


default search action
EIT 2022: Mankato, MN, USA
- 2022 IEEE International Conference on Electro Information Technology, EIT 2022, Mankato, MN, USA, May 19-21, 2022. IEEE 2022, ISBN 978-1-6654-8009-3

- Vincent J. Winstead, Amina Jemi:

Receding Horizon Control for Wireless Charging Networks. 1-7 - Alvaro Belloso Esteban, Mario Silvestre Delgado, Xinrui Yu, Won-Jae Yi, Jafar Saniie:

Design Flow and Implementation of an AI-Enabled Smart Guidance System for Art Galleries. 1-4 - Nafiz Rifat, Mostofa Ahsan, Md Minhaz Chowdhury, Rahul Gomes

:
BERT Against Social Engineering Attack: Phishing Text Detection. 1-6 - Ioannis Antzoulis, Md Minhaz Chowdhury, Shadman Latif:

IoT Security for Smart Home: Issues and Solutions. 1-7 - Quinn Au, Amedeo Carmine, Tauheed Khan Mohd:

Building an Interconnected Environment And Dependency on Internet of Things. 1-4 - Quazi Irfan, Marco Ciarcià, Gary Hatfield:

Inertia Measurement Unit-Based Displacement Estimation via Velocity Drift Compensation Using Ordinary Least Squares Method. 1-7 - Devin McDonald, Joseph Mesnard, Yufeng Lu, Jing Wang:

Speech Intelligibility Enhancement using Microphone Array via Intra-Vehicular Beamforming. 1-5 - Joshua Price, Yuchen Li

, Khair Al Shamaileh, Quamar Niyaz, Naima Kaabouch, Vijay K. Devabhaktuni:
Real-time Classification of Jamming Attacks against UAVs via on-board Software-defined Radio and Machine Learning-based Receiver Module. 1-5 - Victoria S. Marks, Tom J. Richner, Nicholas M. Gregg, Vladimir Sladky, Jaromir Dolezal, Václav Kremen, Gregory A. Worrell, Michal T. Kucewicz:

Deep Brain Stimulation of Anterior Nuclei of the Thalamus and Hippocampal Seizure Rate Modulate Verbal Memory Performance. 1-4 - Niroop Sugunaraj, Prakash Ranganathan:

Electronic Control Unit (ECU) Identification for Controller Area Networks (CAN) using Machine Learning. 1-7 - Mingzuoyang Chen, Shadi Banitaan, Mina Maleki, Yichun Li:

Pedestrian Group Detection with K-Means and DBSCAN Clustering Methods. 1-6 - Timothy Radtke, Cristinel Ababei:

Performance Evaluation of the Weighted Least Connection Scheduling for Datacenters with BigHouse Simulator. 1-4 - Kristian Mrazek, Brian Holton, Charles Cathcart, Jacob Speirer, John Do, Tauheed Khan Mohd:

Risks in Blockchain - A Survey about Recent Attacks with Mitigation Methods and Solutions for Overall. 5-10 - Soma Ahmadi, Azad Mahmoudi, Dinesh Maddipatla

, E. Khorami, Massood Z. Atashbar
:
A FDCCII Based High CMRR CMIA Design, Compatible with Both Voltage and Current Input Signals. 15-18 - Md Motaher Hossain, Sri R. Kolla:

Fault Detection and Classification in Microgrid Using Long Short-Term Memory. 19-26 - Maher Kaddoura, Nathan Bahr, Erin Gambucci:

SH-P2P: Self-Healing Peer-to-Peer Network with Optimal Multicast Routing. 27-31 - Tauheed Khan Mohd, Subhrajit Majumdar, Akshay Mathur, Ahmad Y. Javaid:

Cybersecurity Based Simulation of Connected Automated Vehicles for Instructional Use. 32-36 - Ravalika Gundu, Mina Maleki:

Securing CAN Bus in Connected and Autonomous Vehicles Using Supervised Machine Learning Approaches. 42-46 - Jakob Harig, Ryan Russell, Jing Wang, Yufeng Lu:

