Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Singapore Management University (60)
- Old Dominion University (14)
- University of Nebraska - Lincoln (12)
- Wright State University (10)
- University of Kentucky (6)
-
- Michigan Technological University (5)
- University of New Haven (5)
- University of South Carolina (5)
- Chapman University (4)
- Fordham University (4)
- San Jose State University (4)
- Western University (4)
- Missouri University of Science and Technology (3)
- Western Michigan University (3)
- City University of New York (CUNY) (2)
- Edith Cowan University (2)
- Embry-Riddle Aeronautical University (2)
- Loyola University Chicago (2)
- Sheridan College (2)
- University of Nevada, Las Vegas (2)
- Virginia Commonwealth University (2)
- Air Force Institute of Technology (1)
- Bryn Mawr College (1)
- College of Saint Benedict and Saint John's University (1)
- Florida International University (1)
- La Salle University (1)
- Montclair State University (1)
- Rose-Hulman Institute of Technology (1)
- Southern Adventist University (1)
- Technological University Dublin (1)
- Keyword
-
- Robotics (7)
- Deep learning (5)
- Artificial intelligence (3)
- Behavior-Based (3)
- Center for Cyber-Physical Systems (3)
-
- Data integration (3)
- Department of Electrical and Computer Engineering (3)
- Formal Verification (3)
- Optimization (3)
- Validation (3)
- Access control (2)
- Algorithms (2)
- Android (2)
- Bench-mark problems (2)
- Biometrics (2)
- Calibration (2)
- Cloud computing (2)
- Collaboration (2)
- Collaborative filtering (2)
- College seniors (2)
- Computer forensics (2)
- Computing (2)
- Continuous vision (2)
- Crowdsourcing (2)
- Cybersecurity (2)
- Data analysis (2)
- Data fusion (2)
- Digital forensics (2)
- Engineering design, contest (2)
- Engineering, studying and teaching (2)
- Publication
-
- Research Collection School Of Computing and Information Systems (59)
- Faculty Publications (13)
- Computer Science and Engineering Faculty Publications (10)
- CSE Conference and Workshop Papers (6)
- Electrical & Computer Engineering and Computer Science Faculty Publications (5)
-
- Michigan Tech Publications (5)
- Electrical & Computer Engineering Faculty Publications (4)
- Engineering Faculty Articles and Research (4)
- Information Science Faculty Publications (4)
- Department of Computer Science and Engineering: Dissertations, Theses, and Student Research (3)
- Electrical and Computer Engineering Publications (3)
- Information Technology & Decision Sciences Faculty Publications (3)
- Parallel Computing and Data Science Lab Technical Reports (3)
- Biosystems and Agricultural Engineering Faculty Publications (2)
- Computer Science: Faculty Publications and Other Works (2)
- Engineering Technology Faculty Publications (2)
- Fred and Harriet Cox Senior Design Competition Projects (2)
- Publications and Research (2)
- Publications and Scholarship (2)
- Research outputs 2014 to 2021 (2)
- AFIT Patents (1)
- All College Thesis Program, 2016-2019 (1)
- All Computer Science and Engineering Research (1)
- Branch Mathematics and Statistics Faculty and Staff Publications (1)
- CSE Technical Reports (1)
- Chemical and Life Science Engineering Publications (1)
- Computational Modeling & Simulation Engineering Faculty Publications (1)
- Computer Science Faculty Publications (1)
- Computer Science Faculty Research & Creative Works (1)
- Computer Science Faculty Research and Scholarship (1)
Articles 151 - 166 of 166
Full-Text Articles in Engineering
Error Aggregation In The Reengineering Process From 3d Scanning To Printing, Jennifer G. Michaeli, Matthew C. Degroff, Roman C. Roxas
Error Aggregation In The Reengineering Process From 3d Scanning To Printing, Jennifer G. Michaeli, Matthew C. Degroff, Roman C. Roxas
Engineering Technology Faculty Publications
This work aims to study the aggregation of dimensional errors in the reengineering processes using 3D scanning and printing without initial design drawings. A 57-tooth spur gear is used as an example to facilitate the discussion. Two approaches are investigated. The first one builds the gear model based upon measurement taken from a caliper, and the second approach uses a 3D scanner to collect geometry data. Dimensional errors in each stage of these two approaches are investigated. Particular attention is paid to the geometry data flow in the reengineering process from data acquisition and editing to model construction. Recommendations are …
Secrecy Rates And Optimal Power Allocation For Full-Duplex Decode-And-Forward Relay Wire-Tap Channels, Lubna Elsaid, Leonardo Jimenez-Rodriguez, Nghi H. Tran, Sachin Shetty, Shivakumar Sastry
Secrecy Rates And Optimal Power Allocation For Full-Duplex Decode-And-Forward Relay Wire-Tap Channels, Lubna Elsaid, Leonardo Jimenez-Rodriguez, Nghi H. Tran, Sachin Shetty, Shivakumar Sastry
