Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Old Dominion University (44)
- Singapore Management University (27)
- Missouri University of Science and Technology (17)
- University of Nebraska - Lincoln (9)
- Edith Cowan University (6)
-
- Michigan Technological University (6)
- Air Force Institute of Technology (5)
- Chapman University (5)
- Wright State University (4)
- Portland State University (3)
- Purdue University (3)
- Technological University Dublin (3)
- Western Kentucky University (3)
- Zayed University (3)
- California Polytechnic State University, San Luis Obispo (2)
- Embry-Riddle Aeronautical University (2)
- Western University (2)
- Belmont University (1)
- Dakota State University (1)
- Illinois State University (1)
- Rose-Hulman Institute of Technology (1)
- Rowan University (1)
- Sacred Heart University (1)
- San Jose State University (1)
- Texas A&M University-Commerce (1)
- University of South Carolina (1)
- University of Texas Rio Grande Valley (1)
- Keyword
-
- Machine learning (18)
- Deep learning (13)
- Artificial intelligence (9)
- Lifelong learning (6)
- Machine Learning (6)
-
- Artificial neural networks (5)
- Internet of things (5)
- Neural networks (5)
- Algorithms (4)
- Communication (4)
- Cybersecurity (4)
- Department of Mechanical Engineering-Engineering Mechanics (4)
- Feature extraction (4)
- Reinforcement learning (4)
- Security (4)
- Sensors (4)
- Vehicle routing problem (4)
- Computer security (3)
- Costs (3)
- Cryptography (3)
- Datasets (3)
- Department of Applied Computing (3)
- Engineering education (3)
- Experience replay (3)
- IoT (3)
- Multilayer neural networks (3)
- Optimal tracking control (3)
- Privacy (3)
- Singular value decomposition (3)
- Task analysis (3)
- Publication
-
- Research Collection School Of Computing and Information Systems (27)
- Electrical & Computer Engineering Faculty Publications (14)
- Electrical and Computer Engineering Faculty Research & Creative Works (14)
- Computer Science Faculty Publications (7)
- Engineering Technology Faculty Publications (6)
-
- Research outputs 2022 to 2026 (6)
- Faculty Publications (5)
- Michigan Tech Publications, Part 2 (5)
- VMASC Publications (5)
- Computer Science and Engineering Faculty Publications (4)
- Department of Computer Science and Engineering: Dissertations, Theses, and Student Research (4)
- Engineering Faculty Articles and Research (4)
- Mechanical & Aerospace Engineering Faculty Publications (4)
- All Works (3)
- School of Cybersecurity Faculty Publications (3)
- Systems Science Faculty Publications and Presentations (3)
- Civil & Environmental Engineering Faculty Publications (2)
- College of Engineering Summer Undergraduate Research Program (2)
- Computer Science Faculty Research & Creative Works (2)
- Department of Electrical and Computer Engineering Faculty Publications (2)
- Electrical and Computer Engineering Publications (2)
- Masters Theses & Specialist Projects (2)
- Publications (2)
- AFIT Patents (1)
- Articles (1)
- Belmont University Research Symposium (BURS) (1)
- Biological Systems Engineering: Papers and Publications (1)
- CERIAS Technical Reports (1)
- Civil, Architectural and Environmental Engineering Faculty Research & Creative Works (1)
- Conference Papers (1)
Articles 1 - 30 of 154
Full-Text Articles in Engineering
Passive Physical Layer Distinct Native Attribute Cyber Security Monitor, Christopher M. Rondeau, Michael A. Temple, Juan Lopez Jr, J. Addison Betances
Passive Physical Layer Distinct Native Attribute Cyber Security Monitor, Christopher M. Rondeau, Michael A. Temple, Juan Lopez Jr, J. Addison Betances
AFIT Patents
A method for cyber security monitor includes monitoring a network interface that is input-only configured to surreptitiously and covertly receive bit-level, physical layer communication between networked control and sensor field devices. During a training mode, a baseline distinct native attribute (DNA) fingerprint is generated for each networked field device. During a protection mode, a current DNA fingerprint is generated for each networked field device. The current DNA fingerprint is compared to the baseline DNA fingerprint for each networked field device. In response to detect at least one of RAA and PAA based on a change in the current DNA fingerprint …
Pollutant Forecasting Using Neural Network-Based Temporal Models, Richard Pike
Pollutant Forecasting Using Neural Network-Based Temporal Models, Richard Pike
Masters Theses & Specialist Projects
The Jing-Jin-Ji region of China is a highly industrialized and populated area of the country. Its periodic high pollution and smog includes particles smaller than 2.5 μm, known as PM2.5, linked to many respiratory and cardiovascular illnesses. PM2.5 concentration around Jing-Jin-Ji has exceeded China’s urban air quality safety threshold for over 20% of all days in 2017 through 2020.
