Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Theses/Dissertations

Computer Engineering

University of Kentucky

Deep Learning

Articles 1 - 2 of 2

Full-Text Articles in Engineering

A Flexible Photonic Reduction Network Architecture For Spatial Gemm Accelerators For Deep Learning, Bobby Bose Jan 2023

A Flexible Photonic Reduction Network Architecture For Spatial Gemm Accelerators For Deep Learning, Bobby Bose

Theses and Dissertations--Electrical and Computer Engineering

As deep neural network (DNN) models increase significantly in complexity and size, it has become important to increase the computing capability of specialized hardware architectures typically used for DNN processing. The major linear operations of DNNs, which comprise the fully connected and convolution layers, are commonly converted into general matrix-matrix multiplication (GEMM) operations for acceleration. Specialized GEMM accelerators are typically employed to implement these GEMM operations, where a GEMM operation is decomposed into multiple vector-dot-product operations that run in parallel. A common challenge that arises in modern DNNs is the mismatch between the matrices used for GEMM operations and the …


Deep Learning-Based Intrusion Detection Methods For Computer Networks And Privacy-Preserving Authentication Method For Vehicular Ad Hoc Networks, Ayesha Dina Jan 2023

Deep Learning-Based Intrusion Detection Methods For Computer Networks And Privacy-Preserving Authentication Method For Vehicular Ad Hoc Networks, Ayesha Dina

Theses and Dissertations--Computer Science

The incidence of computer network intrusions has significantly increased over the last decade, partially attributed to a thriving underground cyber-crime economy and the widespread availability of advanced tools for launching such attacks. To counter these attacks, researchers in both academia and industry have turned to machine learning (ML) techniques to develop Intrusion Detection Systems (IDSes) for computer networks. However, many of the datasets use to train ML classifiers for detecting intrusions are not balanced, with some classes having fewer samples than others. This can result in ML classifiers producing suboptimal results. In this dissertation, we address this issue and present …