Varun Garg summarizes his academic and industrial experience in data science and signal processing. He completed his PhD at UMass Lowell focusing on data science and signal processing. In industry, he has worked as an algorithm engineer at Veoneer developing object detection pipelines and unsupervised machine learning models for processing GPS trajectories. His academic research focused on utilizing sensor data from participatory devices to analyze static and dynamic spatiotemporal phenomena. This included identifying static road conditions using vehicle sensor data collected over time as well as collaboratively localizing and tracking vehicles in real-time using RF signals. He also developed methods to understand complex situations by sequencing sensor observations using deep learning models. His work has been published in peer-reviewed conferences
A Survey on Smart Devices for Object and Fall DetectionIRJET Journal
This document summarizes a survey on smart devices for object and fall detection. It discusses how sensors and microcontrollers can be used to create wearable alert devices for the elderly that detect falls and send location information to concerned contacts. It also describes how ultrasonic sensors and smart glasses can detect obstacles to help blind or visually impaired people navigate safely. The document reviews several existing studies on vision-based and sensor-based fall detection systems and identifies challenges in real-world deployment, usability, and user acceptance of emerging technologies.
National Highway Alignment from Namakkal to Erode Using GISIJERA Editor
The vision of the Highway Alignment is to increase the capacity, connectivity, efficiency and safety of the Highways System so as to enable balanced socioeconomic development of all sections of the people and all regions from NAMAKKAL to ERODE via and to reduce the traffic and travelling of the state. It is to establish shortest path for road network time in the roads which provide a better and comfortable base for updating the traffic and other related information in road administration. It is to identify the short route for the vehicles traveling from NAMAKKAL to ERODE and to reduce the time travel for the vehicles with possible paths or routes or places for laying eco-friendly highway. To optimize the route for the vehicles traveling from NAMAKKAL to ERODE using GIS with Network analysis tools. From this we can find the suitable route for peoples to carry out without any traffic disturbances and protecting the environment. It also took advantages of GIS capabilities that offer the ability to overlay maps, merge them, and perform spatial analysis on various layers of information in either two or three dimensions
Human Movement Recognition Using Internal Sensors of a Smartphone-based HMD (...sugiuralab
The document proposes recognizing human movements using the internal sensors of a smartphone in a head-mounted display (HMD) without external controllers. It collected sensor data from participants performing 16 movements and used machine learning to recognize the movements with 92.03% accuracy on average. However, there was a long time lag between movement detection and recognition completion. Shortening the sensor recording time decreased accuracy but could enable faster recognition.
Certain Analysis on Traffic Dataset based on Data Mining AlgorithmsIRJET Journal
The document analyzes a traffic accident dataset using data mining algorithms to identify patterns and relationships that can provide safe driving suggestions. It applies association rule mining, classification using naive Bayes, and k-means clustering. The analysis finds that human factors like being drunk or collision type have a stronger effect on accident fatality than environmental factors. Clustering identifies regions with higher or lower fatality rates. Integrating additional data could enable more testing and safety suggestions.
Analytical framework for optimized feature extraction for upgrading occupancy...IJECEIAES
The adoption of the occupancy sensors has become an inevitable in commercial and non-commercial security devices, owing to their proficiency in the energy management. It has been found that the usages of conventional sensors is shrouded with operational problems, hence the use of the Doppler radar offers better mitigation of such problems. However, the usage of Doppler radar towards occupancy sensing in existing system is found to be very much in infancy stage. Moreover, the performance of monitoring using Doppler radar is yet to be improved more. Therefore, this paper introduces a simplified framework for enriching the event sensing performance by efficient selection of minimal robust attributes using Doppler radar. Adoption of analytical methodology has been carried out to find that different machine learning approaches could be further used for improving the accuracy performance for the feature that has been extracted in the proposed system of occuancy system.
This document discusses the development of an Android application for physical activity recognition using the accelerometer sensor. It provides background on the Android operating system and its open development environment. It then summarizes relevant research papers on activity recognition using mobile sensors. The document outlines the process of collecting and labeling accelerometer data from smartphone sensors during different physical activities. Features are extracted from the sensor data and several machine learning classifiers are evaluated for activity recognition. The application will recognize activities and track metrics like calories burned, distance traveled, and implement fall detection and medical reminders.
October 2021: Top Read Articles in Soft Computingijsc
Soft computing is likely to play an important role in science and engineering in the future. The successful applications of soft computing and the rapid growth suggest that the impact of soft computing will be felt increasingly in coming years. Soft Computing encourages the integration of soft computing techniques and tools into both everyday and advanced applications. This Open access peer-reviewed journal serves as a platform that fosters new applications for all scientists and engineers engaged in research and development in this fast growing field.
HOW TO WASTE YOUR TIME ON SIMPLE THINGS DONT JUST FEEL INSTEAD BLAME OTHERS A...lanaw86385
This document describes a proposed AI image classifier called Snap Classy. It was created by 4 students at KKR & KSR Institute of Technology & Sciences under the guidance of Mr. A. Siva Sankar. The system uses YOLOv8, an updated version of YOLO, for real-time object detection and classification in images with high accuracy and speed. It aims to overcome issues with previous systems like slow processing and erroneous detections from small datasets. The proposed system would train on a new dataset of labeled images and deploy using Flask for image classification in a web application.
A Survey on Smart Devices for Object and Fall DetectionIRJET Journal
This document summarizes a survey on smart devices for object and fall detection. It discusses how sensors and microcontrollers can be used to create wearable alert devices for the elderly that detect falls and send location information to concerned contacts. It also describes how ultrasonic sensors and smart glasses can detect obstacles to help blind or visually impaired people navigate safely. The document reviews several existing studies on vision-based and sensor-based fall detection systems and identifies challenges in real-world deployment, usability, and user acceptance of emerging technologies.
National Highway Alignment from Namakkal to Erode Using GISIJERA Editor
The vision of the Highway Alignment is to increase the capacity, connectivity, efficiency and safety of the Highways System so as to enable balanced socioeconomic development of all sections of the people and all regions from NAMAKKAL to ERODE via and to reduce the traffic and travelling of the state. It is to establish shortest path for road network time in the roads which provide a better and comfortable base for updating the traffic and other related information in road administration. It is to identify the short route for the vehicles traveling from NAMAKKAL to ERODE and to reduce the time travel for the vehicles with possible paths or routes or places for laying eco-friendly highway. To optimize the route for the vehicles traveling from NAMAKKAL to ERODE using GIS with Network analysis tools. From this we can find the suitable route for peoples to carry out without any traffic disturbances and protecting the environment. It also took advantages of GIS capabilities that offer the ability to overlay maps, merge them, and perform spatial analysis on various layers of information in either two or three dimensions
Human Movement Recognition Using Internal Sensors of a Smartphone-based HMD (...sugiuralab
The document proposes recognizing human movements using the internal sensors of a smartphone in a head-mounted display (HMD) without external controllers. It collected sensor data from participants performing 16 movements and used machine learning to recognize the movements with 92.03% accuracy on average. However, there was a long time lag between movement detection and recognition completion. Shortening the sensor recording time decreased accuracy but could enable faster recognition.
