization accuracy of SLAM. An improved target detection network is proposed to construct a loss function to describe the bounding box by using the overlap area, distance similarity and cosine similarity, which can achieve the accurate localization of target objects and obtain the range of object feature points in the current image …


Study On Forest Fire Visual Analysis Method For Extinguishing Command In Virtual Environment, Benrun Zhang, Weiqun Cao Apr 2024

Study On Forest Fire Visual Analysis Method For Extinguishing Command In Virtual Environment, Benrun Zhang, Weiqun Cao

Journal of System Simulation

Abstract: Aiming at the demand of forest fire fighting command, the information required for the command, such as geographical environment, meteorological conditions, forest resources and forest fire behavior are comprehensively analyzed, and the data visualization visual analysis method in the virtual forest fire environment is designed and realized. Wang Zhengfei-3D mixed cellular automata model is used to simulate the process of forest fire spread and the difference time method is adopted to predict the forest fire spreading behavior. The change of environmental data in different interest domains is captured in real time, and the multi-view panel and overlay layers are …


Element Grouping Faceted Fully Connected Network Based On Ris, Shunhu Hou, Shengliang Fang, Qingyao Zeng, Mengtao Wang Apr 2024

Element Grouping Faceted Fully Connected Network Based On Ris, Shunhu Hou, Shengliang Fang, Qingyao Zeng, Mengtao Wang

Journal of System Simulation

Abstract: In view of the over-fitting problem that caused by multiple parameters and high memory usage of the full connection layer of neural network in training, a RIS-based element grouping areal fully connected neural network (RGFCNN) is proposed for the first time based on the structural characteristics of reconfigurable intelligence surface (RIS). Based on the structural characteristics of RIS, the network is optimized on traditional FCNN. A novel transmission surface attention mechanism is designed for the effective feature extraction of data. Compared with the traditional FCNNs, the proposed network does not arrange the data in one-dimensional manner. Instead, a element …


A Reputation System For Provably-Robust Decision Making In Iot Blockchain Networks, Charles C. Rawlins, Sarangapani Jagannathan, Venkata Sriram Siddhardh Nadendla Apr 2024

A Reputation System For Provably-Robust Decision Making In Iot Blockchain Networks, Charles C. Rawlins, Sarangapani Jagannathan, Venkata Sriram Siddhardh Nadendla

Electrical and Computer Engineering Faculty Research & Creative Works

Blockchain systems have been successful in discerning truthful information from interagent interaction amidst possible attackers or conflicts, which is crucial for the completion of nontrivial tasks in distributed networking. However, the state-of-the-art blockchain protocols are limited to resource-rich applications where reliably connected nodes within the network are equipped with significant computing power to run lottery-based proof-of-work (pow) consensus. The purpose of this work is to address these challenges for implementation in a severely resource-constrained distributed network with internet of things (iot) devices. The contribution of this work is a novel lightweight alternative, called weight-based reputation (wbr) scheme, to classify new …


A Case Study Of The Crashoverride Malware, Its Effects And Possible Countermeasures, Samuel Rector Apr 2024

A Case Study Of The Crashoverride Malware, Its Effects And Possible Countermeasures, Samuel Rector

Cybersecurity Undergraduate Research Showcase

CRASHOVERRIDE is a modular malware tailor-made for electric grid Industrial Control System (ICS) equipment and was deployed by a group named ELECTRUM in a Ukrainian substation. The malware would launch a protocol exploit to flip breakers and would then wipe the system of ICS files. Finally, it would execute a Denial Of Service (DOS) attack on protective relays. In effect, months of damage and thousands out of power. However, due to oversights the malware only caused a brief power outage. Though the implications of the malware are cause for researching and implementing countermeasures against others to come. The CISA recommends …


Immersive Japanese Language Learning Web Application Using Spaced Repetition, Active Recall, And An Artificial Intelligent Conversational Chat Agent Both In Voice And In Text, Marc Butler Apr 2024

Immersive Japanese Language Learning Web Application Using Spaced Repetition, Active Recall, And An Artificial Intelligent Conversational Chat Agent Both In Voice And In Text, Marc Butler

MS in Computer Science Project Reports

In the last two decades various human language learning applications, spaced repetition software, online dictionaries, and artificial intelligent chat agents have been developed. However, there is no solution to cohesively combine these technologies into a comprehensive language learning application including skills such as speaking, typing, listening, and reading. Our contribution is to provide an immersive language learning web application to the end user which combines spaced repetition, a study technique used to review information at systematic intervals, and active recall, the process of purposely retrieving information from memory during a review session, with an artificial intelligent conversational chat agent both …


