Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 8 of 8

Full-Text Articles in Engineering

Facepet: Enhancing Bystanders' Facial Privacy With Smart Wearables/Internet Of Things, Alfredo J. Perez, Sherali Zeadally, Luis Y. Matos Garcia, Jaouad A. Mouloud, Scott Griffith Dec 2018

Facepet: Enhancing Bystanders' Facial Privacy With Smart Wearables/Internet Of Things, Alfredo J. Perez, Sherali Zeadally, Luis Y. Matos Garcia, Jaouad A. Mouloud, Scott Griffith

Information Science Faculty Publications

Given the availability of cameras in mobile phones, drones and Internet-connected devices, facial privacy has become an area of major interest in the last few years, especially when photos are captured and can be used to identify bystanders’ faces who may have not given consent for these photos to be taken and be identified. Some solutions to protect facial privacy in photos currently exist. However, many of these solutions do not give a choice to bystanders because they rely on algorithms that de-identify photos or protocols to deactivate devices and systems not controlled by bystanders, thereby being dependent on the …


X-Search: An Open Access Interface For Cross-Cohort Exploration Of The National Sleep Research Resource, Licong Cui, Ningzhou Zeng, Matthew Kim, Remo Mueller, Emily Ruth Hankosky, Susan Redline, Guo-Qiang Zhang Nov 2018

X-Search: An Open Access Interface For Cross-Cohort Exploration Of The National Sleep Research Resource, Licong Cui, Ningzhou Zeng, Matthew Kim, Remo Mueller, Emily Ruth Hankosky, Susan Redline, Guo-Qiang Zhang

Computer Science Faculty Publications

Background: The National Sleep Research Resource (NSRR) is a large-scale, openly shared, data repository of de-identified, highly curated clinical sleep data from multiple NIH-funded epidemiological studies. Although many data repositories allow users to browse their content, few support fine-grained, cross-cohort query and exploration at study-subject level. We introduce a cross-cohort query and exploration system, called X-search, to enable researchers to query patient cohort counts across a growing number of completed, NIH-funded studies in NSRR and explore the feasibility or likelihood of reusing the data for research studies.

Methods: X-search has been designed as a general framework with two loosely-coupled components: …


Query-Constraint-Based Mining Of Association Rules For Exploratory Analysis Of Clinical Datasets In The National Sleep Research Resource, Rashmie Abeysinghe, Licong Cui Jul 2018

Query-Constraint-Based Mining Of Association Rules For Exploratory Analysis Of Clinical Datasets In The National Sleep Research Resource, Rashmie Abeysinghe, Licong Cui

Computer Science Faculty Publications

Background: Association Rule Mining (ARM) has been widely used by biomedical researchers to perform exploratory data analysis and uncover potential relationships among variables in biomedical datasets. However, when biomedical datasets are high-dimensional, performing ARM on such datasets will yield a large number of rules, many of which may be uninteresting. Especially for imbalanced datasets, performing ARM directly would result in uninteresting rules that are dominated by certain variables that capture general characteristics.

Methods: We introduce a query-constraint-based ARM (QARM) approach for exploratory analysis of multiple, diverse clinical datasets in the National Sleep Research Resource (NSRR). QARM enables rule mining on …


Compact Hardware Implementation Of A Sha-3 Core For Wireless Body Sensor Networks, Yi Yang, Debiao He, Neeraj Kumar, Sherali Zeadally Jul 2018

Compact Hardware Implementation Of A Sha-3 Core For Wireless Body Sensor Networks, Yi Yang, Debiao He, Neeraj Kumar, Sherali Zeadally

Information Science Faculty Publications

One of the most important Internet of Things applications is the wireless body sensor network (WBSN), which can provide universal health care, disease prevention, and control. Due to large deployments of small scale smart sensors in WBSNs, security, and privacy guarantees (e.g., security and safety-critical data, sensitive private information) are becoming a challenging issue because these sensor nodes communicate using an open channel, i.e., Internet. We implement data integrity (to resist against malicious tampering) using the secure hash algorithm 3 (SHA-3) when smart sensors in WBSNs communicate with each other using the Internet. Due to the limited resources (i.e., storage, …


