default search action
EIT 2022: Mankato, MN, USA
- 2022 IEEE International Conference on Electro Information Technology, EIT 2022, Mankato, MN, USA, May 19-21, 2022. IEEE 2022, ISBN 978-1-6654-8009-3
- Vincent J. Winstead, Amina Jemi:
Receding Horizon Control for Wireless Charging Networks. 1-7 - Alvaro Belloso Esteban, Mario Silvestre Delgado, Xinrui Yu, Won-Jae Yi, Jafar Saniie:
Design Flow and Implementation of an AI-Enabled Smart Guidance System for Art Galleries. 1-4 - Nafiz Rifat, Mostofa Ahsan, Md Minhaz Chowdhury, Rahul Gomes:
BERT Against Social Engineering Attack: Phishing Text Detection. 1-6 - Ioannis Antzoulis, Md Minhaz Chowdhury, Shadman Latif:
IoT Security for Smart Home: Issues and Solutions. 1-7 - Quinn Au, Amedeo Carmine, Tauheed Khan Mohd:
Building an Interconnected Environment And Dependency on Internet of Things. 1-4 - Quazi Irfan, Marco Ciarcià, Gary Hatfield:
Inertia Measurement Unit-Based Displacement Estimation via Velocity Drift Compensation Using Ordinary Least Squares Method. 1-7 - Devin McDonald, Joseph Mesnard, Yufeng Lu, Jing Wang:
Speech Intelligibility Enhancement using Microphone Array via Intra-Vehicular Beamforming. 1-5 - Joshua Price, Yuchen Li, Khair Al Shamaileh, Quamar Niyaz, Naima Kaabouch, Vijay K. Devabhaktuni:
Real-time Classification of Jamming Attacks against UAVs via on-board Software-defined Radio and Machine Learning-based Receiver Module. 1-5 - Victoria S. Marks, Tom J. Richner, Nicholas M. Gregg, Vladimir Sladky, Jaromir Dolezal, Václav Kremen, Gregory A. Worrell, Michal T. Kucewicz:
Deep Brain Stimulation of Anterior Nuclei of the Thalamus and Hippocampal Seizure Rate Modulate Verbal Memory Performance. 1-4 - Niroop Sugunaraj, Prakash Ranganathan:
Electronic Control Unit (ECU) Identification for Controller Area Networks (CAN) using Machine Learning. 1-7 - Mingzuoyang Chen, Shadi Banitaan, Mina Maleki, Yichun Li:
Pedestrian Group Detection with K-Means and DBSCAN Clustering Methods. 1-6 - Timothy Radtke, Cristinel Ababei:
Performance Evaluation of the Weighted Least Connection Scheduling for Datacenters with BigHouse Simulator. 1-4 - Kristian Mrazek, Brian Holton, Charles Cathcart, Jacob Speirer, John Do, Tauheed Khan Mohd:
Risks in Blockchain - A Survey about Recent Attacks with Mitigation Methods and Solutions for Overall. 5-10 - Soma Ahmadi, Azad Mahmoudi, Dinesh Maddipatla, E. Khorami, Massood Z. Atashbar:
A FDCCII Based High CMRR CMIA Design, Compatible with Both Voltage and Current Input Signals. 15-18 - Md Motaher Hossain, Sri R. Kolla:
Fault Detection and Classification in Microgrid Using Long Short-Term Memory. 19-26 - Maher Kaddoura, Nathan Bahr, Erin Gambucci:
SH-P2P: Self-Healing Peer-to-Peer Network with Optimal Multicast Routing. 27-31 - Tauheed Khan Mohd, Subhrajit Majumdar, Akshay Mathur, Ahmad Y. Javaid:
Cybersecurity Based Simulation of Connected Automated Vehicles for Instructional Use. 32-36 - Ravalika Gundu, Mina Maleki:
Securing CAN Bus in Connected and Autonomous Vehicles Using Supervised Machine Learning Approaches. 42-46 - Jakob Harig, Ryan Russell, Jing Wang, Yufeng Lu:
Near-Optimal Synchronization of Multiple Robot Carts Using Online Reinforcement Learning. 47-52 - Christopher N. Broadhurst, Osama Abuomar, Piotr Szczurek:
Data Analytics On Nasdaq Stock Prices: Reddit Social Media Case Study. 53-60 - Dietmar P. F. Möller, Hamid Vakilzadian, Roland E. Haas:
From Industry 4.0 towards Industry 5.0. 61-68 - Adeel Sultan, Cesar D. Campos-Martinez, Warren S. Vaz:
Remote-Controlled Electric Basic Utility Vehicle. 75-79 - Xiaofan Liu, Yuanyang Cai, Yanan Song, Lizhe Tan:
Bearing Fault Diagnosis Based on Multi-scale Neural Networks. 80-85 - Saad Jarid, Manohar Das:
An Optimal Fast Charging Scheme for Li-ion Batteries Using a Continuous Exponentially Decaying Current Profile. 86-90 - Julia Huette, Mahmood Al-Khassaweneh, James Oakley:
Using Machine Learning Techniques for Clickbait Classification. 91-95 - Rasoul Akbari, Afshin Izadian:
Electrical Equivalent Circuit of Split-Shaft Wind Energy Conversion Systems. 103-108 - Yu Lin:
Wafer Pattern Counting, Detection and Classification Based on Encoder-Decoder CNN Structure. 109-113 - Atif Tirmizi, Osama Abuomar:
A Secure API-Driven Framework for AES Modes of Encryption Enhanced with Machine Learning. 118-124 - Rasoul Akbari, Afshin Izadian:
Split-Shaft Wind Energy Conversion Systems Scalability and Components Selection. 125-130 - Muhammad Maaz Ali Khan, Enow Nkongho Ehabe, Akalanka B. Mailewa:
Discovering the Need for Information Assurance to Assure the End Users: Methodologies and Best Practices. 131-138 - Venkat Kodali, Daniel Berleant:
Recent, Rapid Advancement in Visual Question Answering: a Review. 139-146 - Sandun S. Kuruppu:
Machine Parameter Error Influence on PMSM Position Sensor Offset Error Quantification. 147-152 - David Arnold, John Ford, Jafar Saniie:
Machine Learning Models for Cyberattack Detection in Industrial Control Systems. 166-170 - Shruti Chavan, Xinrui Yu, Jafar Saniie:
High Precision Analog Gauge Reader Using Optical Flow and Computer Vision. 171-175 - Kaitlyn Graves, Madiha Kanwal, Xinrui Yu, Jafar Saniie:
Design Flow of mmWave Radar and Machine Vision Fusion for Pedestrian Collision Warning. 176-181 - David Arnold, Charlotte David, Jafar Saniie:
PowerShell Malware Analysis Using a Novel Malware Rating System. 182-187 - Muhammad Nadeem Rafiq, Dipankar Mitra, Adnan Iftikhar, Abdul M. Kirmani, Benjamin D. Braaten:
On the Shielding Properties of Woven Microfiber Materials for Potential EMC Applications of IoT Devices. 188-192 - Piotr Palka, Rafael A. Perez, Tianyang Fang, Jafar Saniie:
Design Flow of Blowfish Symmetric-Key Block Cipher on FPGA. 193-197 - Ritika Nigam, Arpan Kundu, Xinrui Yu, Jafar Saniie:
Machine Vision Surveillance System - Artificial Intelligence For Covid-19 Norms. 198-202 - Patricia Sanchez Miralles, Laura Fernandez Gonzalez, Xinrui Yu, Jafar Saniie:
Assisting Visually Impaired People using Autonomous Navigation System and Computer Vision for Grocery Shopping. 203-208 - Ravishankar Natarajan, Xinrui Yu, Jafar Saniie:
Machine Learning Safety System for Treadmill Users. 209-214 - Farag Mohamed E. Lagnf, Subramaniam Ganesan:
The Improved Implementation of the Message freshness on CAN XL using FPGA. 215-220 - Mohammad Z. El Yabroudi, Khalfalla Awedat, Rakan C. Chabaan, Osama Abudayyeh, Ikhlas Abdel-Qader:
Adaptive DBSCAN LiDAR Point Cloud Clustering For Autonomous Driving Applications. 221-224 - Namrata Chaudhari, Reshu Agarwal, Meghna Narwade, Xinrui Yu, Jafar Saniie:
Artificial Intelligence System for Emotion Recognition and Text Analytics. 225-230 - Tala Talaei Khoei, Wen Chen Hu, Naima Kaabouch:
Residual Convolutional Network for Detecting Attacks on Intrusion Detection Systems in Smart Grid. 231-237 - Sanjaikanth E. Vadakkethil Somanathan Pillai, Abdelrahman Ahmed ElSaid, Wen-Chen Hu:
A Self-Reconfigurable System for Mobile Health Text Misinformation Detection. 242-247 - Dean Cannon, Tianyang Fang, Jafar Saniie:
Modular Delay Audio Effect System on FPGA. 248-251 - Adrian Leyte Fraga, Xinrui Yu, Won-Jae Yi, Jafar Saniie:
Indoor Navigation System for Visually Impaired People using Computer Vision. 257-260 - Zhengkui Zhao, Chaofan Zhao, Jun Yang, Kaiwen Hou, Haijun Liu:
Engineering Frequency Regulation Strategy for PV Inverters in Large-scale Renewable Energy Integrated Power System. 261-267 - Ramkrishna Mishan, Arturo De La Cruz, Jianwu Zeng, Taesic Kim:
A Virtual Impedance Based Control for Power Sharing in a Microgrid with Uncertainty in Line Impedance. 268-272 - Tianshu Ruan, V. Amrusha Aryasomyajula, Nasser Houshangi:
Performance of monocular and stereo camera in indoor environment for Visual SLAM using ORB method. 273-278 - Tala Talaei Khoei, Aydan Gasimova, Mohammad Aymane Ahajjam, Khair Al Shamaileh, Vijay K. Devabhaktuni, Naima Kaabouch:
A Comparative Analysis of Supervised and Unsupervised Models for Detecting GPS Spoofing Attack on UAVs. 279-284 - Hans Johnson, Jafar Saniie:
Distributed Gesture Controlled Systems for Human-Machine Interface. 285-289 - Mikhail Gromov, David Arnold, Jafar Saniie:
Tackling Multiple Security Threats in an IoT Environment. 290-295 - He Zhou, Jigang Liu:
An Enhanced RSSI-based Framework for Localization of Bluetooth Devices. 296-304 - Simrat Kaur, Rajesh Kumar Krishnan, Xinrui Yu, Jafar Saniie:
Auditory Brainwave Entrainment System using Time-Series Analysis of EEG Signal. 305-310 - I Hua Tsai, Bashir I. Morshed:
Beat-by-beat Classification of ECG Signals with Machine Learning Algorithm for Cardiac Episodes. 311-314 - Tala Talaei Khoei, Mohammad Aymane Ahajjam, Wen Chen Hu, Naima Kaabouch:
A Deep Learning Multi-Task Approach for the Detection of Alzheimer's Disease in a Longitudinal Study. 315-319 - Arthur Findelair, Xinrui Yu, Jafar Saniie:
Design Flow and Implementation of a Vision-Based Gesture-Controlled Drone. 320-324 - Alejandro Perez-Vicente, David Hernandez, Tianyang Fang, Jafar Saniie:
Point Cloud Generation with Stereo and Monocular Depth Estimation on FPGA. 325-329 - Xin Zhang, Jafar Saniie, Sasan Bakhtiari, Alexander Heifetz:
