Artificial Intelligence

This is a subset of the ASHRAE Global Comfort Database that we used in our study to prove that Deep learning methods performs better than shallow methods predicting the thermal sensation.


This paper describes the creation of the Massive Arabic Speech Corpus (MASC). MASC is a dataset that contains 1,000 hours of speech sampled at 16 kHz and crawled from over 700 YouTube channels. The dataset is multi-regional, multi-genre, and multi-dialect intended to advance the research and development of Arabic speech technology with a special emphasis on Arabic speech recognition. In addition to MASC, a pre-trained 3-gram language model and a pre-trained automatic speech recognition model are also developed and made available to interested researchers.


Owing to increased biosecurity and industrial demands, the poultry houses in Taiwan are generally nonopen and closed types, with automatic environmental control and sensor equipment gradually being installed in such houses. Environmental sensors and poultry health monitoring systems are necessary to improve poultry feeding efficiency and safety. In this work, we developed a goose surface temperature monitoring system based on deep learning using visible image and integrated with infrared thermal image.


The network attacks are increasing both in frequency and intensity with the rapid growth of internet of things (IoT) devices. Recently, denial of service (DoS) and distributed denial of service (DDoS) attacks are reported as the most frequent attacks in IoT networks. The traditional security solutions like firewalls, intrusion detection systems, etc., are unable to detect the complex DoS and DDoS attacks since most of them filter the normal and attack traffic based upon the static predefined rules.


This code and related data is related to research work on quantified benchmarking of Reconfigurable Intelligent Surface (RIS). Related research article has been submitted to VTM titled "Reconfigurable Intelligent Surfaces: Tradeoff between Unit-Cell- and Surface-Level Design under Quantifiable Benchmarks". 'ReadMe.text' file in '' explains how to use the code to generate RIS configurations for RIS of arbitrary size and unit cell design, which can accomodate restricting to certain size grouped control.


Any work using this dataset should cite this paper as follows:

Nirmalya Thakur and Chia Y. Han, "Country-Specific Interests towards Fall Detection from 2004–2021: An Open Access Dataset and Research Questions", Journal of Data, Volume 6, Issue 8, pp. 1-21, 2021.



The Internet of things (IoT) has emerged as a topic of intense interest among the research and industrial community as it has had a revolutionary impact on human life. The rapid growth of IoT technology has revolutionized human life by inaugurating the concept of smart devices, smart healthcare, smart industry, smart city, smart grid, among others. IoT devices’ security has become a serious concern nowadays, especially for the healthcare domain, where recent attacks exposed damaging IoT security vulnerabilities. Traditional network security solutions are well established.




Electric utilities collect imagery and video to inspect transmission and distribution infrastructure.  Utilities use this information to identify infrastructure defects and prioritize maintenance decisions.  The ability to collect these data is quickly outpacing the ability to analyze it.   Today’s data interpretation solutions rely on human-in-the-loop workflows.  This is time consuming, costly, and inspection quality can be subjective.  It’s likely some of these inspection tasks can be automated by leveraging machine learning techniques and artificial intelligence.

Last Updated On: 
Mon, 03/27/2023 - 18:09
Citation Author(s): 
P. Kulkarni, D. Lewis, J. Renshaw

Liver tumor segmentation.


<p>There is presently no solution to the problem of an autonomous bulldozer pushing mounds of material to desired goal locations in the presence of obstacles whilst obeying the kinematic constraints of the bulldozer. Past work has solved some aspects of this problem, but not all. This research presents the first complete, practical solution to the problem. It works by creating a fixed RRT in advance, and then during operation connecting pushing poses into this RRT using Bezier curves.