{"title":"A Survey of Machine Learning Approach to Software Cost Estimation","authors":"Farhad Akhbardeh, H. Reza","doi":"10.1109/EIT51626.2021.9491912","DOIUrl":"https://doi.org/10.1109/EIT51626.2021.9491912","url":null,"abstract":"Software companies are growing fast every day due to the high demand for software, while software development cost increasing at the same time. In order to overcome this concern, we require an efficient technique for more accurately estimating software costs to manage and control the costs and further make the software more reliable and competitive. Software development by default is a challenging process that may face deep and essential problems especially when we trying to create accurate and reliable software cost estimates. These issues are strengthening due to the high level of difficulty, and complexity of the software process. The goal of this study is to address the difficulties of estimating the software development cost using conventional approaches. Further identifying the necessary steps for computable entities which affect the software cost and presenting the research works that utilize them with machine learning approaches to build a reliable estimation method. The various proposed software cost estimation methods with distinct designs assessed and collected outcomes reported.","PeriodicalId":162816,"journal":{"name":"2021 IEEE International Conference on Electro Information Technology (EIT)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114449183","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Teaching Vehicles to Steer Themselves with Deep Learning","authors":"Ian Timmis, Nicholas Paul, C. Chung","doi":"10.1109/EIT51626.2021.9491894","DOIUrl":"https://doi.org/10.1109/EIT51626.2021.9491894","url":null,"abstract":"Traditional approaches for steering a vehicle using machine vision require large amounts of robust hand-crafted software which is both time consuming and expensive. The presented method uses a deep neural network to teach cars to steer themselves without any additional software. We created a labeled dataset for the ACTor (Autonomous Campus TranspORt) electric vehicle by pairing real world images taken during a drive with the associated steering wheel angle. We trained a model end to end using modern deep learning techniques including convolutional neural networks and transfer learning to automatically detect relevant features in the input and provide a predicted output. This means that no traditional hand engineered algorithm features were required for this implementation. We currently use an pretrained inception network on the ImageNet dataset to leverage the high level features learned from ImageNet to the steering problem through transfer learning. We removed the top portion of the network and replaced it with a linear regression node to provide the output. The model is trained end to end using backpropagation. The trained model is integrated with vehicle software on ROS (Robot Operating System) to read image data and provide a corresponding steering angle in real time. The current model achieves 15.2 degree error on average. As development continues the model may replace the current lane centering software and will be used for IGVC Self-Drive competition and campus transportation.","PeriodicalId":162816,"journal":{"name":"2021 IEEE International Conference on Electro Information Technology (EIT)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122643772","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Neural Networks Battery Applications: A Review","authors":"Di Zhu, Gyouho Cho, J. Campbell","doi":"10.1109/EIT51626.2021.9491835","DOIUrl":"https://doi.org/10.1109/EIT51626.2021.9491835","url":null,"abstract":"Neural network battery applications have drawn tremendous attention. However, recent review papers fail to reflect the popularity of research activities in this area. In addition, neural networks like many other machine learning techniques are data dependent. One neural network architecture may have a much better performance than another architecture in terms of prediction accuracy for a specific application. Therefore, it is crucial to select the neural network architecture based on the available data and the purpose of the application. A review reporting the latest activities regarding neural network battery application is in demand. We selected representative publications from three popular areas: SOC estimation, SOH prediction, and parameter identification. We examined these publications from the aspects such as neural network architectures, inputs, outputs, data requirements, and cell chemistries. We also compared advantages and disadvantages among numerous neural network architectures. Three research trends were found in our study. First, the neural network architecture is getting more and more complex. The complexity comes from either structuring same or different neural networks together or combining the neural network with other techniques. Secondly, more research attention is moving toward the architectures that are suitable for time-dependent applications. For non-RNN architectures, averaged data is used as inputs. Averaging the data allows the past information to be learned by the non-RNN architectures. For RNNs, the past information is carried over by feeding back as either an input or a state. Last, although researchers