Certain Analysis on Traffic Dataset based on Data Mining AlgorithmsIRJET Journal
The document analyzes a traffic accident dataset using data mining algorithms to identify patterns and relationships that can provide safe driving suggestions. It applies association rule mining, classification using naive Bayes, and k-means clustering. The analysis finds that human factors like being drunk or collision type have a stronger effect on accident fatality than environmental factors. Clustering identifies regions with higher or lower fatality rates. Integrating additional data could enable more testing and safety suggestions.
Analytical framework for optimized feature extraction for upgrading occupancy...IJECEIAES
The adoption of the occupancy sensors has become an inevitable in commercial and non-commercial security devices, owing to their proficiency in the energy management. It has been found that the usages of conventional sensors is shrouded with operational problems, hence the use of the Doppler radar offers better mitigation of such problems. However, the usage of Doppler radar towards occupancy sensing in existing system is found to be very much in infancy stage. Moreover, the performance of monitoring using Doppler radar is yet to be improved more. Therefore, this paper introduces a simplified framework for enriching the event sensing performance by efficient selection of minimal robust attributes using Doppler radar. Adoption of analytical methodology has been carried out to find that different machine learning approaches could be further used for improving the accuracy performance for the feature that has been extracted in the proposed system of occuancy system.
This document discusses the development of an Android application for physical activity recognition using the accelerometer sensor. It provides background on the Android operating system and its open development environment. It then summarizes relevant research papers on activity recognition using mobile sensors. The document outlines the process of collecting and labeling accelerometer data from smartphone sensors during different physical activities. Features are extracted from the sensor data and several machine learning classifiers are evaluated for activity recognition. The application will recognize activities and track metrics like calories burned, distance traveled, and implement fall detection and medical reminders.
October 2021: Top Read Articles in Soft Computingijsc
Soft computing is likely to play an important role in science and engineering in the future. The successful applications of soft computing and the rapid growth suggest that the impact of soft computing will be felt increasingly in coming years. Soft Computing encourages the integration of soft computing techniques and tools into both everyday and advanced applications. This Open access peer-reviewed journal serves as a platform that fosters new applications for all scientists and engineers engaged in research and development in this fast growing field.
HOW TO WASTE YOUR TIME ON SIMPLE THINGS DONT JUST FEEL INSTEAD BLAME OTHERS A...lanaw86385
This document describes a proposed AI image classifier called Snap Classy. It was created by 4 students at KKR & KSR Institute of Technology & Sciences under the guidance of Mr. A. Siva Sankar. The system uses YOLOv8, an updated version of YOLO, for real-time object detection and classification in images with high accuracy and speed. It aims to overcome issues with previous systems like slow processing and erroneous detections from small datasets. The proposed system would train on a new dataset of labeled images and deploy using Flask for image classification in a web application.
This document describes a gait-based authentication system project. The project aims to authenticate individuals based on their unique walking gait using wearable sensors. It discusses implementing gait authentication using machine vision, floor sensors, or wearable sensors. The implementation phases include data gathering, feature extraction, modeling, training, and testing classifiers like neural networks and random forests to identify users based on their gait data. A web portal was created for data collection and evaluation of the gait authentication system.
March 2021: Top Read Articles in Soft Computingijsc
Soft computing is likely to play an important role in science and engineering in the future. The successful applications of soft computing and the rapid growth suggest that the impact of soft computing will be felt increasingly in coming years. Soft Computing encourages the integration of soft computing techniques and tools into both everyday and advanced applications. This Open access peer-reviewed journal serves as a platform that fosters new applications for all scientists and engineers engaged in research and development in this fast growing field.
Avinash Kumar is a PhD candidate in electrical and computer engineering at the University of Illinois. His research focuses on camera calibration, computational imaging, and computer vision applications to railroad monitoring. He has developed new models and analytical solutions for small field of view camera calibration. His other research includes developing an omnifocus imaging technique, extracting shadows obscured by scattering media, and structure from motion for indoor scenes. He has also worked on a machine vision system to analyze gaps between freight loads on trains.
Spatio-Temporal Data Analysis using Deep LearningIRJET Journal
This document provides a literature review of spatio-temporal data analysis using deep learning techniques. It discusses applications in domains such as transportation, social media, and environmental issues. For transportation, examples of deep learning models for traffic forecasting and accident detection are discussed. For social media, models for event detection from social media data and sentiment analysis of disaster tweets are described. For environmental issues, applications discussed include wind and rainfall prediction, land use classification from satellite imagery, and crop yield modeling from aerial imagery. The document provides an overview of different deep learning techniques used for spatio-temporal data analysis across these application domains.
This document describes a student project that aims to develop an efficient firearms monitoring technique using deep learning to help build secure smart cities. The project uses Faster RCNN and EfficientDet models to detect guns and human faces in images. An ensemble approach is proposed that combines the outputs of the models to improve detection performance compared to the individual models. The proposed system, hardware requirements, algorithms, literature review and references are outlined in the document.
Embedded Sensing and Computational Behaviour ScienceDaniel Roggen
Overview of the activities in the Sensor Technology Research Centre, University of Sussex, UK, in wearable technologies and computational behaviour science.
1) The document proposes a knowledge-based multi-agent geo-simulation approach to simulate the deployment of sensor webs in virtual geographic environments.
2) In the approach, sensors are modeled as intelligent agents that can reason about spatial knowledge of the environment and react to dynamic phenomena.
3) Spatial knowledge is represented using conceptual graphs and is used by agents during simulation to support decision making, and after simulation to analyze results and provide decision support to users.