The quantity of ground weather stations that measure the concentrations of these pollutants, and their valuable data, is unfortunately small. By employing many machine learning strategies, many researchers have focused on interpolating finer spatial grids of PM2.5, or hindcasting PM2.5. However, …
Vertical Free-Swinging Photovoltaic Racking Energy Modeling: A Novel Approach To Agrivoltaics, Koami Soulemane Hayibo, Joshua M. Pearce
Vertical Free-Swinging Photovoltaic Racking Energy Modeling: A Novel Approach To Agrivoltaics, Koami Soulemane Hayibo, Joshua M. Pearce
Electrical and Computer Engineering Publications
To enable lower-cost building materials, a free-swinging bifacial vertical solar photovoltaic (PV) rack has been proposed, which complies with Canadian building codes and is the lowest capital-cost agrivoltaics rack. The wind force applied to the free-swinging PV, however, causes it to have varying tilt angles depending on the wind speed and direction. No energy performance model accurately describes such a system. To provide a simulation model for the free-swinging PV, where wind speed and direction govern the array tilt angle, this study builds upon the open-source System Advisor Model (SAM) using Python. After the SAM python model is validated, a …
Enhanced Privacy-Enabled Face Recognition Using Κ-Identity Optimization, Ryan Karl
Enhanced Privacy-Enabled Face Recognition Using Κ-Identity Optimization, Ryan Karl
Department of Electrical and Computer Engineering: Dissertations, Theses, and Student Research
Facial recognition is becoming more and more prevalent in the daily lives of the common person. Law enforcement utilizes facial recognition to find and track suspects. The newest smartphones have the ability to unlock using the user's face. Some door locks utilize facial recognition to allow correct users to enter restricted spaces. The list of applications that use facial recognition will only increase as hardware becomes more cost-effective and more computationally powerful. As this technology becomes more prevalent in our lives, it is important to understand and protect the data provided to these companies. Any data transmitted should be encrypted …
On Dyadic Parity Check Codes And Their Generalizations, Meraiah Martinez
On Dyadic Parity Check Codes And Their Generalizations, Meraiah Martinez
Department of Mathematics: Dissertations, Theses, and Student Research
In order to communicate information over a noisy channel, error-correcting codes can be used to ensure that small errors don’t prevent the transmission of a message. One family of codes that has been found to have good properties is low-density parity check (LDPC) codes. These are represented by sparse bipartite graphs and have low complexity graph-based decoding algorithms. Various graphical properties, such as the girth and stopping sets, influence when these algorithms might fail. Additionally, codes based on algebraically structured parity check matrices are desirable in applications due to their compact representations, practical implementation advantages, and tractable decoder performance analysis. …
On The Effect Of Emotion Identification From Limited Translated Text Samples Using Computational Intelligence, Madiha Tahir, Zahid Halim, Muhmmad Waqas, Shanshan Tu
On The Effect Of Emotion Identification From Limited Translated Text Samples Using Computational Intelligence, Madiha Tahir, Zahid Halim, Muhmmad Waqas, Shanshan Tu
Research outputs 2022 to 2026
Emotion identification from text data has recently gained focus of the research community. This has multiple utilities in an assortment of domains. Many times, the original text is written in a different language and the end-user translates it to her native language using online utilities. Therefore, this paper presents a framework to detect emotions on translated text data in four different languages. The source language is English, whereas the four target languages include Chinese, French, German, and Spanish. Computational intelligence (CI) techniques are applied to extract features, dimensionality reduction, and classification of data into five basic classes of emotions. Results …