Computational Modeling & Simulation Engineering Faculty Publications
This paper investigates the secrecy rates and optimal power allocation schemes for a decode-and-forward wiretap relay channel where the transmission from a source to a destination is aided by a relay operating in a full-duplex (FD) mode under practical residual self-interference. By first considering static channels, we address the non-convex optimal power allocation problems between the source and relay nodes under individual and joint power constraints to establish closed-form solutions. An asymptotic analysis is then given to provide important insights on the derived power allocation solutions. Specifically, by using the method of dominant balance, it is demonstrated that full power …
Industrial Wireless Sensor Networks 2016, Qindong Sun, Schancang Li, Shanshan Zhao, Hongjian Sun, Li Xu, Arumugam Nallamathan
Industrial Wireless Sensor Networks 2016, Qindong Sun, Schancang Li, Shanshan Zhao, Hongjian Sun, Li Xu, Arumugam Nallamathan
Information Technology & Decision Sciences Faculty Publications
The industrial wireless sensor network (IWSN) is the next frontier in the Industrial Internet of Things (IIoT), which is able to help industrial organizations to gain competitive advantages in industrial manufacturing markets by increasing productivity, reducing the costs, developing new products and services, and deploying new business models.
Qos Recommendation In Cloud Services, Xianrong Zheng, Li Da Xu, Sheng Chai
Qos Recommendation In Cloud Services, Xianrong Zheng, Li Da Xu, Sheng Chai
Information Technology & Decision Sciences Faculty Publications
As cloud computing becomes increasingly popular, cloud providers compete to offer the same or similar services over the Internet. Quality of service (QoS), which describes how well a service is performed, is an important differentiator among functionally equivalent services. It can help a firm to satisfy and win its customers. As a result, how to assist cloud providers to promote their services and cloud consumers to identify services that meet their QoS requirements becomes an important problem. In this paper, we argue for QoS-based cloud service recommendation, and propose a collaborative filtering approach using the Spearman coefficient to recommend cloud …
Human-Intelligence/Machine-Intelligence Decision Governance: An Analysis From Ontological Point Of View, Faisal Mahmud, Teddy Steven Cotter
Human-Intelligence/Machine-Intelligence Decision Governance: An Analysis From Ontological Point Of View, Faisal Mahmud, Teddy Steven Cotter
Engineering Management & Systems Engineering Faculty Publications
The increasing CPU power and memory capacity of computers, and now computing appliances, in the 21st century has allowed accelerated integration of artificial intelligence (AI) into organizational processes and everyday life. Artificial intelligence can now be found in a wide range of organizational processes including medical diagnosis, automated stock trading, integrated robotic production systems, telecommunications routing systems, and automobile fuzzy logic controllers. Self-driving automobiles are just the latest extension of AI. This thrust of AI into organizations and everyday life rests on the AI community’s unstated assumption that “…every aspect of human learning and intelligence could be so precisely described …
Power Budgets For Cubesat Radios To Support Ground Communications And Inter-Satellite Links, Otilia Popescu
Power Budgets For Cubesat Radios To Support Ground Communications And Inter-Satellite Links, Otilia Popescu
Engineering Technology Faculty Publications
CubeSats are a class of pico-satellites that have emerged over the past decade as a cost-effective alternative to the traditional large satellites to provide space experimentation capabilities to universities and other types of small enterprises, which otherwise would be unable to carry them out due to cost constraints. An important consideration when planning CubeSat missions is the power budget required by the radio communication subsystem, which enables a CubeSat to exchange information with ground stations and/or other CubeSats in orbit. The power that a CubeSat can dedicate to the communication subsystem is limited by the hard constraints on the total …
Quasivarieties And Varieties Of Ordered Algebras: Regularity And Exactness, Alexander Kurz
Quasivarieties And Varieties Of Ordered Algebras: Regularity And Exactness, Alexander Kurz
Engineering Faculty Articles and Research
We characterise quasivarieties and varieties of ordered algebras categorically in terms of regularity, exactness and the existence of a suitable generator. The notions of regularity and exactness need to be understood in the sense of category theory enriched over posets.