A Novel Feature Selection with Annealing For Computer Vision And Big Data Lea...theijes
Numerous PC vision and medical imaging issues a confronted with gaining from expansive scale datasets, with a huge number of perceptions furthermore, highlights.A novel productive learning plan that fixes a sparsity imperative by continuously expelling variables taking into account a measure and a timetable. The alluring actuality that the issue size continues dropping all through the cycles makes it especially reasonable for enormous information learning. Methodology applies nonexclusively to the advancement of any differentiable misfortune capacity, and discovers applications in relapse, order and positioning. The resultant calculations assemble variable screening into estimation and are amazingly easy to execute. It gives hypothetical assurances of joining and determination consistency. Investigates genuine and engineered information demonstrate that the proposed strategy contrasts exceptionally well and other cutting edge strategies in relapse, order and positioning while being computationally exceptionally effective and adaptable.
This document provides a survey of data mining techniques for crime prediction. It begins with an introduction to crime prediction and standard techniques like centrography, journey to crime, routine activity theory, and circle theory. It then discusses various data mining techniques used for crime prediction, including support vector machines, multivariate time series clustering, Bayesian networks, artificial neural networks, and fuzzy time series. For each technique, an example paper applying that technique is summarized. A table provides a comparative analysis of the techniques based on predictive accuracy, performance, and disadvantages. The document concludes that the discussed data mining prediction techniques can enhance accuracy and performance of crime prediction by identifying patterns in current and past crime data to predict future values.
Avinash Kumar is a PhD candidate in electrical and computer engineering at the University of Illinois. His research focuses on camera calibration, computational imaging, and developing vision systems for analyzing freight trains. He has published papers on non-frontal camera calibration, depth from focus/defocus, and extracting shadow details from transmissive media. Kumar received his dual BTech and MS degrees from the International Institute of Information Technology and is advised by Professor Narendra Ahuja.
IRJET- Criminal Recognization in CCTV Surveillance VideoIRJET Journal
This document presents research on criminal recognition in CCTV surveillance videos using deep learning. It proposes a method where a user can upload faces of known criminals. When CCTV footage is recorded, the application will monitor for these faces. If a face is recognized, the CCTV camera will track the identified person through multiple cameras by alerting other cameras. The system segments video into images, acquires images, recognizes human faces, constructs motion flows between cameras to track individuals. Experimental results on a dataset show the system's ability to extract patterns from faces and cluster images of different angled faces. The system aims to identify criminals across surveillance camera networks.
Emergence Detection And Rescue Using Wireless Sensor NetworksIRJET Journal
This document describes a system that uses wireless sensor networks to help guide people to safety during emergencies. When an emergency occurs, sensors detect hazardous conditions and notify people in the area through their mobile devices. The system then provides navigation instructions to safely guide people out of the hazardous area while avoiding congestion. It considers alternative routes and ways to temporarily replace parts of routes. The proposed system aims to more efficiently evacuate an area during an emergency compared to existing systems that only focus on finding the safest individual path and do not account for potential congestion issues.
BIG DATA IN SMART CITIES: A SYSTEMATIC MAPPING REVIEWsarfraznawaz
Big data is an emerging area of research and its prospective applications in smart cities are extensively recognized. In this study, we provide a breadth-first review of the domain “Big Data in Smart Cities” by applying the formal research method of systematic mapping. We investigated the primary sources of publication, research growth, maturity level of the research area, prominent research themes, type of analytics applied, and the areas of smart cities where big data research is produced. Consequently, we identified that empirical research in the domain has been progressing since 2013. The IEEE Access journal and IEEE Smart Cities Conference are the leading sources of literature containing 10.34% and 13.88% of the publications, respectively. The current state of the research is semi-matured where research type of 46.15% of the publications is solution and experience, and contribution type of 60% of the publications is architecture, platform, and framework. Prescriptive is least whereas predictive is the most applied type of analytics in smart cities as it has been stated in 43.08% of the publications. Overall, 33.85%, 21.54%, 13.85%, 12.31%, 7.69%, 6.15%, and 4.61% of the research produced in the domain focused on smart transportation, smart environment, smart governance, smart healthcare, smart energy, smart education, and smart safety, respectively. Besides the requirement for producing validation and evaluation research in the areas of smart transportation and smart environment, there is a need for more research efforts in the areas of smart healthcare, smart governance, smart safety, smart education, and smart energy. Furthermore, the potential of prescriptive analytics in smart cities is also an area of research that needs to be explored.
A Study of Mobile User Movements Prediction Methods IJECEIAES
For a decade and more, the Number of smart phone users count increasing day by day. With the drastic improvements in Communication technologies, the prediction of future movements of mobile users needs also have important role. Various sectors can gain from this prediction. Communication management, City Development planning, and locationbased services are some of the fields that can be made more valuable with movement prediction. In this paper, we propose a study of several Location Prediction Techniques in the following areas.
IRJET- Application of MCNN in Object DetectionIRJET Journal
This document discusses using a multi-column convolutional neural network (MCNN) for object detection in videos. The MCNN approach is compared to other methods like CNN and HOG-BOW-Gray pooling and is shown to achieve over 95% accuracy for pedestrian detection. The document outlines extracting frames from videos, dividing images into regions, classifying regions using CNNs, and combining results to detect objects. The MCNN approach is concluded to be useful for applications like medical imaging due to its high detection accuracy.
PREDICTION OF STORM DISASTER USING CLOUD MAP-REDUCE METHODAM Publications
The document discusses prediction of storm disasters using the Cloud Map-Reduce method for stream data mining. It begins with background on spatial data mining and its tasks/techniques. Issues with spatial data mining are also outlined. Stream data mining and its importance for analyzing continuous data streams is then introduced. Common stream data processing methods are discussed, including Apache Storm, Kafka, Spark, Flink, MapReduce and Hadoop. The paper aims to predict storm disasters using stream data mining strategies like Cloud Map-Reduce to analyze spatial datasets in real-time.
Zhipeng Zhao is seeking a research-oriented position utilizing his 6 years of experience and 6 publications in computer vision, machine learning, and data mining. He holds a Ph.D. in Computer Science from Rutgers University where he focused on object recognition, motion analysis, and statistical modeling. He also has 2 years of industrial experience applying skills in Java, C/C++, and data mining technologies at IBM.
Presentation of PhD thesis on Location Data Fusion Alket Cecaj
The document outlines Alket Cecaj's doctoral thesis on using information fusion methods for location data analysis. The thesis will introduce data fusion methods and examine fusing location data from call detail records and social media for applications like event detection and description. It will analyze re-identifying anonymized call data records using fused social network data and address related privacy issues. The thesis will evaluate different data fusion techniques and their ability to improve detection of real-world events from aggregated location information.