Neural Airport Ground Handling, Yaoxin Wu, Jianan Zhou, Yunwen Xia, Xianli Zhang, Zhiguang Cao, Jie Zhang
Neural Airport Ground Handling, Yaoxin Wu, Jianan Zhou, Yunwen Xia, Xianli Zhang, Zhiguang Cao, Jie Zhang
Research Collection School Of Computing and Information Systems
Airport ground handling (AGH) offers necessary operations to flights during their turnarounds and is of great importance to the efficiency of airport management and the economics of aviation. Such a problem involves the interplay among the operations that leads to NP-hard problems with complex constraints. Hence, existing methods for AGH are usually designed with massive domain knowledge but still fail to yield high-quality solutions efficiently. In this paper, we aim to enhance the solution quality and computation efficiency for solving AGH. Particularly, we first model AGH as a multiple-fleet vehicle routing problem (VRP) with miscellaneous constraints including precedence, time windows, …
Understanding The Impact Of Trade Policy Effect Uncertainty On Firm-Level Innovation Investment: A Deep Learning Approach, Daniel Chang, Nan Hu, Peng Liang, Morgan Swink
Understanding The Impact Of Trade Policy Effect Uncertainty On Firm-Level Innovation Investment: A Deep Learning Approach, Daniel Chang, Nan Hu, Peng Liang, Morgan Swink
Research Collection School Of Computing and Information Systems
Integrating the real options perspective and resource dependence theory, this study examines how firms adjust their innovation investments to trade policy effect uncertainty (TPEU), a less studied type of firm specific, perceived environmental uncertainty in which managers have difficulty predicting how potential policy changes will affect business operations. To develop a text-based, context-dependent, time-varying measure of firm-level perceived TPEU, we apply Bidirectional Encoder Representations from Transformers (BERT), a state-of-the-art deep learning approach. We apply BERT to analyze the texts of mandatory Management Discussion and Analysis (MD&A) sections of annual reports for a sample of 22,669 firm-year observations from 3,181 unique …
A Poisson-Based Distribution Learning Framework For Short-Term Prediction Of Food Delivery Demand Ranges, Jian Liang, Jintao Ke, Hai Wang, Hongbo Ye, Jinjun Tang
A Poisson-Based Distribution Learning Framework For Short-Term Prediction Of Food Delivery Demand Ranges, Jian Liang, Jintao Ke, Hai Wang, Hongbo Ye, Jinjun Tang
Research Collection School Of Computing and Information Systems
The COVID-19 pandemic has caused a dramatic change in the demand composition of restaurants and, at the same time, catalyzed on-demand food delivery (OFD) services—such as DoorDash, Grubhub, and Uber Eats—to a large extent. With massive amounts of data on customers, drivers, and merchants, OFD platforms can achieve higher efficiency with better strategic and operational decisions; these include dynamic pricing, order bundling and dispatching, and driver relocation. Some of these decisions, and especially proactive decisions in real time, rely on accurate and reliable short-term predictions of demand ranges or distributions. In this paper, we develop a Poisson-based distribution prediction (PDP) …
Analysis And Requirement Generation For Defense Intelligence Search: Addressing Data Overload Through Human–Ai Agent System Design For Ambient Awareness, Mark C. Duncan, Michael E. Miller, Brett J. Borghetti
Analysis And Requirement Generation For Defense Intelligence Search: Addressing Data Overload Through Human–Ai Agent System Design For Ambient Awareness, Mark C. Duncan, Michael E. Miller, Brett J. Borghetti
Faculty Publications
