UMBC College of Engineering and Information Technology
Browse by
Collections in this community
Recent Submissions
-
Computational Humor: A Survey of the Literature
(2023)Humor, a quintessentially human experience, is one that finds itself at the intersection of psychology, linguistics, philosophy, and computation. Thus, it finds itself in a very unique place in the world of computer ... -
Deep Spatiotemporal Clustering: A Temporal Clustering Approach for Multi-dimensional Climate Data
(2023-04-27)Clustering high-dimensional spatiotemporal data using an unsupervised approach is a challenging problem for many data-driven applications. Existing state-of-the-art methods for unsupervised clustering use different similarity ... -
TinyM²Net-V2: A Compact Low Power Software Hardware Architecture for Multimodal Deep Neural Networks
(ACM, 2023-05-03)With the evaluation of Artificial Intelligence (AI), there has been a resurgence of interest in how to use AI algorithms on low-power embedded systems to broaden potential use cases of the Internet of Things (IoT). To mimic ... -
Multi-Objective Optimal Design of a Cable-Driven Parallel Robot Based on an Adaptive Adjustment Inertia Weight Particle Swarm Optimization Algorithm
(ASME, 2023-05-22)Cable-driven parallel robots (CDPRs) have been widely used in engineering fields because of their significant advantages including high load-bearing capacity, large workspace, and low inertia. However, the impact of ... -
Machine Learning Security as a Source of Unfairness in Human-Robot Interaction
(2023)Machine learning models that sense human speech, body placement, and other key features are commonplace in human-robot interaction. However, the deployment of such models in themselves is not without risk. Research in ... -
A Systematic Study on Object Recognition Using Millimeter-wave Radar
(2023-05-03)Due to its light and weather-independent sensing, millimeter-wave (MMW) radar is essential in smart environments. Intelligent vehicle systems and industry-grade MMW radars have integrated such capabilities. Industry-grade ... -
FIREBALL: A Dataset of Dungeons and Dragons Actual-Play with Structured Game State Information
(2023-05-02)Dungeons & Dragons (D&D) is a tabletop roleplaying game with complex natural language interactions between players and hidden state information. Recent work has shown that large language models (LLMs) that have access to ... -
Can Feature Engineering Help Quantum Machine Learning for Malware Detection?
(2023-05-03)With the increasing number and sophistication of malware attacks, malware detection systems based on machine learning (ML) grow in importance. At the same time, many popular ML models used in malware classification are ... -
Adaptive Nonlinear Control of a Bicopter with Unknown Dynamics
(2023-05-05)This paper presents an adaptive input-output linearization controller with a finite-time convergent parameter estimator for the multicopter trajectory following problem. The controller is constructed by augmenting ... -
RARES: Runtime Attack Resilient Embedded System Design Using Verified Proof-of-Execution
(2023-05-05)Modern society is getting accustomed to the Internet of Things (IoT) and Cyber-Physical Systems (CPS) for a variety of applications that involves security-critical user data and information transfers. In the lower end of ... -
Info-Autopoiesis and the Limits of Artificial General Intelligence
(MDPI, 2023-05-07)Recent developments, begun by the ascending spiral of the anticipated endless prospects of ChatGPT, promote artificial intelligence (AI) as an indispensable tool and commodity whose time has come. Yet the sinister specter ... -
HeteroEdge: Addressing Asymmetry in Heterogeneous Collaborative Autonomous Systems
(2023-05-05)Gathering knowledge about surroundings and generating situational awareness for IoT devices is of utmost importance for systems developed for smart urban and uncontested environments. For example, a large-area surveillance ... -
A Comprehensive Study of Gradient Inversion Attacks in Federated Learning and Baseline Defense Strategies
(IEEE, 2023-04-10)With a greater emphasis on data confidentiality and legislation, collaborative machine learning algorithms are being developed to protect sensitive private data. Federated learning (FL) is the most popular of these methods, ... -
Optimized two-layer motheye structures for MgAl₂O₄ spinel ceramic windows
(Optica, 2021-07-22)We computationally study two-layer motheye nanostructures fabricated on MgAl₂O₄ spinel ceramic windows. We investigated the parameters of the structure, including height, width, and shape, in order to optimize its power ... -
Constrained Independent Component Analysis Based on Entropy Bound Minimization for Subgroup Identification from Multi-subject fMRI Data
(IEEE, 2023-05-05)Identification of subgroups of subjects homogeneous functional networks is a key step for precision medicine. Independent vector analysis (IVA) is shown to be effective for this task, however, it has a substantial computing ... -
Independent vector analysis with multivariate Gaussian model: A scalable method by multilinear regression
(IEEE, 2023-05-05)Joint blind source separation (JBSS) is a powerful tool for analyzing multiple linked datasets, distinguished by the key ability to exploit cross-dataset dependencies. Despite this ability generally improving overall ... -
Robots are everywhere – improving how they communicate with people could advance human-robot collaboration
(The Conversation, 2023-04-12) -
Exploring High-Level Neural Networks Architectures for Efficient Spiking Neural Networks Implementation
(IEEE, 2023-03-21)The microprocessor industry faces several challenges: total power consumption, processor speed, and increasing chip cost. It is visible that the processor speed in the last decade has not improved and saturated around 2 ... -
Towards Explainable and Safe Conversational Agents for Mental Health: A Survey
(2023-04-25)Virtual Mental Health Assistants (VMHAs) are seeing continual advancements to support the overburdened global healthcare system that gets 60 million primary care visits, and 6 million Emergency Room (ER) visits annually. ... -
Anonymous Lightweight Authenticated Key Agreement Protocol for Fog-Assisted Healthcare IoT System
(IEEE, 2023-04-25)The impact of fog-assisted Healthcare IoT (H-IoT) system is immense. The smart H-IoT equipments can upload healthcare information to fog nodes with low latency and high mobility. To facilitate secure interactions among ...