This study investigates the feasibility of using long-range radio communication in a busy city environment in order to begin better understanding how the Internet of Things might be implemented into smart cities.
Read More...Long Range Radio Communication for Urban Sensor Networks
This study investigates the feasibility of using long-range radio communication in a busy city environment in order to begin better understanding how the Internet of Things might be implemented into smart cities.
Read More...A Cloud-Enabled Communication Strategy for Wildfire Alerts
The traditional alert system in California consists of Wireless Emergency Alerts (WEAs), which lack location specificity, and sign-up-based technology which is limited by the number of sign ups. Those who do not have phones or have a silence option on their devices are most at risk from the current alert system. Here the authors developed cloud-enabled crisis connection for disaster alerts (CRISIS-CONNECT) to mitigate problems associated with the current alert system.
Read More...The effect of activation function choice on the performance of convolutional neural networks
With the advance of technology, artificial intelligence (AI) is now applied widely in society. In the study of AI, machine learning (ML) is a subfield in which a machine learns to be better at performing certain tasks through experience. This work focuses on the convolutional neural network (CNN), a framework of ML, applied to an image classification task. Specifically, we analyzed the performance of the CNN as the type of neural activation function changes.
Read More...Fingerprint patterns through genetics
This study explores the link between fingerprints and genetics by analyzing familial fingerprints to show how the fingerprints between family members, and in particular siblings, could be very similar. The hypothesis was that the fingerprints between siblings would be very similar and the dominant fingerprint features within the family would be the same throughout the generations. Fingerprints between the siblings showed a trend of similarity, with only very small differences which makes these fingerprints unique. This work helps to support the link between fingerprints and genetics while providing a modern technological application.
Read More...Can the Growth Mindset Encourage Girls to Pursue “Male” Careers?
Despite major advances in gender equality, men still far outnumber women in science, technology, engineering and math (STEM) professions. The purpose of this project was to determine whether mindset could affect a student’s future career choices and whether this effect differed based on gender. When looking within the gender groups, 86% of females who had a growth mindset were likely to consider a “male” career, whereas only 16% of females with fixed mindset would likely to consider a “male” career. Especially for girls, cultivating a growth mindset may be a great strategy to address the problem of fewer girls picking STEM careers.
Read More...A comparison of use of the mobile electronic health record by medical providers based on clinical setting
The electronic health record (EHR), along with its mobile application, has demonstrated the ability to improve the efficiency and accuracy of health care delivery. This study included data from 874 health care providers over a 12-month period regarding their usage of mobile phone (EPIC® Haiku) and tablet (EPIC® Canto) mEHR. Ambulatory and inpatient care providers had the greatest usage levels over the 12-month period. Awareness of workflow allows for optimization of mEHR design and implementation, which should increase mEHR adoption and usage, leading to better health outcomes for patients.
Read More...The effects of social media on STEM identity in adolescent girls
Social media is widely used and easily accessible for adolescents, it has the potential to increase STEM (Science, Technology, Engineering, and Math) identity in girls. We aimed to investigate the effects of exposure to counter-stereotypical portrayals of women in STEM on social media on the STEM identity of adolescent girls. The study concluded that social media alone may not be an effective tool to increase STEM identity in girls. Social media can still be used as a complementary tool to support and encourage women in STEM, but it should not be relied upon solely to address the gender disparity in STEM fields.
Read More...Transfer learning and data augmentation in osteosarcoma cancer detection
Osteosarcoma is a type of bone cancer that affects young adults and children. Early diagnosis of osteosarcoma is crucial to successful treatment. The current methods of diagnosis, which include imaging tests and biopsy, are time consuming and prone to human error. Hence, we used deep learning to extract patterns and detect osteosarcoma from histological images. We hypothesized that the combination of two different technologies (transfer learning and data augmentation) would improve the efficacy of osteosarcoma detection in histological images. The dataset used for the study consisted of histological images for osteosarcoma and was quite imbalanced as it contained very few images with tumors. Since transfer learning uses existing knowledge for the purpose of classification and detection, we hypothesized it would be proficient on such an imbalanced dataset. To further improve our learning, we used data augmentation to include variations in the dataset. We further evaluated the efficacy of different convolutional neural network models on this task. We obtained an accuracy of 91.18% using the transfer learning model MobileNetV2 as the base model with various geometric transformations, outperforming the state-of-the-art convolutional neural network based approach.
Read More...A novel calibration algorithm and its effects on heading measurement accuracy of a low-cost magnetometer
Digital compasses are essential in technology that we use in our everyday lives: phones, vehicles, and more. Li and Liu address the accuracy of these devices by presenting a new algorithm for accurately calibrating low-cost magnetometers.
Read More...Design and implementation of a cryptographically secure electronic voting infrastructure
In this study, the authors present proposed cryptographic controls for election sites with the hypothesis that this will mitigate risk and remediate vulnerabilities.
Read More...Search articles by title, author name, or tags