This research addresses the data overload faced by intelligence searchers in government and defense agencies. The study leverages methods from the Cognitive Systems Engineering (CSE) literature to generate insights into the intelligence search work domain. These insights are applied to a supporting concept and requirements for designing and evaluating a human-AI agent team specifically for intelligence search tasks. Domain analysis reveals the dynamic nature of the ‘value structure’, a term that describes the evolving set of criteria governing the intelligence search process. Additionally, domain insight provides details for search aggregation and conceptual spaces from which the value structure could be …
Closing The Gap: Leveraging Aes-Ni To Balance Adversarial Advantage And Honest User Performance In Argon2i, Nicholas Harrell, Nathaniel Krakauer
Closing The Gap: Leveraging Aes-Ni To Balance Adversarial Advantage And Honest User Performance In Argon2i, Nicholas Harrell, Nathaniel Krakauer
CERIAS Technical Reports
The challenge of providing data privacy and integrity while maintaining efficient performance for honest users is a persistent concern in cryptography. Attackers exploit advances in parallel hardware and custom circuit hardware to gain an advantage over regular users. One such method is the use of Application-Specific Integrated Circuits (ASICs) to optimize key derivation function (KDF) algorithms, giving adversaries a significant advantage in password guessing and recovery attacks. Other examples include using graphical processing units (GPUs) and field programmable gate arrays (FPGAs). We propose a focused approach to close the gap between adversarial advantage and honest user performance by leveraging the …
An Overview Of Elements And Relations: Aspects Of A Scientific Metaphysics, Martin Zwick
An Overview Of Elements And Relations: Aspects Of A Scientific Metaphysics, Martin Zwick
Systems Science Faculty Publications and Presentations
A talk on my book, Elements and Relations: Aspects of a Scientific Metaphysics. Book description:
This book develops the core proposition that systems theory is an attempt to construct an “exact and scientific metaphysics,” a system of general ideas central to science that can be expressed mathematically. Collectively, these ideas would constitute a non-reductionist “theory of everything” unlike what is being sought in physics. Inherently transdisciplinary, systems theory offers ideas and methods that are relevant to all of the sciences and also to professional fields such as systems engineering, public policy, business, and social work. To demonstrate the generality …
S-Net: A Multiple Cross Aggregation Convolutional Architecture For Automatic Segmentation Of Small/Thin Structures For Cardiovascular Applications, Nan Mu, Zonghan Lyu, Mostafa Rezaeitaleshmahalleh, Cassie Bonifas, Jordan Gosnell, Marcus Haw, Joseph Vettukattil, Jingfeng Jiang
S-Net: A Multiple Cross Aggregation Convolutional Architecture For Automatic Segmentation Of Small/Thin Structures For Cardiovascular Applications, Nan Mu, Zonghan Lyu, Mostafa Rezaeitaleshmahalleh, Cassie Bonifas, Jordan Gosnell, Marcus Haw, Joseph Vettukattil, Jingfeng Jiang
Michigan Tech Publications, Part 2
With the success of U-Net or its variants in automatic medical image segmentation, building a fully convolutional network (FCN) based on an encoder-decoder structure has become an effective end-to-end learning approach. However, the intrinsic property of FCNs is that as the encoder deepens, higher-level features are learned, and the receptive field size of the network increases, which results in unsatisfactory performance for detecting low-level small/thin structures such as atrial walls and small arteries. To address this issue, we propose to keep the different encoding layer features at their original sizes to constrain the receptive field from increasing as the network …
Cyberattacks And Security Of Cloud Computing: A Complete Guideline, Muhammad Dawood, Shanshan Tu, Chuangbai Xiao, Hisham Alasmary, Muhammad Waqas, Sadaqat Ur Rehman
Cyberattacks And Security Of Cloud Computing: A Complete Guideline, Muhammad Dawood, Shanshan Tu, Chuangbai Xiao, Hisham Alasmary, Muhammad Waqas, Sadaqat Ur Rehman
Research outputs 2022 to 2026