The document proposes a wearable device that ensures child safety and assists visually impaired people by tracking their location. The device uses sensors like GPS, GSM, and ESP32 to detect the wearer's location and share it with caregivers. It aims to address limitations of existing systems by providing a cheaper design that is compatible with multiple platforms and uses GSM for reliable communication of alerts and location via SMS and email with a Google Maps link. The proposed device detects events using an accelerometer and tracks location every 10 minutes using GPS. It sends alerts to caregivers' phones in case of emergencies or when manually activated by an on-board button.
Charith Perera, Arkady Zaslavsky, Peter Christen, Michael Compton, and Dimitrios Georgakopoulos, Context-aware Sensor Search, Selection and Ranking Model for Internet of Things Middleware, Proceedings of the IEEE 14th International Conference on Mobile Data Management (MDM), Milan, Italy, June, 2013
Digital Twins Computer Networking Paper Presentation.pptxaryanpankaj78
A Digital Twin in computer networking is a virtual representation of a physical network, used to simulate, analyze, and optimize network performance and reliability. It leverages real-time data to enhance network management, predict issues, and improve decision-making processes.
Null Bangalore | Pentesters Approach to AWS IAMDivyanshu
#Abstract:
- Learn more about the real-world methods for auditing AWS IAM (Identity and Access Management) as a pentester. So let us proceed with a brief discussion of IAM as well as some typical misconfigurations and their potential exploits in order to reinforce the understanding of IAM security best practices.
- Gain actionable insights into AWS IAM policies and roles, using hands on approach.
#Prerequisites:
- Basic understanding of AWS services and architecture
- Familiarity with cloud security concepts
- Experience using the AWS Management Console or AWS CLI.
- For hands on lab create account on [killercoda.com](https://killercoda.com/cloudsecurity-scenario/)
# Scenario Covered:
- Basics of IAM in AWS
- Implementing IAM Policies with Least Privilege to Manage S3 Bucket
- Objective: Create an S3 bucket with least privilege IAM policy and validate access.
- Steps:
- Create S3 bucket.
- Attach least privilege policy to IAM user.
- Validate access.
- Exploiting IAM PassRole Misconfiguration
-Allows a user to pass a specific IAM role to an AWS service (ec2), typically used for service access delegation. Then exploit PassRole Misconfiguration granting unauthorized access to sensitive resources.
- Objective: Demonstrate how a PassRole misconfiguration can grant unauthorized access.
- Steps:
- Allow user to pass IAM role to EC2.
- Exploit misconfiguration for unauthorized access.
- Access sensitive resources.
- Exploiting IAM AssumeRole Misconfiguration with Overly Permissive Role
- An overly permissive IAM role configuration can lead to privilege escalation by creating a role with administrative privileges and allow a user to assume this role.
- Objective: Show how overly permissive IAM roles can lead to privilege escalation.
- Steps:
- Create role with administrative privileges.
- Allow user to assume the role.
- Perform administrative actions.
- Differentiation between PassRole vs AssumeRole
Try at [killercoda.com](https://killercoda.com/cloudsecurity-scenario/)
More Related Content
Similar to Job_talk_edits_5_28_2023_edit_2_2_add_reference.pdf
This document describes a gait-based authentication system project. The project aims to authenticate individuals based on their unique walking gait using wearable sensors. It discusses implementing gait authentication using machine vision, floor sensors, or wearable sensors. The implementation phases include data gathering, feature extraction, modeling, training, and testing classifiers like neural networks and random forests to identify users based on their gait data. A web portal was created for data collection and evaluation of the gait authentication system.
March 2021: Top Read Articles in Soft Computingijsc
Soft computing is likely to play an important role in science and engineering in the future. The successful applications of soft computing and the rapid growth suggest that the impact of soft computing will be felt increasingly in coming years. Soft Computing encourages the integration of soft computing techniques and tools into both everyday and advanced applications. This Open access peer-reviewed journal serves as a platform that fosters new applications for all scientists and engineers engaged in research and development in this fast growing field.
Avinash Kumar is a PhD candidate in electrical and computer engineering at the University of Illinois. His research focuses on camera calibration, computational imaging, and computer vision applications to railroad monitoring. He has developed new models and analytical solutions for small field of view camera calibration. His other research includes developing an omnifocus imaging technique, extracting shadows obscured by scattering media, and structure from motion for indoor scenes. He has also worked on a machine vision system to analyze gaps between freight loads on trains.
Spatio-Temporal Data Analysis using Deep LearningIRJET Journal
This document provides a literature review of spatio-temporal data analysis using deep learning techniques. It discusses applications in domains such as transportation, social media, and environmental issues. For transportation, examples of deep learning models for traffic forecasting and accident detection are discussed. For social media, models for event detection from social media data and sentiment analysis of disaster tweets are described. For environmental issues, applications discussed include wind and rainfall prediction, land use classification from satellite imagery, and crop yield modeling from aerial imagery. The document provides an overview of different deep learning techniques used for spatio-temporal data analysis across these application domains.
This document describes a student project that aims to develop an efficient firearms monitoring technique using deep learning to help build secure smart cities. The project uses Faster RCNN and EfficientDet models to detect guns and human faces in images. An ensemble approach is proposed that combines the outputs of the models to improve detection performance compared to the individual models. The proposed system, hardware requirements, algorithms, literature review and references are outlined in the document.
Embedded Sensing and Computational Behaviour ScienceDaniel Roggen
Overview of the activities in the Sensor Technology Research Centre, University of Sussex, UK, in wearable technologies and computational behaviour science.
1) The document proposes a knowledge-based multi-agent geo-simulation approach to simulate the deployment of sensor webs in virtual geographic environments.
2) In the approach, sensors are modeled as intelligent agents that can reason about spatial knowledge of the environment and react to dynamic phenomena.
3) Spatial knowledge is represented using conceptual graphs and is used by agents during simulation to support decision making, and after simulation to analyze results and provide decision support to users.
A Novel Feature Selection with Annealing For Computer Vision And Big Data Lea...theijes
Numerous PC vision and medical imaging issues a confronted with gaining from expansive scale datasets, with a huge number of perceptions furthermore, highlights.A novel productive learning plan that fixes a sparsity imperative by continuously expelling variables taking into account a measure and a timetable. The alluring actuality that the issue size continues dropping all through the cycles makes it especially reasonable for enormous information learning. Methodology applies nonexclusively to the advancement of any differentiable misfortune capacity, and discovers applications in relapse, order and positioning. The resultant calculations assemble variable screening into estimation and are amazingly easy to execute. It gives hypothetical assurances of joining and determination consistency. Investigates genuine and engineered information demonstrate that the proposed strategy contrasts exceptionally well and other cutting edge strategies in relapse, order and positioning while being computationally exceptionally effective and adaptable.