always try to explore properties other than voltage, current, and temperature, the final selected inputs always have voltage, current and temperature. In addition, voltage is the most important one among these three inputs.","PeriodicalId":162816,"journal":{"name":"2021 IEEE International Conference on Electro Information Technology (EIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126448124","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design Flow and Implementation of an IoT Smart Power Socket","authors":"C. Mateo, Fernando Almagro, Won-Jae Yi, J. Saniie","doi":"10.1109/EIT51626.2021.9491841","DOIUrl":"https://doi.org/10.1109/EIT51626.2021.9491841","url":null,"abstract":"This paper presents the design and implementation of an IoT smart power socket. Its main function is to provide services such as remote control, electrical protection, task automations and monitoring through mobile applications using cloud services. In addition, this IoT smart power socket is supported by advanced software tools for time scheduling, grouping power sockets and their operation managements, and analyzing power usage for electric cost optimization. Our system can be used in different domains including smart and remote accessible home automation systems, factory automation systems, security systems and power usage management systems. Prototype of our power sockets are designed with locally controlled sensors and actuators, exchanging information with a common central hub using the Bluetooth protocol to receive commands and send information to the user via the Internet connection.","PeriodicalId":162816,"journal":{"name":"2021 IEEE International Conference on Electro Information Technology (EIT)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126486075","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security Issues of Mobile Devices: A Survey","authors":"Gary Helm, M. Chowdhury","doi":"10.1109/EIT51626.2021.9491840","DOIUrl":"https://doi.org/10.1109/EIT51626.2021.9491840","url":null,"abstract":"Mobile devices are being used more frequently and for more activities in daily life. Cell phones, for example are no longer being used only for communication. They have also become primary tools for business and financial use. Mobile devices are now a major target for attack and many users are unaware that they are even vulnerable. With these devices being used for more tasks involving sensitive information, it is important for users to be aware of these vulnerabilities. This paper aims to identify common attacks on these devices and describe methods to combat them. Bluetooth attacks will have a more in-depth examination covering various attacks on Bluetooth devices and the solutions, if any, to stop them.","PeriodicalId":162816,"journal":{"name":"2021 IEEE International Conference on Electro Information Technology (EIT)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125660403","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
J. S. Gill, Mahdi Saeedi Velashani, Jordan Wolf, Jonathan Kenney, M. R. Manesh, N. Kaabouch
{"title":"Simulation Testbeds and Frameworks for UAV Performance Evaluation","authors":"J. S. Gill, Mahdi Saeedi Velashani, Jordan Wolf, Jonathan Kenney, M. R. Manesh, N. Kaabouch","doi":"10.1109/EIT51626.2021.9491882","DOIUrl":"https://doi.org/10.1109/EIT51626.2021.9491882","url":null,"abstract":"Real-world performance evaluation of an Unmanned Aerial Vehicle (UAV) requires a considerable amount of time and resources. It is challenging to evaluate and make frequent changes to optimize UAV performance practically. Furthermore, some cyber-attack resistance evaluation tests for UAV networks, like jamming, are illegal to perform in most countries. Simulators are software that enable us to evaluate UAV performance without real-world practical implementation. Simulations make it possible to create, implement, and test scenarios virtually on a computer. There are many simulators available for UAV performance evaluation, but they all differ in functionality and use. It is essential to choose the right simulator based on the requirements and needs of the research. In this paper, we investigated, evaluated, and categorized available UAV simulators to make it easy to choose the right simulation software for UAV performance evaluation.","PeriodicalId":162816,"journal":{"name":"2021 IEEE International Conference on Electro Information Technology (EIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131060564","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Finite Element Simulation of Inkjet Printed Flexible Parallel Plate MIM Capacitors on Polyimide Film","authors":"Moriom R. Momota, Ankita Mohapatra, B. Morshed","doi":"10.1109/EIT51626.2021.9491846","DOIUrl":"https://doi.org/10.1109/EIT51626.2021.9491846","url":null,"abstract":"As the potential usage of flexible electronics inkjet printing (IJP) is rapidly growing in flexible electronics, we present a Finite Element Analysis (FEA) with electrostatic modeling of a Metal-Insulator-Metal (MIM) type parallel plate capacitor using COMSOL Multiphysics designed for application in flexible electronic circuits. In this study, silver was used as the conductive metal parallel plates and Poly(4-vinylphenol) (PVP) was used as the insulator material. We compared our simulated result with IJP parallel plate capacitors where the bottom and top plate was