Cloud computing is an innovative technique that offers shared resources for stock cache and server management. Cloud computing saves time and monitoring costs for any organization and turns technological solutions for large-scale systems into server-to-service frameworks. However, just like any other technology, cloud computing opens up many forms of security threats and problems. In this work, we focus on discussing different cloud models and cloud services, respectively. Next, we discuss the security trends in the cloud models. Taking these security trends into account, we move to security problems, including data breaches, data confidentiality, data access controllability, authentication, inadequate diligence, phishing, …
Robust Maximum Capture Facility Location Under Random Utility Maximization Models, Tien Thanh Dam, Thuy Anh Ta, Tien Mai
Robust Maximum Capture Facility Location Under Random Utility Maximization Models, Tien Thanh Dam, Thuy Anh Ta, Tien Mai
Research Collection School Of Computing and Information Systems
We study a robust version of the maximum capture facility location problem in a competitive market, assuming that each customer chooses among all available facilities according to a random utility maximization (RUM) model. We employ the generalized extreme value (GEV) family of models and assume that the parameters of the RUM model are not given exactly but lie in convex uncertainty sets. The problem is to locate new facilities to maximize the worst-case captured user demand. We show that, interestingly, our robust model preserves the monotonicity and submodularity from its deterministic counterpart, implying that a simple greedy heuristic can guarantee …
Joint Location And Cost Planning In Maximum Capture Facility Location Under Random Utilities, Ngan H. Duong, Tien Thanh Dam, Thuy Anh Ta, Tien Mai
Joint Location And Cost Planning In Maximum Capture Facility Location Under Random Utilities, Ngan H. Duong, Tien Thanh Dam, Thuy Anh Ta, Tien Mai
Research Collection School Of Computing and Information Systems
We study a joint facility location and cost planning problem in a competitive market under random utility maximization (RUM) models. The objective is to locate new facilities and make decisions on the costs (or budgets) to spend on the new facilities, aiming to maximize an expected captured customer demand, assuming that customers choose a facility among all available facilities according to a RUM model. We examine two RUM frameworks in the discrete choice literature, namely, the additive and multiplicative RUM. While the former has been widely used in facility location problems, we are the first to explore the latter in …
Motif-Cluster: A Spatial Clustering Package For Repetitive Motif Binding Patterns, Mengyuan Zhou
Motif-Cluster: A Spatial Clustering Package For Repetitive Motif Binding Patterns, Mengyuan Zhou
Department of Computer Science and Engineering: Dissertations, Theses, and Student Research
Previous efforts in using genome-wide analysis of transcription factor binding sites (TFBSs) have overlooked the importance of ranking potential significant regulatory regions, especially those with repetitive binding within a local region. Identifying these homogenous binding sites is critical because they have the potential to amplify the binding affinity and regulation activity of transcription factors, impacting gene expression and cellular functions. To address this issue, we developed an open-source tool Motif-Cluster that prioritizes and visualizes transcription factor regulatory regions by incorporating the idea of local motif clusters. Motif-Cluster can rank the significant transcription factor regulatory regions without the need for experimental …
Examining The Externalities Of Highway Capacity Expansions In California: An Analysis Of Land Use And Land Cover (Lulc) Using Remote Sensing Technology, Serena E. Alexander, Bo Yang, Owen Hussey, Derek Hicks
Examining The Externalities Of Highway Capacity Expansions In California: An Analysis Of Land Use And Land Cover (Lulc) Using Remote Sensing Technology, Serena E. Alexander, Bo Yang, Owen Hussey, Derek Hicks
Mineta Transportation Institute Publications