This document provides a survey of data mining techniques for crime prediction. It begins with an introduction to crime prediction and standard techniques like centrography, journey to crime, routine activity theory, and circle theory. It then discusses various data mining techniques used for crime prediction, including support vector machines, multivariate time series clustering, Bayesian networks, artificial neural networks, and fuzzy time series. For each technique, an example paper applying that technique is summarized. A table provides a comparative analysis of the techniques based on predictive accuracy, performance, and disadvantages. The document concludes that the discussed data mining prediction techniques can enhance accuracy and performance of crime prediction by identifying patterns in current and past crime data to predict future values.
Avinash Kumar is a PhD candidate in electrical and computer engineering at the University of Illinois. His research focuses on camera calibration, computational imaging, and developing vision systems for analyzing freight trains. He has published papers on non-frontal camera calibration, depth from focus/defocus, and extracting shadow details from transmissive media. Kumar received his dual BTech and MS degrees from the International Institute of Information Technology and is advised by Professor Narendra Ahuja.
IRJET- Criminal Recognization in CCTV Surveillance VideoIRJET Journal
This document presents research on criminal recognition in CCTV surveillance videos using deep learning. It proposes a method where a user can upload faces of known criminals. When CCTV footage is recorded, the application will monitor for these faces. If a face is recognized, the CCTV camera will track the identified person through multiple cameras by alerting other cameras. The system segments video into images, acquires images, recognizes human faces, constructs motion flows between cameras to track individuals. Experimental results on a dataset show the system's ability to extract patterns from faces and cluster images of different angled faces. The system aims to identify criminals across surveillance camera networks.
Emergence Detection And Rescue Using Wireless Sensor NetworksIRJET Journal
This document describes a system that uses wireless sensor networks to help guide people to safety during emergencies. When an emergency occurs, sensors detect hazardous conditions and notify people in the area through their mobile devices. The system then provides navigation instructions to safely guide people out of the hazardous area while avoiding congestion. It considers alternative routes and ways to temporarily replace parts of routes. The proposed system aims to more efficiently evacuate an area during an emergency compared to existing systems that only focus on finding the safest individual path and do not account for potential congestion issues.
BIG DATA IN SMART CITIES: A SYSTEMATIC MAPPING REVIEWsarfraznawaz
Big data is an emerging area of research and its prospective applications in smart cities are extensively recognized. In this study, we provide a breadth-first review of the domain “Big Data in Smart Cities” by applying the formal research method of systematic mapping. We investigated the primary sources of publication, research growth, maturity level of the research area, prominent research themes, type of analytics applied, and the areas of smart cities where big data research is produced. Consequently, we identified that empirical research in the domain has been progressing since 2013. The IEEE Access journal and IEEE Smart Cities Conference are the leading sources of literature containing 10.34% and 13.88% of the publications, respectively. The current state of the research is semi-matured where research type of 46.15% of the publications is solution and experience, and contribution type of 60% of the publications is architecture, platform, and framework. Prescriptive is least whereas predictive is the most applied type of analytics in smart cities as it has been stated in 43.08% of the publications. Overall, 33.85%, 21.54%, 13.85%, 12.31%, 7.69%, 6.15%, and 4.61% of the research produced in the domain focused on smart transportation, smart environment, smart governance, smart healthcare, smart energy, smart education, and smart safety, respectively. Besides the requirement for producing validation and evaluation research in the areas of smart transportation and smart environment, there is a need for more research efforts in the areas of smart healthcare, smart governance, smart safety, smart education, and smart energy. Furthermore, the potential of prescriptive analytics in smart cities is also an area of research that needs to be explored.
A Study of Mobile User Movements Prediction Methods IJECEIAES
For a decade and more, the Number of smart phone users count increasing day by day. With the drastic improvements in Communication technologies, the prediction of future movements of mobile users needs also have important role. Various sectors can gain from this prediction. Communication management, City Development planning, and locationbased services are some of the fields that can be made more valuable with movement prediction. In this paper, we propose a study of several Location Prediction Techniques in the following areas.
IRJET- Application of MCNN in Object DetectionIRJET Journal
This document discusses using a multi-column convolutional neural network (MCNN) for object detection in videos. The MCNN approach is compared to other methods like CNN and HOG-BOW-Gray pooling and is shown to achieve over 95% accuracy for pedestrian detection. The document outlines extracting frames from videos, dividing images into regions, classifying regions using CNNs, and combining results to detect objects. The MCNN approach is concluded to be useful for applications like medical imaging due to its high detection accuracy.
PREDICTION OF STORM DISASTER USING CLOUD MAP-REDUCE METHODAM Publications
The document discusses prediction of storm disasters using the Cloud Map-Reduce method for stream data mining. It begins with background on spatial data mining and its tasks/techniques. Issues with spatial data mining are also outlined. Stream data mining and its importance for analyzing continuous data streams is then introduced. Common stream data processing methods are discussed, including Apache Storm, Kafka, Spark, Flink, MapReduce and Hadoop. The paper aims to predict storm disasters using stream data mining strategies like Cloud Map-Reduce to analyze spatial datasets in real-time.
Zhipeng Zhao is seeking a research-oriented position utilizing his 6 years of experience and 6 publications in computer vision, machine learning, and data mining. He holds a Ph.D. in Computer Science from Rutgers University where he focused on object recognition, motion analysis, and statistical modeling. He also has 2 years of industrial experience applying skills in Java, C/C++, and data mining technologies at IBM.
Presentation of PhD thesis on Location Data Fusion Alket Cecaj
The document outlines Alket Cecaj's doctoral thesis on using information fusion methods for location data analysis. The thesis will introduce data fusion methods and examine fusing location data from call detail records and social media for applications like event detection and description. It will analyze re-identifying anonymized call data records using fused social network data and address related privacy issues. The thesis will evaluate different data fusion techniques and their ability to improve detection of real-world events from aggregated location information.
The document proposes a wearable device that ensures child safety and assists visually impaired people by tracking their location. The device uses sensors like GPS, GSM, and ESP32 to detect the wearer's location and share it with caregivers. It aims to address limitations of existing systems by providing a cheaper design that is compatible with multiple platforms and uses GSM for reliable communication of alerts and location via SMS and email with a Google Maps link. The proposed device detects events using an accelerometer and tracks location every 10 minutes using GPS. It sends alerts to caregivers' phones in case of emergencies or when manually activated by an on-board button.