Near-Optimal Synchronization of Multiple Robot Carts Using Online Reinforcement Learning. 47-52 - Christopher N. Broadhurst, Osama Abuomar, Piotr Szczurek:

Data Analytics On Nasdaq Stock Prices: Reddit Social Media Case Study. 53-60 - Dietmar P. F. Möller, Hamid Vakilzadian, Roland E. Haas:

From Industry 4.0 towards Industry 5.0. 61-68 - Adeel Sultan, Cesar D. Campos-Martinez, Warren S. Vaz:

Remote-Controlled Electric Basic Utility Vehicle. 75-79 - Xiaofan Liu, Yuanyang Cai, Yanan Song, Lizhe Tan:

Bearing Fault Diagnosis Based on Multi-scale Neural Networks. 80-85 - Saad Jarid, Manohar Das:

An Optimal Fast Charging Scheme for Li-ion Batteries Using a Continuous Exponentially Decaying Current Profile. 86-90 - Julia Huette, Mahmood Al-Khassaweneh

, James Oakley:
Using Machine Learning Techniques for Clickbait Classification. 91-95 - Rasoul Akbari, Afshin Izadian

:
Electrical Equivalent Circuit of Split-Shaft Wind Energy Conversion Systems. 103-108 - Yu Lin:

Wafer Pattern Counting, Detection and Classification Based on Encoder-Decoder CNN Structure. 109-113 - Atif Tirmizi, Osama Abuomar:

A Secure API-Driven Framework for AES Modes of Encryption Enhanced with Machine Learning. 118-124 - Rasoul Akbari, Afshin Izadian

:
Split-Shaft Wind Energy Conversion Systems Scalability and Components Selection. 125-130 - Muhammad Maaz Ali Khan, Enow Nkongho Ehabe, Akalanka B. Mailewa:

Discovering the Need for Information Assurance to Assure the End Users: Methodologies and Best Practices. 131-138 - Venkat Kodali, Daniel Berleant:

Recent, Rapid Advancement in Visual Question Answering: a Review. 139-146 - Sandun S. Kuruppu:

Machine Parameter Error Influence on PMSM Position Sensor Offset Error Quantification. 147-152 - David Arnold, John Ford, Jafar Saniie:

Machine Learning Models for Cyberattack Detection in Industrial Control Systems. 166-170 - Shruti Chavan, Xinrui Yu, Jafar Saniie:

High Precision Analog Gauge Reader Using Optical Flow and Computer Vision. 171-175 - Kaitlyn Graves, Madiha Kanwal, Xinrui Yu, Jafar Saniie:

Design Flow of mmWave Radar and Machine Vision Fusion for Pedestrian Collision Warning. 176-181 - David Arnold, Charlotte David, Jafar Saniie:

PowerShell Malware Analysis Using a Novel Malware Rating System. 182-187 - Muhammad Nadeem Rafiq, Dipankar Mitra, Adnan Iftikhar

, Abdul M. Kirmani, Benjamin D. Braaten:
On the Shielding Properties of Woven Microfiber Materials for Potential EMC Applications of IoT Devices. 188-192 - Piotr Palka, Rafael A. Perez, Tianyang Fang, Jafar Saniie:

Design Flow of Blowfish Symmetric-Key Block Cipher on FPGA. 193-197 - Ritika Nigam, Arpan Kundu, Xinrui Yu, Jafar Saniie:

Machine Vision Surveillance System - Artificial Intelligence For Covid-19 Norms. 198-202 - Patricia Sanchez Miralles, Laura Fernandez Gonzalez, Xinrui Yu, Jafar Saniie:

Assisting Visually Impaired People using Autonomous Navigation System and Computer Vision for Grocery Shopping. 203-208 - Ravishankar Natarajan, Xinrui Yu, Jafar Saniie:

Machine Learning Safety System for Treadmill Users. 209-214 - Farag Mohamed E. Lagnf, Subramaniam Ganesan:

The Improved Implementation of the Message freshness on CAN XL using FPGA. 215-220 - Mohammad Z. El-Yabroudi

, Khalfalla Awedat, Rakan C. Chabaan, Osama Abudayyeh, Ikhlas Abdel-Qader
:
Adaptive DBSCAN LiDAR Point Cloud Clustering For Autonomous Driving Applications. 221-224 - Namrata Chaudhari, Reshu Agarwal, Meghna Narwade, Xinrui Yu, Jafar Saniie:

Artificial Intelligence System for Emotion Recognition and Text Analytics. 225-230 - Tala Talaei Khoei, Wen Chen Hu, Naima Kaabouch:

Residual Convolutional Network for Detecting Attacks on Intrusion Detection Systems in Smart Grid. 231-237 - Sanjaikanth E. Vadakkethil Somanathan Pillai

, Abdelrahman Ahmed ElSaid, Wen-Chen Hu:
A Self-Reconfigurable System for Mobile Health Text Misinformation Detection. 242-247 - Dean Cannon, Tianyang Fang, Jafar Saniie:

Modular Delay Audio Effect System on FPGA. 248-251 - Adrian Leyte Fraga, Xinrui Yu, Won-Jae Yi, Jafar Saniie:

Indoor Navigation System for Visually Impaired People using Computer Vision. 257-260 - Zhengkui Zhao, Chaofan Zhao, Jun Yang, Kaiwen Hou, Haijun Liu:

Engineering Frequency Regulation Strategy for PV Inverters in Large-scale Renewable Energy Integrated Power System. 261-267 - Ramkrishna Mishan, Arturo De La Cruz, Jianwu Zeng, Taesic Kim:

A Virtual Impedance Based Control for Power Sharing in a Microgrid with Uncertainty in Line Impedance. 268-272 - Tianshu Ruan, V. Amrusha Aryasomyajula, Nasser Houshangi:

Performance of monocular and stereo camera in indoor environment for Visual SLAM using ORB method. 273-278 - Tala Talaei Khoei, Aydan Gasimova, Mohammad Aymane Ahajjam, Khair Al Shamaileh, Vijay K. Devabhaktuni, Naima Kaabouch:

A Comparative Analysis of Supervised and Unsupervised Models for Detecting GPS Spoofing Attack on UAVs. 279-284 - Hans Johnson

, Jafar Saniie:
Distributed Gesture Controlled Systems for Human-Machine Interface. 285-289 - Mikhail Gromov

, David Arnold, Jafar Saniie:
Tackling Multiple Security Threats in an IoT Environment. 290-295 - He Zhou, Jigang Liu:

An Enhanced RSSI-based Framework for Localization of Bluetooth Devices. 296-304 - Simrat Kaur, Rajesh Kumar Krishnan, Xinrui Yu, Jafar Saniie:

Auditory Brainwave Entrainment System using Time-Series Analysis of EEG Signal. 305-310 - I Hua Tsai, Bashir I. Morshed:

Beat-by-beat Classification of ECG Signals with Machine Learning Algorithm for Cardiac Episodes. 311-314 - Tala Talaei Khoei, Mohammad Aymane Ahajjam

, Wen Chen Hu, Naima Kaabouch:
A Deep Learning Multi-Task Approach for the Detection of Alzheimer's Disease in a Longitudinal Study. 315-319 - Arthur Findelair, Xinrui Yu, Jafar Saniie:

Design Flow and Implementation of a Vision-Based Gesture-Controlled Drone. 320-324 - Alejandro Perez-Vicente, David Hernandez, Tianyang Fang, Jafar Saniie:

Point Cloud Generation with Stereo and Monocular Depth Estimation on FPGA. 325-329 - Xin Zhang, Jafar Saniie, Sasan Bakhtiari, Alexander Heifetz