There are over 590,000 bridges dispersed across the roadway network that stretches across the United States alone. Each bridge with a length of 20 feet or greater must be inspected at least once every 24 months, according to the Federal Highway Act (FHWA) of 1968. This research developed an artificial intelligence (AI)-based framework for bridge and road inspection using drones with multiple sensors collecting capabilities. It is not sufficient to conduct inspections of bridges and roads using cameras alone, so the research team utilized an infrared (IR) camera along with a high-resolution optical camera. In many instances, the IR camera …
Data Provenance Via Differential Auditing, Xin Mu, Ming Pang, Feida Zhu
Data Provenance Via Differential Auditing, Xin Mu, Ming Pang, Feida Zhu
Research Collection School Of Computing and Information Systems
With the rising awareness of data assets, data governance, which is to understand where data comes from, how it is collected, and how it is used, has been assuming evergrowing importance. One critical component of data governance gaining increasing attention is auditing machine learning models to determine if specific data has been used for training. Existing auditing techniques, like shadow auditing methods, have shown feasibility under specific conditions such as having access to label information and knowledge of training protocols. However, these conditions are often not met in most real-world applications. In this paper, we introduce a practical framework for …
Executive Order On The Safe, Secure, And Trustworthy Development And Use Of Artificial Intelligence, Joseph R. Biden
Executive Order On The Safe, Secure, And Trustworthy Development And Use Of Artificial Intelligence, Joseph R. Biden
Copyright, Fair Use, Scholarly Communication, etc.
Section 1. Purpose. Artificial intelligence (AI) holds extraordinary potential for both promise and peril. Responsible AI use has the potential to help solve urgent challenges while making our world more prosperous, productive, innovative, and secure. At the same time, irresponsible use could exacerbate societal harms such as fraud, discrimination, bias, and disinformation; displace and disempower workers; stifle competition; and pose risks to national security. Harnessing AI for good and realizing its myriad benefits requires mitigating its substantial risks. This endeavor demands a society-wide effort that includes government, the private sector, academia, and civil society.
My Administration places the highest urgency …
Demo-Abstract: A Dtn System For Tracking Miners Using Gae-Lstm And Contact Graph Routing In An Underground Mine, Abhay Goyal, Sanjay Kumar Madria, Samuel Frimpong
Demo-Abstract: A Dtn System For Tracking Miners Using Gae-Lstm And Contact Graph Routing In An Underground Mine, Abhay Goyal, Sanjay Kumar Madria, Samuel Frimpong
Computer Science Faculty Research & Creative Works
Localization and prediction of movement of miners in underground mines have been a constant problem more so during a mine disaster. Due to the unavailability of GPS signals, the pillars are used as a method to locate these miners, and thus, location prediction is also carried out with reference to these pillars. In this work, we demon- strate a Delay-tolerant Network (DTN) system called Miner-Finder that leverages Machine Learning (ML) framework (GAE-LSTM) that works on edge devices (e.g., mobile phones, tablets) to predict the location of miners in an underground mine. The information such as speed, angle, time, nearest pillar …
A Dynamic Online Dashboard For Tracking The Performance Of Division 1 Basketball Athletic Performance, Erica Juliano, Chelsea Thakkar, Christopher B. Taber, Mehul S. Raval, Kaya Tolga, Samah Senbel
A Dynamic Online Dashboard For Tracking The Performance Of Division 1 Basketball Athletic Performance, Erica Juliano, Chelsea Thakkar, Christopher B. Taber, Mehul S. Raval, Kaya Tolga, Samah Senbel
School of Computer Science & Engineering Undergraduate Publications