Artificial Sociality, Simone Natale, Iliana Depounti Apr 2024

Artificial Sociality, Simone Natale, Iliana Depounti

Human-Machine Communication

This article proposes the notion of Artificial Sociality to describe communicative AI technologies that create the impression of social behavior. Existing tools that activate Artificial Sociality include, among others, Large Language Models (LLMs) such as ChatGPT, voice assistants, virtual influencers, socialbots and companion chatbots such as Replika. The article highlights three key issues that are likely to shape present and future debates about these technologies, as well as design practices and regulation efforts: the modelling of human sociality that foregrounds it, the problem of deception and the issue of control from the part of the users. Ethical, social and cultural …


Convolutional Spiking Neural Networks For Intent Detection Based On Anticipatory Brain Potentials Using Electroencephalogram, Nathan Lutes, V. Sriram Siddhardh Nadendla, K. Krishnamurthy Apr 2024

Convolutional Spiking Neural Networks For Intent Detection Based On Anticipatory Brain Potentials Using Electroencephalogram, Nathan Lutes, V. Sriram Siddhardh Nadendla, K. Krishnamurthy

Computer Science Faculty Research & Creative Works

Spiking neural networks (SNNs) are receiving increased attention because they mimic synaptic connections in biological systems and produce spike trains, which can be approximated by binary values for computational efficiency. Recently, the addition of convolutional layers to combine the feature extraction power of convolutional networks with the computational efficiency of SNNs has been introduced. This paper studies the feasibility of using a convolutional spiking neural network (CSNN) to detect anticipatory slow cortical potentials (SCPs) related to braking intention in human participants using an electroencephalogram (EEG). Data was collected during an experiment wherein participants operated a remote-controlled vehicle on a testbed …


Time Series Models For Predicting Application Gpu Utilization And Power Draw Based On Trace Data, Dorothy Xiaoshuang Parry Apr 2024

Time Series Models For Predicting Application Gpu Utilization And Power Draw Based On Trace Data, Dorothy Xiaoshuang Parry

Electrical & Computer Engineering Theses & Dissertations

This work explores collecting performance metrics and leveraging various statistical and machine learning time series predictive models on a memory-intensive application, Inception v3. Trace data collected using nvidia-smi measured GPU utilization and power draw for two runs of Inception3. Experimental results from the statistical and machine learning-based time series predictive algorithms showed that the predictions from statistical-based models were unable to capture the complex changes in the trace data. The Probabilistic TNN model provided the best results for the power draw trace, according to the test evaluation metrics. For the GPU utilization trace, the RNN models produced the most accurate …


Computational Modeling And Analysis Of Facial Expressions And Gaze For Discovery Of Candidate Behavioral Biomarkers For Children And Young Adults With Autism Spectrum Disorder, Megan Anita Witherow Apr 2024

Computational Modeling And Analysis Of Facial Expressions And Gaze For Discovery Of Candidate Behavioral Biomarkers For Children And Young Adults With Autism Spectrum Disorder, Megan Anita Witherow

Electrical & Computer Engineering Theses & Dissertations

Facial expression production and perception in autism spectrum disorder (ASD) suggest the potential presence of behavioral biomarkers that may stratify individuals on the spectrum into prognostic or treatment subgroups. High-speed internet and the ease of technology have enabled remote, scalable, affordable, and timely access to medical care, such as measurements of ASDrelated behaviors in familiar environments to complement clinical observation. Machine and deep learning (DL)-based analysis of video tracking (VT) of expression production and eye tracking (ET) of expression perception may aid stratification biomarker discovery for children and young adults with ASD. However, there are open challenges in 1) facial …


Editorial: Emerging On-Demand Passenger And Logistics Systems: Modelling, Optimization, And Data Analytics, Jintao Ke, Hai Wang, Neda Masoud, Maximilian Schiffer, Goncalo H. A. Correia Apr 2024

Editorial: Emerging On-Demand Passenger And Logistics Systems: Modelling, Optimization, And Data Analytics, Jintao Ke, Hai Wang, Neda Masoud, Maximilian Schiffer, Goncalo H. A. Correia

Research Collection School Of Computing and Information Systems

The proliferation of smart personal devices and mobile internet access has fueled numerous advancements in on-demand transportation services. These services are facilitated by online digital platforms and range from providing rides to delivering products. Their influence is transforming transportation systems and leaving a mark on changing individual mobility, activity patterns, and consumption behaviors. For instance, on-demand transportation companies such as Uber, Lyft, Grab, and DiDi have become increasingly vital for meeting urban transportation needs by connecting available drivers with passengers in real time. The recent surge in door-to-door food delivery (e.g., Uber Eats, DoorDash, Meituan); grocery delivery (e.g., Amazon Fresh, …