Charith Perera, Arkady Zaslavsky, Peter Christen, Michael Compton, and Dimitrios Georgakopoulos, Context-aware Sensor Search, Selection and Ranking Model for Internet of Things Middleware, Proceedings of the IEEE 14th International Conference on Mobile Data Management (MDM), Milan, Italy, June, 2013
Similar to Job_talk_edits_5_28_2023_edit_2_2_add_reference.pdf (20)
Digital Twins Computer Networking Paper Presentation.pptxaryanpankaj78
A Digital Twin in computer networking is a virtual representation of a physical network, used to simulate, analyze, and optimize network performance and reliability. It leverages real-time data to enhance network management, predict issues, and improve decision-making processes.
Null Bangalore | Pentesters Approach to AWS IAMDivyanshu
#Abstract:
- Learn more about the real-world methods for auditing AWS IAM (Identity and Access Management) as a pentester. So let us proceed with a brief discussion of IAM as well as some typical misconfigurations and their potential exploits in order to reinforce the understanding of IAM security best practices.
- Gain actionable insights into AWS IAM policies and roles, using hands on approach.
#Prerequisites:
- Basic understanding of AWS services and architecture
- Familiarity with cloud security concepts
- Experience using the AWS Management Console or AWS CLI.
- For hands on lab create account on [killercoda.com](https://killercoda.com/cloudsecurity-scenario/)
# Scenario Covered:
- Basics of IAM in AWS
- Implementing IAM Policies with Least Privilege to Manage S3 Bucket
- Objective: Create an S3 bucket with least privilege IAM policy and validate access.
- Steps:
- Create S3 bucket.
- Attach least privilege policy to IAM user.
- Validate access.
- Exploiting IAM PassRole Misconfiguration
-Allows a user to pass a specific IAM role to an AWS service (ec2), typically used for service access delegation. Then exploit PassRole Misconfiguration granting unauthorized access to sensitive resources.
- Objective: Demonstrate how a PassRole misconfiguration can grant unauthorized access.
- Steps:
- Allow user to pass IAM role to EC2.
- Exploit misconfiguration for unauthorized access.
- Access sensitive resources.
- Exploiting IAM AssumeRole Misconfiguration with Overly Permissive Role
- An overly permissive IAM role configuration can lead to privilege escalation by creating a role with administrative privileges and allow a user to assume this role.
- Objective: Show how overly permissive IAM roles can lead to privilege escalation.
- Steps:
- Create role with administrative privileges.
- Allow user to assume the role.
- Perform administrative actions.
- Differentiation between PassRole vs AssumeRole
Try at [killercoda.com](https://killercoda.com/cloudsecurity-scenario/)
VARIABLE FREQUENCY DRIVE. VFDs are widely used in industrial applications for...PIMR BHOPAL
Variable frequency drive .A Variable Frequency Drive (VFD) is an electronic device used to control the speed and torque of an electric motor by varying the frequency and voltage of its power supply. VFDs are widely used in industrial applications for motor control, providing significant energy savings and precise motor operation.
Build the Next Generation of Apps with the Einstein 1 Platform.
Rejoignez Philippe Ozil pour une session de workshops qui vous guidera à travers les détails de la plateforme Einstein 1, l'importance des données pour la création d'applications d'intelligence artificielle et les différents outils et technologies que Salesforce propose pour vous apporter tous les bénéfices de l'IA.
Applications of artificial Intelligence in Mechanical Engineering.pdfAtif Razi
Historically, mechanical engineering has relied heavily on human expertise and empirical methods to solve complex problems. With the introduction of computer-aided design (CAD) and finite element analysis (FEA), the field took its first steps towards digitization. These tools allowed engineers to simulate and analyze mechanical systems with greater accuracy and efficiency. However, the sheer volume of data generated by modern engineering systems and the increasing complexity of these systems have necessitated more advanced analytical tools, paving the way for AI.
AI offers the capability to process vast amounts of data, identify patterns, and make predictions with a level of speed and accuracy unattainable by traditional methods. This has profound implications for mechanical engineering, enabling more efficient design processes, predictive maintenance strategies, and optimized manufacturing operations. AI-driven tools can learn from historical data, adapt to new information, and continuously improve their performance, making them invaluable in tackling the multifaceted challenges of modern mechanical engineering.
Advanced control scheme of doubly fed induction generator for wind turbine us...IJECEIAES
This paper describes a speed control device for generating electrical energy on an electricity network based on the doubly fed induction generator (DFIG) used for wind power conversion systems. At first, a double-fed induction generator model was constructed. A control law is formulated to govern the flow of energy between the stator of a DFIG and the energy network using three types of controllers: proportional integral (PI), sliding mode controller (SMC) and second order sliding mode controller (SOSMC). Their different results in terms of power reference tracking, reaction to unexpected speed fluctuations, sensitivity to perturbations, and resilience against machine parameter alterations are compared. MATLAB/Simulink was used to conduct the simulations for the preceding study. Multiple simulations have shown very satisfying results, and the investigations demonstrate the efficacy and power-enhancing capabilities of the suggested control system.
Comparative analysis between traditional aquaponics and reconstructed aquapon...bijceesjournal
The aquaponic system of planting is a method that does not require soil usage. It is a method that only needs water, fish, lava rocks (a substitute for soil), and plants. Aquaponic systems are sustainable and environmentally friendly. Its use not only helps to plant in small spaces but also helps reduce artificial chemical use and minimizes excess water use, as aquaponics consumes 90% less water than soil-based gardening. The study applied a descriptive and experimental design to assess and compare conventional and reconstructed aquaponic methods for reproducing tomatoes. The researchers created an observation checklist to determine the significant factors of the study. The study aims to determine the significant difference between traditional aquaponics and reconstructed aquaponics systems propagating tomatoes in terms of height, weight, girth, and number of fruits. The reconstructed aquaponics system’s higher growth yield results in a much more nourished crop than the traditional aquaponics system. It is superior in its number of fruits, height, weight, and girth measurement. Moreover, the reconstructed aquaponics system is proven to eliminate all the hindrances present in the traditional aquaponics system, which are overcrowding of fish, algae growth, pest problems, contaminated water, and dead fish.
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...IJECEIAES
Medical image analysis has witnessed significant advancements with deep learning techniques. In the domain of brain tumor segmentation, the ability to
precisely delineate tumor boundaries from magnetic resonance imaging (MRI)
scans holds profound implications for diagnosis. This study presents an ensemble convolutional neural network (CNN) with transfer learning, integrating
the state-of-the-art Deeplabv3+ architecture with the ResNet18 backbone. The
model is rigorously trained and evaluated, exhibiting remarkable performance
metrics, including an impressive global accuracy of 99.286%, a high-class accuracy of 82.191%, a mean intersection over union (IoU) of 79.900%, a weighted
IoU of 98.620%, and a Boundary F1 (BF) score of 83.303%. Notably, a detailed comparative analysis with existing methods showcases the superiority of
our proposed model. These findings underscore the model’s competence in precise brain tumor localization, underscoring its potential to revolutionize medical
image analysis and enhance healthcare outcomes. This research paves the way
for future exploration and optimization of advanced CNN models in medical
imaging, emphasizing addressing false positives and resource efficiency.