Unsupervised Learning for Detection of Defects in Pulsed Infrared Thermography of Metals. 330-334 - Temitope Bankefa, Ashoke Kumar Biswas, Prakash Ranganathan:
Hybrid Machine Learning Models for Accurate Onshore/Offshore Wind Farm Forecasts. 335-341 - Alex Billedeaux, Byron DeVries:
Using Metamorphic Relationships and Genetic Algorithms to Test Open-Source Software. 342-345 - Jhoseph Ruiz Fachin, Christian Trefftz, Xiang Cao, Byron DeVries:
Optimizing Trade-offs Between Distance and Coverage for Facility Location. 346-351 - Mariana Hentea:
A Perspective on Research Initiatives in Cybersecurity Engineering for Future SmartGrids. 352-357 - Nabonita Mitra, Bashir I. Morshed:
Automatic Detection of Situational Context Using AI from Minimal Sensor Modality. 358-362 - Yuantian Xue, Fan Jiang, Yunlian Liu, Jinian Yuan, Wu Dou, Chun Wei:
Optimal Capacity Allocation of Integrated Energy Systems Considering Renewable Energy Accommodation. 363-367 - Balakrishnan Dharmalingam, Anyi Liu, Subra Ganesan, Sankardas Roy:
FineObfuscator: Defeating Reverse Engineering Attacks with Context-sensitive and Cost-efficient Obfuscation for Android Apps. 368-374 - Abel A. Reyes Angulo, Xiaoli Yang, Quamar Niyaz, Paheding Sidike, Ahmad Y. Javaid:
A Secure Software Engineering Design Framework for Educational Purpose. 375-381 - Jackson Lauder, Sayeed Z. Sajal:
Jaxium: A Trusted Social Network with Maximum Privacy. 389-392 - Reid Kutter, Sayeed Z. Sajal:
Low-cost Subscription-less Home Security System. 393-400 - Madison Davis, Bashir I. Morshed:
Classification of COVID-19 Disease Severity using CT Scans via Deep Convolutional Neural Networks. 401-404 - Hadjar Ould Slimane, Selma Benouadah, Khair Al Shamaileh, Vijay K. Devabhaktuni, Naima Kaabouch:
ADS-B Message Injection Attack on UAVs: Assessment of SVM-based Detection Techniques. 405-410 - Rajrup Mitra, Jack Hackel, Amrita Das, Sattar Dorafshan, Naima Kaabouch:
A UAV Payload for Real-time Inspection of Highway Ancillary Structures. 411-416 - Nafiz Rifat, Mostofa Ahsan, Rahul Gomes, Md Minhaz Chowdhury:
COVID-19 Sentiment Analysis applying BERT. 417-422 - Tianyang Fang, Jafar Saniie, Sasan Bakhtiari, Alexander Heifetz:
Frequency Shift Baseline Removal for Improved Flow Measurement using Microwave Cavity Resonator. 436-439 - Yichun Li, Mina Maleki, Shadi Banitaan, Mingzuoyang Chen:
State of Health Indicator Modeling of Lithium-ion Batteries Using Machine Learning Techniques. 440-445 - Jaya Preethi Mohan, Niroop Sugunaraj, Prakash Ranganathan:
Cyber Security Threats for 5G Networks. 446-454 - Mohsen Mohaidat, Janos L. Grantner, Saad A. Shebrain, Ikhlas Abdel-Qader:
Instrument Detection for the Intracorporeal Suturing Task in the Laparoscopic Box Trainer Using Single-stage object detectors. 455-460 - Mostofa Ahsan, Nafiz Rifat, Md Minhaz Chowdhury, Rahul Gomes:
Detecting Cyber Attacks: A Reinforcement Learning Based Intrusion Detection System. 461-466 - Mostofa Ahsan, Nafiz Rifat, Md Minhaz Chowdhury, Rahul Gomes:
Intrusion Detection for IoT Network Security with Deep Neural Network. 467-472 - Nemese Kalubi, Sayeed Z. Sajal:
Cloud Computing: Arduino Cloud IoT Integration with REST API. 473-476 - Charles-Alexandre Diop, Baptiste Pelloux, Xinrui Yu, Won-Jae Yi, Jafar Saniie:
Soccer Player Recognition using Artificial Intelligence and Computer Vision. 477-481 - Melanie Acelor Ndambani, Tianyang Fang, Jafar Saniie:
Autonomous Robotic Arm for Object Sorting and Motion Compensation using Kalman Filter. 488-491 - Christian D. Hines, Md Minhaz Chowdhury:
Uncover Security Weakness Before the Attacker Through Penetration Testing. 492-497 - Warren Detres, Md Minhaz Chowdhury, Nafiz Rifat:
IoT Security and Privacy. 498-503 - André Klahold, Madjid Fathi, Johannes Zenkert:
Society 5.0 illustrated by the example of Computer Aided Journalism. 504-506 - Quinn R. McCluskey, Md Minhaz Chowdhury, Shadman Latif, Krishna Kambhampaty:
Computer Forensics: Complementing Cyber Security. 507-512 - Robert Vanness, Md Minhaz Chowdhury, Nafiz Rifat:
Malware: A Software for Cybercrime. 513-518 - Julian Ortiz, Md Minhaz Chowdhury:
Computational Trust for Securing IoT. 519-526 - Devin Sweigert, Md Minhaz Chowdhury, Nafiz Rifat:
Exploit Security Vulnerabilities by Penetration Testing. 527-532 - Aaron Fleury-Charles, Md Minhaz Chowdhury, Nafiz Rifat:
Data Breaches: Vulnerable Privacy. 538-543 - Timothy Kowalski, Md Minhaz Chowdhury, Shadman Latif, Krishna Kambhampaty:
Bitcoin: Cryptographic Algorithms, Security Vulnerabilities and Mitigations. 544-549 - Christian Weber, Hasan Abu-Rasheed, Madjid Fathi:
Adding Context to Industry 4.0 Analytics: A New Document Driven Knowledge Graph Construction and Contextualization Approach. 550-555 - Dietmar P. F. Möller, Hamid Vakilzadian, Roland E. Haas:
Cybersecurity Certificate in Digital Transformation. 556-561 - Donald K. Davis, Md Minhaz Chowdhury, Nafiz Rifat:
Password Security: What Are We Doing Wrong? 562-567 - Kyle Guers, Md Minhaz Chowdhury, Nafiz Rifat:
Card Skimming: A Cybercrime by Hackers. 575-579 - Md Minhaz Chowdhury, Joshua M. Del Toro, Krishna Kambhampaty:
Active Cyber Defense by Benevolent Worms. 580-585 - Matthew V. Krishnan Myjak, Prakash Ranganathan:
Unmanned Aerial System (UAS) Swarm Design, Flight Patterns, Communication Type, Applications, and Recommendations. 586-594 - Strider Houx, Nathan Keep, Matthew Ryan, Ahmet Turkmen:
Capstone Design: Remote Controlled Drone using Thrust Vectoring. 595-599 - Max Walker, Jacob Paul, Ahmet Turkmen, Jeff Leismer:
Capstone Project Experience: AI-Driven Virtual Therapist for Administering VibeTech Treatments Using Artificial Reality. 600-605 - Pankaj Jairu, Akalanka B. Mailewa:
Network Anomaly Uncovering on CICIDS-2017 Dataset: A Supervised Artificial Intelligence Approach. 606-615 - Niroop Sugunaraj, Akshay Ram Ramchandra, Prakash Ranganathan:
Cyber Fraud Economics, Scam Types, and Potential Measures to Protect U.S. Seniors: A Short Review. 623-627 - Sarosh H. Patel, Navarun Gupta, Lawrence V. Hmurcik, Bhushan Dharmadhikari:
Analyzing the Effects of Mismatch Currents in Interferential Current Therapy. 628-631
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.