We also prove that finitary varieties of ordered algebras are cocompletions of their theories under sifted colimits (again, in the enriched sense).
The Positivication Of Coalgebraic Logics, Fredrik Dahlqvist, Alexander Kurz
The Positivication Of Coalgebraic Logics, Fredrik Dahlqvist, Alexander Kurz
Engineering Faculty Articles and Research
We present positive coalgebraic logic in full generality, and show how to obtain a positive coalgebraic logic from a boolean one. On the model side this involves canonically computing a endofunctor T': Pos->Pos from an endofunctor T: Set->Set, in a procedure previously defined by the second author et alii called posetification. On the syntax side, it involves canonically computing a syntax-building functor L': DL->DL from a syntax-building functor L: BA->BA, in a dual procedure which we call positivication. These operations are interesting in their own right and we explicitly compute posetifications and positivications in the case …
Advances On Software Defined Wireless Networking, D. B. Rawat, M. Song, C. Xin
Advances On Software Defined Wireless Networking, D. B. Rawat, M. Song, C. Xin
Electrical & Computer Engineering Faculty Publications
Software defined wireless networking is regarded as an emerging technology to enhance spectrum efficiency and improve the overall network performance. In this paper, we summarise the special issue on recent advances in software defined wireless networking. Specifically, this special issue publishes following findings: i) a novel context aware medium access control scheme for multichannel buffer-aided cognitive networks to reduce the delay by exploiting the packets’ contexts; ii) a utility-based uplink scheduling algorithm that accommodates different performance metrics and adapts its decisions based on user-specified profiles by incorporating an intermediary layer between the MAC and network layer; iii) an opportunistic spectrum …
Teaching Hands-On Cyber Defense Labs To Middle School And High School Students: Our Experience From Gencyber Camps, Peng Jiang, Xin Tian, Chunsheng Xin, Wu He
Teaching Hands-On Cyber Defense Labs To Middle School And High School Students: Our Experience From Gencyber Camps, Peng Jiang, Xin Tian, Chunsheng Xin, Wu He
Electrical & Computer Engineering Faculty Publications
With the high demand of the nation for next generation cybersecurity experts, it is important to design and provide hands-on labs for students at the K-12 level in order to increase their interest in cybersecurity and enhance their confidence in learning cybersecurity skills at the young age. This poster reports some preliminary analysis results from the 2016 GenCyber summer camp held at Old Dominion University (ODU), which is part of a nationwide grant program funded by the National Security Agency (NSA) and the National Science Foundation (NSF). This poster also demonstrates the design of three hands-on labs which have been …
Semantic Inference On Clinical Documents: Combining Machine Learning Algorithms With An Inference Engine For Effective Clinical Diagnosis And Treatment, Shuo Yang, Ran Wei, Jingzhi Guo, Lida Xu
Semantic Inference On Clinical Documents: Combining Machine Learning Algorithms With An Inference Engine For Effective Clinical Diagnosis And Treatment, Shuo Yang, Ran Wei, Jingzhi Guo, Lida Xu
Information Technology & Decision Sciences Faculty Publications
Clinical practice calls for reliable diagnosis and optimized treatment. However, human errors in health care remain a severe issue even in industrialized countries. The application of clinical decision support systems (CDSS) casts light on this problem. However, given the great improvement in CDSS over the past several years, challenges to their wide-scale application are still present, including: 1) decision making of CDSS is complicated by the complexity of the data regarding human physiology and pathology, which could render the whole process more time-consuming by loading big data related to patients; and 2) information incompatibility among different health information systems (HIS) …
Sensitivity Analysis Method To Address User Disparities In The Analytic Hierarchy Process, Marie Ivanco, Gene Hou, Jennifer Michaeli
Sensitivity Analysis Method To Address User Disparities In The Analytic Hierarchy Process, Marie Ivanco, Gene Hou, Jennifer Michaeli
Mechanical & Aerospace Engineering Faculty Publications