:
Unsupervised Learning for Detection of Defects in Pulsed Infrared Thermography of Metals. 330-334 - Temitope Bankefa, Ashoke Kumar Biswas

, Prakash Ranganathan:
Hybrid Machine Learning Models for Accurate Onshore/Offshore Wind Farm Forecasts. 335-341 - Alex Billedeaux, Byron DeVries:

Using Metamorphic Relationships and Genetic Algorithms to Test Open-Source Software. 342-345 - Jhoseph Ruiz Fachin, Christian Trefftz, Xiang Cao, Byron DeVries:

Optimizing Trade-offs Between Distance and Coverage for Facility Location. 346-351 - Mariana Hentea:

A Perspective on Research Initiatives in Cybersecurity Engineering for Future SmartGrids. 352-357 - Nabonita Mitra, Bashir I. Morshed:

Automatic Detection of Situational Context Using AI from Minimal Sensor Modality. 358-362 - Yuantian Xue, Fan Jiang, Yunlian Liu, Jinian Yuan, Wu Dou, Chun Wei:

Optimal Capacity Allocation of Integrated Energy Systems Considering Renewable Energy Accommodation. 363-367 - Balakrishnan Dharmalingam, Anyi Liu, Subra Ganesan, Sankardas Roy:

FineObfuscator: Defeating Reverse Engineering Attacks with Context-sensitive and Cost-efficient Obfuscation for Android Apps. 368-374 - Abel A. Reyes Angulo, Xiaoli Yang, Quamar Niyaz, Paheding Sidike, Ahmad Y. Javaid:

A Secure Software Engineering Design Framework for Educational Purpose. 375-381 - Jackson Lauder, Sayeed Z. Sajal:

Jaxium: A Trusted Social Network with Maximum Privacy. 389-392 - Reid Kutter, Sayeed Z. Sajal:

Low-cost Subscription-less Home Security System. 393-400 - Madison Davis, Bashir I. Morshed:

Classification of COVID-19 Disease Severity using CT Scans via Deep Convolutional Neural Networks. 401-404 - Hadjar Ould Slimane, Selma Benouadah, Khair Al Shamaileh, Vijay K. Devabhaktuni, Naima Kaabouch:

ADS-B Message Injection Attack on UAVs: Assessment of SVM-based Detection Techniques. 405-410 - Rajrup Mitra

, Jack Hackel, Amrita Das, Sattar Dorafshan, Naima Kaabouch:
A UAV Payload for Real-time Inspection of Highway Ancillary Structures. 411-416 - Nafiz Rifat, Mostofa Ahsan, Rahul Gomes

, Md Minhaz Chowdhury:
COVID-19 Sentiment Analysis applying BERT. 417-422 - Tianyang Fang, Jafar Saniie, Sasan Bakhtiari, Alexander Heifetz

:
Frequency Shift Baseline Removal for Improved Flow Measurement using Microwave Cavity Resonator. 436-439 - Yichun Li, Mina Maleki, Shadi Banitaan, Mingzuoyang Chen:

State of Health Indicator Modeling of Lithium-ion Batteries Using Machine Learning Techniques. 440-445 - Jaya Preethi Mohan, Niroop Sugunaraj, Prakash Ranganathan:

Cyber Security Threats for 5G Networks. 446-454 - Mohsen Mohaidat

, Janos L. Grantner, Saad A. Shebrain, Ikhlas Abdel-Qader
:
Instrument Detection for the Intracorporeal Suturing Task in the Laparoscopic Box Trainer Using Single-stage object detectors. 455-460 - Mostofa Ahsan, Nafiz Rifat, Md Minhaz Chowdhury, Rahul Gomes

:
Detecting Cyber Attacks: A Reinforcement Learning Based Intrusion Detection System. 461-466 - Mostofa Ahsan, Nafiz Rifat, Md Minhaz Chowdhury, Rahul Gomes

:
Intrusion Detection for IoT Network Security with Deep Neural Network. 467-472 - Nemese Kalubi, Sayeed Z. Sajal:

Cloud Computing: Arduino Cloud IoT Integration with REST API. 473-476 - Charles-Alexandre Diop, Baptiste Pelloux, Xinrui Yu, Won-Jae Yi, Jafar Saniie:

Soccer Player Recognition using Artificial Intelligence and Computer Vision. 477-481 - Melanie Acelor Ndambani, Tianyang Fang, Jafar Saniie:

Autonomous Robotic Arm for Object Sorting and Motion Compensation using Kalman Filter. 488-491 - Christian D. Hines, Md Minhaz Chowdhury:

Uncover Security Weakness Before the Attacker Through Penetration Testing. 492-497 - Warren Detres, Md Minhaz Chowdhury, Nafiz Rifat:

IoT Security and Privacy. 498-503 - André Klahold

, Madjid Fathi, Johannes Zenkert
:
Society 5.0 illustrated by the example of Computer Aided Journalism. 504-506 - Quinn R. McCluskey, Md Minhaz Chowdhury, Shadman Latif, Krishna Kambhampaty:

Computer Forensics: Complementing Cyber Security. 507-512 - Robert Vanness, Md Minhaz Chowdhury, Nafiz Rifat:

Malware: A Software for Cybercrime. 513-518 - Julian Ortiz, Md Minhaz Chowdhury:

Computational Trust for Securing IoT. 519-526 - Devin Sweigert, Md Minhaz Chowdhury, Nafiz Rifat:

Exploit Security Vulnerabilities by Penetration Testing. 527-532 - Aaron Fleury-Charles, Md Minhaz Chowdhury, Nafiz Rifat:

Data Breaches: Vulnerable Privacy. 538-543 - Timothy Kowalski, Md Minhaz Chowdhury, Shadman Latif, Krishna Kambhampaty:

Bitcoin: Cryptographic Algorithms, Security Vulnerabilities and Mitigations. 544-549 - Christian Weber

, Hasan Abu-Rasheed
, Madjid Fathi:
Adding Context to Industry 4.0 Analytics: A New Document Driven Knowledge Graph Construction and Contextualization Approach. 550-555 - Dietmar P. F. Möller, Hamid Vakilzadian, Roland E. Haas:

Cybersecurity Certificate in Digital Transformation. 556-561 - Donald K. Davis, Md Minhaz Chowdhury, Nafiz Rifat:

Password Security: What Are We Doing Wrong? 562-567 - Kyle Guers, Md Minhaz Chowdhury, Nafiz Rifat:

Card Skimming: A Cybercrime by Hackers. 575-579 - Md Minhaz Chowdhury, Joshua M. Del Toro, Krishna Kambhampaty:

Active Cyber Defense by Benevolent Worms. 580-585 - Matthew V. Krishnan Myjak, Prakash Ranganathan:

Unmanned Aerial System (UAS) Swarm Design, Flight Patterns, Communication Type, Applications, and Recommendations. 586-594 - Strider Houx, Nathan Keep, Matthew Ryan, Ahmet Turkmen:

Capstone Design: Remote Controlled Drone using Thrust Vectoring. 595-599 - Max Walker, Jacob Paul, Ahmet Turkmen, Jeff Leismer:

Capstone Project Experience: AI-Driven Virtual Therapist for Administering VibeTech Treatments Using Artificial Reality. 600-605 - Pankaj Jairu, Akalanka B. Mailewa:

Network Anomaly Uncovering on CICIDS-2017 Dataset: A Supervised Artificial Intelligence Approach. 606-615 - Niroop Sugunaraj, Akshay Ram Ramchandra, Prakash Ranganathan:

Cyber Fraud Economics, Scam Types, and Potential Measures to Protect U.S. Seniors: A Short Review. 623-627 - Sarosh H. Patel, Navarun Gupta, Lawrence V. Hmurcik, Bhushan Dharmadhikari:

Analyzing the Effects of Mismatch Currents in Interferential Current Therapy. 628-631

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














