Browsing SoC Research Publications by Title
Now showing items 1-20 of 49
-
Adaptive scaffolding toward transdisciplinary collaboration: Reflective polyvocal self-study
(Springer International Publishing, 2022-12-16)Contemporary global challenges require experts from various disciplines to work together. Since every field of knowledge has its unique language and discipline-based culture, collaborative inquiry presents an additional ... -
Allan deviation of social learning distributed network time synchronization
(IEEE, 2022-12-02)The objective of this paper is to demonstrate that the concept of a recently published social learning distributed network time synchronization (SLDNTS) algorithm under a Global Positioning System (GPS) denial environment ... -
An examination of bias of facial analysis based BMI prediction models
(IEEE, 2022-06-19)Obesity is one of the most important public health problems that the world is facing today. A recent trend is in the development of intervention tools that predict BMI using facial images for weight monitoring and management ... -
An LDOP approach for face identification under unconstrained scenarios
(Taylor & Francis, 2023-03-01)In unconstrained environments, it encounters a number of challenges when considering handcrafted features for face recognition, including changes in pose, illumination and facial expression and plastic surgery variations, ... -
Approaches to investigating disaster risk reduction (DRR)
(Wichita State University, 2022-04-29)Wide-ranging and uncertain threats from natural disasters to public health, energy networks, cybersecurity, and other interconnected facets of human activity make explicit the need for the development of resilience-driven ... -
Artificial intelligence (AI) for hybrid information-centric networking (HICN): Part I
(John Wiley & Sons, Ltd, 2022-09-01)[No abstract available] -
Automated testing to detect status data loss in Android applications
(IEEE, 2022-06-30)When user installs an Android app, it is expected that the data should be persistent at all states, which requires saving the instance data for all the activities. An app can be paused or sent to the background due to other ... -
An automatic calibration technique for force sensors in a dynamic smart floor environment
(IEEE, 2021-10-17)Pressure-sensitive smart floors deployed within homes can give great insight to the health and activity level of individuals through gait and location information. Due to the ever-changing dynamic nature of household ... -
Benchmarking neural network compression techniques for ocular-based user authentication on smartphones
(Institute of Electrical and Electronics Engineers Inc., 2023-04-06)With the unprecedented mobile technology revolution, mobile devices have transcended from being the primary means of communication to an all-in-one platform. Consequently, an increasing number of individuals are accessing ... -
Beyond just safety: Delay-aware security monitoring for real-time control systems
(Association for Computing Machinery, 2022-07-01)Modern embedded real-time systems (RTS) are increasingly facing more security threats than the past. A simplistic straightforward integration of security mechanisms might not be able to guarantee the safety and predictability ... -
Commitment over multiple-access channels
(Institute of Electrical and Electronics Engineers Inc., 2022-09-04)The problem of multi-user commitment is one in which multiple users first commit to individual messages with a bookmaker and later reveal their messages. The objective of the bookmaker is then to decide whether the revealed ... -
Common reality: An interface of human-robot communication and mutual understanding
(Springer, Cham, 2021-11-02)An interface that can share effective and comprehensive mutual understanding is critical for human-robot interaction. This paper designs a novel human-robot interaction interface that enables humans and robots to interact ... -
Compact CNN models for on-device ocular-based user recognition in mobile devices
(IEEE, 2021-12-05)A number of studies have demonstrated the efficacy of deep learning convolutional neural network (CNN) models for ocular-based user recognition in mobile devices. However, these high-performing networks have enormous space ... -
Comprehension of spatial constraints by neural logic learning from a single RGB-D scan
(IEEE, 2021-09-27)Autonomous industrial assembly relies on the precise measurement of spatial constraints as designed by computer-aided design (CAD) software such as SolidWorks. This paper proposes a framework for an intelligent industrial ... -
Convolutional neural network optimization for phishing email classification
(IEEE, 2021-12-15)Phishing emails are one of the most common and effective tools that cybercriminals use to gain access to an organization’s network or personal information. To detect these attacks, email service providers use a variety of ... -
Coverage characteristics of hurricane monitoring CubeSat constellations under orbital perturbations
(AIAA, 2022-01-03)Miniaturized precipitation radars deployed on CubeSats have the potential to significantly improve hurricane forecasting by collecting measurements over data-starved regions and by complementing the existing sensor ... -
Deep Learning–Based Advances
(Humana Press Inc., 2022-06-14)Posttranslational modification (PTM ) is a ubiquitous phenomenon in both eukaryotes and prokaryotes which gives rise to enormous proteomic diversity. PTM mostly comes in two flavors: covalent modification to polypeptide ... -
DeepNGlypred: A deep neural network-based approach for human N-linked glycosylation site prediction
(MDPI, 2021-12-02)Protein N-linked glycosylation is a post-translational modification that plays an importantrole in a myriad of biological processes. Computational prediction approaches serve as comple-mentary methods for the characterization ... -
Design of short blocklength wiretap channel codes: Deep learning and cryptography working hand in hand
(IEEE, 2021-10-17)We design short blocklength codes for the Gaussian wiretap channel under information-theoretic security guarantees. Our approach consists in decoupling the reliability and secrecy constraints in our code design. Specifically, ... -
Efficient near-optimal t-closeness with low information loss
(IEEE, 2021-09-22)The t-closeness technique is one of the most popular techniques for preserving individual privacy in data. It involves generalizing and suppressing some attributes of a given table, after partitioning the set of all records ...