Using Data Analytics is a vital part of sport performance enhancement. We collect data from the Division 1 'Women's basketball athletes and coaches at our university, for use in analysis and prediction. Several data sources are used daily and weekly: WHOOP straps, weekly surveys, polar straps, jump analysis, and training session information. In this paper, we present an online dashboard to visually present the data to the athletes and coaches. R shiny was used to develop the platform, with the data stored on the cloud for instant updates of the dashboard as the data becomes available. The performance of athletes …
Statistical And Machine Learning Approaches To Describe Factors Affecting Preweaning Mortality Of Piglets, Md Towfiqur Rahman, Tami M. Brown-Brandl, Gary A. Rohrer, Sudhendu R. Sharma, Vamsi Manthena, Yeyin Shi
Statistical And Machine Learning Approaches To Describe Factors Affecting Preweaning Mortality Of Piglets, Md Towfiqur Rahman, Tami M. Brown-Brandl, Gary A. Rohrer, Sudhendu R. Sharma, Vamsi Manthena, Yeyin Shi
Biological Systems Engineering: Papers and Publications
High preweaning mortality (PWM) rates for piglets are a significant concern for the worldwide pork industries, causing economic loss and well-being issues. This study focused on identifying the factors affecting PWM, overlays, and predicting PWM using historical production data with statistical and machine learning models. Data were collected from 1,982 litters from the United States Meat Animal Research Center, Nebraska, over the years 2016 to 2021. Sows were housed in a farrowing building with three rooms, each with 20 farrowing crates, and taken care of by well-trained animal caretakers. A generalized linear model was used to analyze the various sow, …
Evolution Of Glassy Carbon Derived From Pyrolysis Of Furan Resin, Josh Kemppainen, Ivan Gallegos, Aaron Krieg, Jacob R. Gissinger, Kristopher E. Wise, Margaret Kowalik, Julia A. King, S. Gowtham, Adri Van Duin, Gregory Odegard
Evolution Of Glassy Carbon Derived From Pyrolysis Of Furan Resin, Josh Kemppainen, Ivan Gallegos, Aaron Krieg, Jacob R. Gissinger, Kristopher E. Wise, Margaret Kowalik, Julia A. King, S. Gowtham, Adri Van Duin, Gregory Odegard
Michigan Tech Publications, Part 2
Glassy carbon (GC) material derived from pyrolyzed furan resin was modeled by using reactive molecular dynamics (MD) simulations. The MD polymerization simulation protocols to cure the furan resin precursor material are validated via comparison of the predicted density and Young's modulus with experimental values. The MD pyrolysis simulations protocols to pyrolyze the furan resin precursor is validated by comparison of calculated density, Young's modulus, carbon content, sp carbon content, the in-plane crystallite size, out-of-plane crystallite stacking height, and interplanar crystallite spacing with experimental results from the literature for furan resin derived GC. The modeling methodology established in this work can …
Machine Learning Prediction Of Hea Properties, Nicholas J. Beaver, Nathaniel Melisso, Travis Murphy
Machine Learning Prediction Of Hea Properties, Nicholas J. Beaver, Nathaniel Melisso, Travis Murphy
College of Engineering Summer Undergraduate Research Program
High-entropy alloys (HEA) are a very new development in the field of metallurgical materials. They are made up of multiple principle atoms unlike traditional alloys, which contributes to their high configurational entropy. The microstructure and properties of HEAs are are not well predicted with the models developed for more common engineering alloys, and there is not enough data available on HEAs to fully represent the complex behavior of these alloys. To that end, we explore how the use of machine learning models can be used to model the complex, high dimensional behavior in the HEA composition space. Based on our …
Development Of User Interface And Testing Harness, Jacob Amezquita, William Albertini
Development Of User Interface And Testing Harness, Jacob Amezquita, William Albertini
College of Engineering Summer Undergraduate Research Program
No abstract provided.