Decision makers often face complex problems, which can seldom be addressed well without the use of structured analytical models. Mathematical models have been developed to streamline and facilitate decision making activities, and among these, the Analytic Hierarchy Process (AHP) constitutes one of the most utilized multi-criteria decision analysis methods. While AHP has been thoroughly researched and applied, the method still shows limitations in terms of addressing user profile disparities. A novel sensitivity analysis method based on local partial derivatives is presented here to address these limitations. This new methodology informs AHP users of which pairwise comparisons most impact the derived …
Deep Models For Engagement Assessment With Scarce Label Information, Feng Li, Guangfan Zhang, Wei Wang, Roger Xu, Tom Schnell, Jonathan Wen, Frederic Mckenzie, Jiang Li
Deep Models For Engagement Assessment With Scarce Label Information, Feng Li, Guangfan Zhang, Wei Wang, Roger Xu, Tom Schnell, Jonathan Wen, Frederic Mckenzie, Jiang Li
Electrical & Computer Engineering Faculty Publications
Task engagement is defined as loadings on energetic arousal (affect), task motivation, and concentration (cognition) [1]. It is usually challenging and expensive to label cognitive state data, and traditional computational models trained with limited label information for engagement assessment do not perform well because of overfitting. In this paper, we proposed two deep models (i.e., a deep classifier and a deep autoencoder) for engagement assessment with scarce label information. We recruited 15 pilots to conduct a 4-h flight simulation from Seattle to Chicago and recorded their electroencephalograph (EEG) signals during the simulation. Experts carefully examined the EEG signals and labeled …
Overview Of Metrics, Models, And Simulation For Cyber-Physical Systems, Barry C. Ezell, Luanne Burns Chamberland
Overview Of Metrics, Models, And Simulation For Cyber-Physical Systems, Barry C. Ezell, Luanne Burns Chamberland
VMASC Publications
The metric, models, and simulation for Cyber-Physical Systems focuses on the different frameworks that have been operationalized so that cyber-physical systems can be baselined in security. In addition, the minitrack is interest in innovations in decision support such as cost effective means to decide what metrics should be addressed to get the best value in cybersecurity. There are many challenges to overcome in cyber-physical systems. We ask: How should frameworks be operationalized? What methodologies are available to quantify cybersecurity frameworks while accounting for cyber-physical interactions into account.
Comparing An Atomic Model Or Structure To A Corresponding Cryo-Electron Microscopy Image At The Central Axis Of A Helix, Stephanie Zeil, Julio Kovacs, Willy Wriggers, Jing He
Comparing An Atomic Model Or Structure To A Corresponding Cryo-Electron Microscopy Image At The Central Axis Of A Helix, Stephanie Zeil, Julio Kovacs, Willy Wriggers, Jing He
Computer Science Faculty Publications
Three-dimensional density maps of biological specimens from cryo-electron microscopy (cryo-EM) can be interpreted in the form of atomic models that are modeled into the density, or they can be compared to known atomic structures. When the central axis of a helix is detectable in a cryo-EM density map, it is possible to quantify the agreement between this central axis and a central axis calculated from the atomic model or structure. We propose a novel arc-length association method to compare the two axes reliably. This method was applied to 79 helices in simulated density maps and six case studies using cryo-EM …
An Operational View In Computational Construction Of Information, Florentin Smarandache, Stefan Vladutescu, Constantin Dima, Valeriu Voinea
An Operational View In Computational Construction Of Information, Florentin Smarandache, Stefan Vladutescu, Constantin Dima, Valeriu Voinea
Branch Mathematics and Statistics Faculty and Staff Publications
The paper aims to explain the technology of emergence of information. Our research proves that information as communicational product is the result of processing within some operations, actions, mechanisms and strategies of informational material meanings. Are determined eight computational-communicative operations of building information. Information occurs in two communication phases, syncretic and the segregation-synthetic. The syncretic phase consists of four operations: referral of significant field, primary delimitation of information, detection-looking information and an anticipative-draft constitution (feedforward). The segregation-synthetic phase also includes four operations: discrimination, identification, interpretation and confrontation (feedback). In the future we will investigate informational actions, mechanisms and strategies.