Gas agency management system project report.pdfKamal Acharya
The project entitled "Gas Agency" is done to make the manual process easier by making it a computerized system for billing and maintaining stock. The Gas Agencies get the order request through phone calls or by personal from their customers and deliver the gas cylinders to their address based on their demand and previous delivery date. This process is made computerized and the customer's name, address and stock details are stored in a database. Based on this the billing for a customer is made simple and easier, since a customer order for gas can be accepted only after completing a certain period from the previous delivery. This can be calculated and billed easily through this. There are two types of delivery like domestic purpose use delivery and commercial purpose use delivery. The bill rate and capacity differs for both. This can be easily maintained and charged accordingly.
Discover the latest insights on Data Driven Maintenance with our comprehensive webinar presentation. Learn about traditional maintenance challenges, the right approach to utilizing data, and the benefits of adopting a Data Driven Maintenance strategy. Explore real-world examples, industry best practices, and innovative solutions like FMECA and the D3M model. This presentation, led by expert Jules Oudmans, is essential for asset owners looking to optimize their maintenance processes and leverage digital technologies for improved efficiency and performance. Download now to stay ahead in the evolving maintenance landscape.
1. Overview of My Industrial and Academic
Experience
Varun Garg
Department of Electrical and Computer Engineering
University of Massachusetts Lowell
2. About Myself
• Currently working as an Algorithm Engineer at Veoneer
• Completed my Ph.D. in computer engineering at University of
Massachusetts Lowell
• Research Interest: Data science and Signal Processing.
• Radar Signal Processing: Single Vehicle Tracking, Multiple Vehicle
tracking using Radar Measurements, Familiar with Detection List,
Measurement Clustering
• Specialized domains: Machine learning, Tracking, State estimation,
probabilistic modeling, Trajectory data mining
• Programming languages: Python, Matlab, C++, R, Java
• Deep learning Packages: Pytorch, Keras, Tensorflow, and Scikit-learn
2
3. Summary
• My academic and industrial experience focuses on utilizing sensor
data to analyze Spatio-Temporal (ST) phenomena
• ST phenomena: a phenomenon in a certain location and time such
as road conditions (static), trajectory of a vehicle (dynamic), etc
• The presented work focuses on utilizing sensors owned by common
public for development inexpensive monitoring applications.
3
4. Outline of Presentation
1 Industrial Experience: Data Science Internships
2 Introduction to My Academic Experience
Motivation
Problem Formulation
3 PART 1: Using Participatory Sensing for Identification of Static ST
Phenomena
4 PART 2: Collaborative Identification & Tracking of Dynamic ST
Phenomena
5 PART 3: Understanding a Situation Happening in an Operational
Environment
6 Publications
4
6. Data Science Internship: Veoneer, 2019:
Developing Object Detection Pipeline With Yolo
• Developed data-processing modules of ML pipeline and
tested Yolo Object detector on GPU Servers
Figure 1: Pedestrian Detection. Figure Credits [1]
5
7. Machine Learning Internship: Veoneer, 2020:
Multi-level Unsupervised Machine Learning
• Developed a framework of Unsupervised ML for processing
GPS trajectories at different granular levels
• Implemented methods for performing multi-sensor data
fusion on the processed data.
Figure 2: Trajectory Data Processing [2]
6
9. Objectives of My Academic Work
• My work focuses on analyzing sensor data to study different types of
Spatio temporal Phenomena
• Static ST phenomena does not change much in a short period of time,
e.g., road conditions, maps, roads, facilities, etc
• Dynamic ST phenomena can change within a short period of time, e.g.,
vehicle trajectory, etc.
• Participatory Sensing: individuals participating in sensing tasks when they
are available (often using their own sensing devices, such as phones,
vehicles, etc.)
• My work focuses on answering the following research questions:
• [Q1-Q2]: How can we identify static Dynamic ST phenomena respectively
using participatory sensing?
• [Q3]: How can we make sense of or understand a situation happening in
an operational environment?
• My research findings on [Q1] – [Q3] are organized under three parts.
7
10. MOTIVATION: Why Should We Care?:
Improve Maintenance/Recovery Efforts
Figure 3: Participatory sensing utilized for effective monitoring and
surveillance. Figure Credits (Ushahidi)
8
11. Why Should We Care?: Crime Prediction
• Mohler, G. O., M. B. Short, Sean Malinowski, Mark Johnson, G. E. Tita, Andrea L.
Bertozzi, and P. J. Brantingham. “Randomized Controlled Field Trials of Predictive
Policing.” Journal of the American Statistical Association 2015:
Figure 4: UCLA study shows predictive policing algorithms are successful in
the prediction of crime. Figure Credits (Predpol).
9
12. ST Phenomena: Examples & Types
1 Static ST Phenomena may not change in a short period of time, such as road
conditions, cartographic maps, roads, facilities, and utilities
2 Dynamic ST Phenomena changes in a short period of time, such as the
trajectory of a vehicle
10
15. PART 1: Using Participatory
Sensing for Identification of
Static ST Phenomena
16. Overview
• Road conditions were considered as the static ST phenomena
• Since road conditions do not change for multiple weeks, we can utilize data from
multiple participants collected at different times
Figure 5: Figure Credits [3] 13
18. Conclusion: Identification of ST Phenomena
• We presented the potential of ML based methods with a specific application
example to identify ST phenomena by using data from multiple participants
• The outcomes of this research are published in the following peer-reviewed
publications:
• Varun Garg, Brooks Saunders and Thanuka Wickramarathne, “Situational
Awareness with Ubiquitous Sensing: The Case of Robust Detection and
Classification of Targets in Close Proximity,” in Proc. Int. Conf. on
Information Fusion (FUSION), pp. 1-8, 2019.
• Thanuka Wickramarathne, Varun Garg and Peter Bauer, ”On the Use of
3-D Accelerometers for Road Quality Assessment,” in Proc. IEEE 87th
Vehicular Technology Conference (VTC Spring), pp. 1-5, 2018.