Objectfusion: Multi-Modal 3d Object Detection With Object-Centric Fusion, Q. Cai, Y. Pan, T. Yao, Chong-Wah Ngo, T. Mei
Objectfusion: Multi-Modal 3d Object Detection With Object-Centric Fusion, Q. Cai, Y. Pan, T. Yao, Chong-Wah Ngo, T. Mei
Research Collection School Of Computing and Information Systems
Recent progress on multi-modal 3D object detection has featured BEV (Bird-Eye-View) based fusion, which effectively unifies both LiDAR point clouds and camera images in a shared BEV space. Nevertheless, it is not trivial to perform camera-to-BEV transformation due to the inherently ambiguous depth estimation of each pixel, resulting in spatial misalignment between these two multi-modal features. Moreover, such transformation also inevitably leads to projection distortion of camera image features in BEV space. In this paper, we propose a novel Object-centric Fusion (ObjectFusion) paradigm, which completely gets rid of camera-to-BEV transformation during fusion to align object-centric features across different modalities for …
Owner-Free Distributed Symmetric Searchable Encryption Supporting Conjunctive Queries, Qiuyun Tong, Xinghua Li, Yinbin Miao, Yunwei Wang, Ximeng Liu, Robert H. Deng
Owner-Free Distributed Symmetric Searchable Encryption Supporting Conjunctive Queries, Qiuyun Tong, Xinghua Li, Yinbin Miao, Yunwei Wang, Ximeng Liu, Robert H. Deng
Research Collection School Of Computing and Information Systems
Symmetric Searchable Encryption (SSE), as an ideal primitive, can ensure data privacy while supporting retrieval over encrypted data. However, existing multi-user SSE schemes require the data owner to share the secret key with all query users or always be online to generate search tokens. While there are some solutions to this problem, they have at least one weakness, such as non-supporting conjunctive query, result decryption assistance of the data owner, and unauthorized access. To solve the above issues, we propose an Owner-free Distributed Symmetric searchable encryption supporting Conjunctive query (ODiSC). Specifically, we first evaluate the Learning-Parity-with-Noise weak Pseudorandom Function (LPN-wPRF) …
Establishing Physical And Chemical Mechanisms Of Polymerization And Pyrolysis Of Phenolic Resins For Carbon-Carbon Composites, Ivan Gallegos, Josh Kemppainen, Jacob R. Gissinger, Malgorzata Kowalik, Adri Van Duin, Kristopher E. Wise, S. Gowtham, Gregory Odegard
Establishing Physical And Chemical Mechanisms Of Polymerization And Pyrolysis Of Phenolic Resins For Carbon-Carbon Composites, Ivan Gallegos, Josh Kemppainen, Jacob R. Gissinger, Malgorzata Kowalik, Adri Van Duin, Kristopher E. Wise, S. Gowtham, Gregory Odegard
Michigan Tech Publications, Part 2
The complex structural and chemical changes that occur during polymerization and pyrolysis critically affect material properties but are difficult to characterize in situ. This work presents a novel, experimentally validated methodology for modeling the complete polymerization and pyrolysis processes for phenolic resin using reactive molecular dynamics. The polymerization simulations produced polymerized structures with mass densities of 1.24 ± 0.01 g/cm3 and Young's moduli of 3.50 ± 0.64 GPa, which are in good agreement with experimental values. The structural properties of the subsequently pyrolyzed structures were also found to be in good agreement with experimental X-ray data for the phenolic-derived carbon …
When Routing Meets Recommendation: Solving Dynamic Order Recommendations Problem In Peer-To-Peer Logistics Platforms, Zhiqin Zhang, Waldy Joe, Yuyang Er, Hoong Chuin Lau
When Routing Meets Recommendation: Solving Dynamic Order Recommendations Problem In Peer-To-Peer Logistics Platforms, Zhiqin Zhang, Waldy Joe, Yuyang Er, Hoong Chuin Lau
Research Collection School Of Computing and Information Systems
Peer-to-Peer (P2P) logistics platforms, unlike traditional last-mile logistics providers, do not have dedicated delivery resources (both vehicles and drivers). Thus, the efficiency of such operating model lies in the successful matching of demand and supply, i.e., how to match the delivery tasks with suitable drivers that will result in successful assignment and completion of the tasks. We consider a Same-Day Delivery Problem (SDDP) involving a P2P logistics platform where new orders arrive dynamically and the platform operator needs to generate a list of recommended orders to the crowdsourced drivers. We formulate this problem as a Dynamic Order Recommendations Problem (DORP). …