printed with JS B40 silver ink and dielectric layer was printed with PVP dielectric ink. We also compared our simulation results with ideal calculated capacitance values. Our simulated results are promising and matched closely with the calculated and experimental results from fabricated capacitances. We demonstrated the change of capacitance due to variance of design parameters, such as, the area of the capacitance. Our printed IJP capacitors provided us the capacitance in the range of 8.8 pF to 467 pF for capacitor area 1 to 36 mm, while the simulated capacitance range was recorded between 9 pF to 455 pF. For four coat PVP the minimum and maximum capacitance obtained from simulations were 13.3 pF and 455 pF for capacitor area 1 mm2 and 36 mm2 respectively. The simulated capacitances with six coat PVP were 9 pF and 310 pF for 1 mm2 and 36 mm2 capacitor area respectively. For flexible electronics devices like body-worn sensors, IJP electronic components will be significant in near future and this paper lays the key foundation for that endeavor.","PeriodicalId":162816,"journal":{"name":"2021 IEEE International Conference on Electro Information Technology (EIT)","volume":"69 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126974669","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Threat Assessment for avoiding collsions with perpendicular vehicles at Intersections","authors":"Ishan Tyagi","doi":"10.1109/EIT51626.2021.9491879","DOIUrl":"https://doi.org/10.1109/EIT51626.2021.9491879","url":null,"abstract":"This paper presents a method for estimating how the driver of a vehicle can use braking or acceleration to avoid the collision with a moving vehicle. Approach relies on a novel threat assessment module, which combines prediction and avoiding collision maneuver. We describe Braking Threat Number (BTN), Acceleration Threat Number (ATN), Deceleration Threat Number (DTN), and Steering Threat Number (STN). A collision avoidance by braking system, based on proposed method has been evaluated on simulated traffic scenarios at intersection. Our simulation shows that autonomous braking can be initiated 1 to 3 seconds before the potential collision. With this system the vehicle will have less impact collision.","PeriodicalId":162816,"journal":{"name":"2021 IEEE International Conference on Electro Information Technology (EIT)","volume":"164 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127281326","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Applications of Machine Learning in Fintech Credit Card Fraud Detection","authors":"Francisco Lacruz, J. Saniie","doi":"10.1109/EIT51626.2021.9491903","DOIUrl":"https://doi.org/10.1109/EIT51626.2021.9491903","url":null,"abstract":"Fintech utilizes innovative technology to offer improved monetary administrations and financial solutions. According to data from the prediction of Autonomous Research artificial intelligence (AI) technologies will allow financial institutions to reduce their operational costs by 22% by 2030. Throughout this paper, we study how AI and machine learning algorithms can lead to credit card fraud detection. After making the theoretical approach to the subject, we develop two different methods Autoencoder (semi-supervised learning) and Logistic Regression (supervised learning) for fraud detection with a high level of accuracy. The results obtained with both methods are promising as we were able to predict fraud transactions with 94% certainty.","PeriodicalId":162816,"journal":{"name":"2021 IEEE International Conference on Electro Information Technology (EIT)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130482424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Comparison of data mining algorithms in remote sensing using Lidar data fusion and feature selection","authors":"Papia F. Rozario, Rahul Gomes","doi":"10.1109/EIT51626.2021.9491878","DOIUrl":"https://doi.org/10.1109/EIT51626.2021.9491878","url":null,"abstract":"Application of data mining techniques defines the basis of land use classification. Even though multispectral images can be very accurate in classifying land cover categories, using spectral reflectivity alone sometimes fails to distinguish between landcover types that share similar spectral signatures such as forest and wetlands. The problem aggravates owing to interpolation of neighbourhood pixel values. In this paper, we present a comparison of four classification and clustering algorithms and analyze their performance. These algorithms are applied both on spectral reflectivity values alone and along with Lidar data fusion. Experiments were performed in the Carlton County of Minnesota. Accuracy estimation was conducted for all models. Experiments indicate that accuracy increases when Lidar data is used to complement the spectral reflectivity values. Random Forest Classification and Support Vector Machines yield good results consistently due to their ensemble learning methods and the ability to represent non-linear relationship in the dataset, respectively. Maximum likelihood shows significant improvement with Lidar data fusion and ISODATA clustering approach has the lowest accuracy rate.","PeriodicalId":162816,"journal":{"name":"2021 IEEE International Conference on Electro Information Technology (EIT)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121262172","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}