15
20. Overview: Collaborative Identification & Tracking
Dynamic ST Phenomena
• Trajectory of a target vehicle is considered as Dynamic ST Phenomenon
• Participatory vehicle only sniffs the RF emission from the target vehicle
• Target vehicle is not communicating with the participatory vehicle
16
21. Approach
• The Block Range from RSSI is beyond the scope of this thesis
• Assuming that the ranges are provided to the sensing system
• We focus on blocks Range Filter & Target Position Localization
17
22. Experiment Scenarios
• Simulated in SUMO
• Average Target vehicle speed ≈ 7-30 miles/hour
• Sampling rate Fs = 10Hz
• Lane changes are allowed
• Scenarios:
• Different Urban scenario with traffic lights, and turn were simulated
18
23. Conclusion: Collaborative Identification & Tracking of
Dynamic ST Phenomena
• We presented a novel method for range-based target vehicle localization using
RF emissions collected by participatory vehicles.
• Participatory sensing based methods can be utilized for developing new driver
assistance systems
• Results of this research were presented following publications:
• Varun Garg and Thanuka Wickramarathne, “A Unknown Vehicle Discovery,
Localization and Tracking via Signals of Opportunity with Encoder-Decoder Networks
for Trajectory Prediction Under Signal Decay/Loss,” in Proc. IEEE Systems, Man,
and Cybernetics Society (SMC), March 2022, Accepted
• A. Wyglinksi, T. Wickramarathne, D. Chen, N. Kirsch, K. Gill, T. Jain, Varun Garg,
T. Li, S. Paul, and X. Zhang, “Phantom Car Attack Detection Via Passive
Opportunistic RF Localization,” IEEE Access, 2023
19
25. Overview
Figure 6: Figure Inspired from [4, 5]
• Basic Terminology
• Observation: sensor output having time, event signature & location
• Signature: an indicator of an event, e.g., loud sound
• Event: a singular activity related to an underlying situation, e.g., shouting
• Situation: described by a sequence of events, e.g., a protest 20
26. My Approach
Signature
Identification
Location
Data
HDS Data
Streams
Open Source
Data
Observations
for
𝜏
k
Spatial
Clustering
Anchor
Points
Generation Gating
Event-Set
Identification
Model
Event-Set
output for 𝜏k-1
Event-Set
output for 𝜏k
Situation
Prediction
Model
Predicted
Situation ID
Historical Data
Automated
Information Retrieval
Training Set for Event-Set
Identification and Scenario Prediction
Data Pre-Processing Cluster Evolution Event-Set Identification Situation Prediction
21
27. Conclusion: Understand a Situation Happening in an
Operational Environment
• We have demonstrated the potential of ML methods in the surveillance domain
• Use of participatory sensing will likely have a major impact on surveillance
applications
• Outcomes of this research are published in the following peer-reviewed
publications:
• Varun Garg and T. L. Wickramarathne, ”ENSURE: A Deep Learning Approach for
Enhancing Situational Awareness in Surveillance Applications With Ubiquitous
High-Dimensional Sensing,” in IEEE Journal of Selected Topics in Signal Processing,
vol. 16, no. 4, pp. 869-878, June 2022
• Varun Garg, Brooks Saunders, and Thanuka Wickramarathne,”Making Sense of It All:
Measurement Cluster Sequencing for Enhanced Situational Awareness with Ubiquitous
Sensing,”in Proc. Int. Conf. on Information Fusion (FUSION), pp. 1-7, 2021.
• Brooks Saunders, Varun Garg and Thanuka Wickramarathne, ”Simulated Evaluation
of Ubiquitous Sensed Situational Awareness Systems, ”in Proc. Int. Conf. on
Information Fusion (FUSION), pp. 1-7, 2019.
22
29. Peer-Reviewed Publications: Conferences
Published:
• Varun Garg, Brooks Saunders, and Thanuka Wickramarathne,”Making Sense of It All:
Measurement Cluster Sequencing for Enhanced Situational Awareness with Ubiquitous
Sensing,”in Proc. Int. Conf. on Information Fusion (FUSION), pp. 1-7, 2021.
• Varun Garg, Brooks Saunders and Thanuka Wickramarathne, “Situational Awareness with
Ubiquitous Sensing: The Case of Robust Detection and Classification of Targets in Close
Proximity,” in Proc. Int. Conf. on Information Fusion (FUSION), pp. 1-8, 2019.
• Brooks Saunders, Varun Garg and Thanuka Wickramarathne, ”Simulated Evaluation of
Ubiquitous Sensed Situational Awareness Systems, ”in Proc. Int. Conf. on Information
Fusion (FUSION), pp. 1-7, 2019.
• Thanuka Wickramarathne, Varun Garg and Peter Bauer, “On the Use of 3-D
Accelerometers for Road Quality Assessment,” in Proc. IEEE 87th Vehicular Technology
Conference (VTC Spring), pp. 1-5, 2018.
23
30. Peer-Reviewed Publications: Journals
Published:
• Varun Garg and T. L. Wickramarathne, ”ENSURE: A Deep Learning Approach
for Enhancing Situational Awareness in Surveillance Applications With
Ubiquitous High-Dimensional Sensing,” in IEEE Journal of Selected Topics in
Signal Processing, vol. 16, no. 4, pp. 869-878, June 2022
• A. Wyglinksi, T. Wickramarathne, D. Chen, N. Kirsch, K. Gill, T. Jain, Varun
Garg, T. Li, S. Paul, and X. Zhang, “Phantom Car Attack Detection Via Passive
Opportunistic RF Localization,” IEEE Access, Jan, 2023
24
31. References i
B. Ghari, A. Tourani, and A. Shahbahrami, “A robust pedestrian
detection approach for autonomous vehicles,” 10 2022.
Y. Zheng, “Methodologies for cross-domain data fusion: An
overview,” IEEE Transactions on Big Data, vol. 1, no. 1, pp. 16–34,
2015.
J. Ahn, Y. Wang, B. Yu, F. Bai, and B. Krishnamachari, “Risa:
Distributed road information sharing architecture,” 2012 Proceedings
IEEE INFOCOM, pp. 1494–1502, 2012.
S. A. Shah, D. Z. Seker, S. Hameed, and D. Draheim, “The rising
role of big data analytics and IoT in disaster management: Recent
advances, taxonomy and prospects,” IEEE Access, vol. 7,
pp. 54595–54614, 2019.
25
32. References ii
Mauro Di Pietro, “Clustering geospatial data.”
https://towardsdatascience.com/
clustering-geospatial-data-f0584f0b04ec, 2020.
”Accessed: 2021-01-06”.
26