Sensor Technologies For Intelligent Transportation Systems, Juan Guerrero-Ibáñez, Sherali Zeadally, Juan Contreras-Castillo Apr 2018

Sensor Technologies For Intelligent Transportation Systems, Juan Guerrero-Ibáñez, Sherali Zeadally, Juan Contreras-Castillo

Information Science Faculty Publications

Modern society faces serious problems with transportation systems, including but not limited to traffic congestion, safety, and pollution. Information communication technologies have gained increasing attention and importance in modern transportation systems. Automotive manufacturers are developing in-vehicle sensors and their applications in different areas including safety, traffic management, and infotainment. Government institutions are implementing roadside infrastructures such as cameras and sensors to collect data about environmental and traffic conditions. By seamlessly integrating vehicles and sensing devices, their sensing and communication capabilities can be leveraged to achieve smart and intelligent transportation systems. We discuss how sensor technology can be integrated with the …


Scheduling Based On Interruption Analysis And Pso For Strictly Periodic And Preemptive Partitions In Integrated Modular Avionics, Hui Lu, Qianlin Zhou, Zongming Fei, Rongrong Zhou Mar 2018

Scheduling Based On Interruption Analysis And Pso For Strictly Periodic And Preemptive Partitions In Integrated Modular Avionics, Hui Lu, Qianlin Zhou, Zongming Fei, Rongrong Zhou

Computer Science Faculty Publications

Integrated modular avionics introduces the concept of partition and has been widely used in avionics industry. Partitions share the computing resources together. Partition scheduling plays a key role in guaranteeing correct execution of partitions. In this paper, a strictly periodic and preemptive partition scheduling strategy is investigated. First, we propose a partition scheduling model that allows a partition to be interrupted by other partitions, but minimizes the number of interruptions. The model not only retains the execution reliability of the simple partition sets that can be scheduled without interruptions, but also enhances the schedulability of the complex partition sets that …


A Fast And Robust Extrinsic Calibration For Rgb-D Camera Networks, Po-Chang Su, Ju Shen, Wanxin Xu, Sen-Ching S. Cheung, Ying Luo Jan 2018

A Fast And Robust Extrinsic Calibration For Rgb-D Camera Networks, Po-Chang Su, Ju Shen, Wanxin Xu, Sen-Ching S. Cheung, Ying Luo

Electrical and Computer Engineering Faculty Publications

From object tracking to 3D reconstruction, RGB-Depth (RGB-D) camera networks play an increasingly important role in many vision and graphics applications. Practical applications often use sparsely-placed cameras to maximize visibility, while using as few cameras as possible to minimize cost. In general, it is challenging to calibrate sparse camera networks due to the lack of shared scene features across different camera views. In this paper, we propose a novel algorithm that can accurately and rapidly calibrate the geometric relationships across an arbitrary number of RGB-D cameras on a network. Our work has a number of novel features. First, to cope …


Application Of Acoustic Emission And Machine Learning To Detect Codling Moth Infested Apples, Mengxing Li, Nader Ekramirad, Ahmed Rady, Akinbode A. Adedeji Jan 2018

Application Of Acoustic Emission And Machine Learning To Detect Codling Moth Infested Apples, Mengxing Li, Nader Ekramirad, Ahmed Rady, Akinbode A. Adedeji

Biosystems and Agricultural Engineering Faculty Publications

Incidence of codling moth (CM) (Cydia pomonella L.) infestation in apples has been a major concern in North America for decades. CM larvae bore deep into the fruit, making it unmarketable. An effective noninvasive method to detect larvae-infested apples is necessary to ensure that apples are CM-free in post-harvest processing. In this study, a novel approach using an acoustic emission (AE) system and subsequent machine learning methods was applied to classify larvae-infested apples from intact apples. 'GoldRush‘ apples were infested with CM neonates and stored at the same conditions as intact apples. The AE system was used to collect …