Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Digital libraries (17)
- Machine learning (14)
- Deep learning (11)
- Information retrieval (9)
- Metadata (8)
-
- Web archiving (8)
- World Wide Web (8)
- Blockchain (7)
- Digital preservation (7)
- Cybersecurity (6)
- Information dissemination (6)
- Security (6)
- Sensor networks (6)
- Interoperability (5)
- Telecommunications (5)
- Web archives (5)
- Websites (5)
- Computer science (4)
- Computer simulation (4)
- Documents (4)
- Engineering (4)
- Information systems (4)
- IoT (4)
- Natural language processing (4)
- OAI-PMH (4)
- Online systems (4)
- Vehicular ad hoc networks (Computer networks) (4)
- Web sites (4)
- Artificial intelligence (3)
- Big data (3)
- Publication Year
- Publication
-
- Computer Science Faculty Publications (47)
- Computer Science Theses & Dissertations (38)
- Electrical & Computer Engineering Theses & Dissertations (25)
- Computational Modeling & Simulation Engineering Theses & Dissertations (20)
- Computational Modeling & Simulation Engineering Faculty Publications (19)
-
- Cybersecurity Undergraduate Research Showcase (19)
- Electrical & Computer Engineering Faculty Publications (15)
- VMASC Publications (11)
- Modeling, Simulation and Visualization Student Capstone Conference (9)
- Engineering Management & Systems Engineering Faculty Publications (8)
- Engineering Technology Faculty Publications (4)
- Computer Science Presentations (3)
- Information Technology & Decision Sciences Faculty Publications (3)
- Computer Ethics - Philosophical Enquiry (CEPE) Proceedings (2)
- Engineering Management & Systems Engineering Theses & Dissertations (2)
- Mechanical & Aerospace Engineering Theses & Dissertations (2)
- School of Cybersecurity Faculty Publications (2)
- Civil & Environmental Engineering Theses & Dissertations (1)
- Distance Learning Faculty & Staff Books (1)
- OUR Journal: ODU Undergraduate Research Journal (1)
- Teaching & Learning Faculty Publications (1)
- The Journal of Sociotechnical Critique (1)
- Publication Type
Articles 31 - 60 of 234
Full-Text Articles in Computer Engineering
Cyber Deception For Critical Infrastructure Resiliency, Md Ali Reza Al Amin
Cyber Deception For Critical Infrastructure Resiliency, Md Ali Reza Al Amin
Computational Modeling & Simulation Engineering Theses & Dissertations
The high connectivity of modern cyber networks and devices has brought many improvements to the functionality and efficiency of networked systems. Unfortunately, these benefits have come with many new entry points for attackers, making systems much more vulnerable to intrusions. Thus, it is critically important to protect cyber infrastructure against cyber attacks. The static nature of cyber infrastructure leads to adversaries performing reconnaissance activities and identifying potential threats. Threats related to software vulnerabilities can be mitigated upon discovering a vulnerability and-, developing and releasing a patch to remove the vulnerability. Unfortunately, the period between discovering a vulnerability and applying a …
Applied Deep Learning: Case Studies In Computer Vision And Natural Language Processing, Md Reshad Ul Hoque
Applied Deep Learning: Case Studies In Computer Vision And Natural Language Processing, Md Reshad Ul Hoque
Electrical & Computer Engineering Theses & Dissertations
Deep learning has proved to be successful for many computer vision and natural language processing applications. In this dissertation, three studies have been conducted to show the efficacy of deep learning models for computer vision and natural language processing. In the first study, an efficient deep learning model was proposed for seagrass scar detection in multispectral images which produced robust, accurate scars mappings. In the second study, an arithmetic deep learning model was developed to fuse multi-spectral images collected at different times with different resolutions to generate high-resolution images for downstream tasks including change detection, object detection, and land cover …
Adaptive Risk Network Dependency Analysis Of Complex Hierarchical Systems, Katherine L. Smith
Adaptive Risk Network Dependency Analysis Of Complex Hierarchical Systems, Katherine L. Smith
Computational Modeling & Simulation Engineering Theses & Dissertations
Recently the number, variety, and complexity of interconnected systems have been increasing while the resources available to increase resilience of those systems have been decreasing. Therefore, it has become increasingly important to quantify the effects of risks and the resulting disruptions over time as they ripple through networks of systems. This dissertation presents a novel modeling and simulation methodology which quantifies resilience, as impact on performance over time, and risk, as the impact of probabilistic disruptions. This work includes four major contributions over the state-of-the-art which are: (1) cyclic dependencies are captured by separation of performance variables into layers which …
Evaluation Of Generative Models For Predicting Microstructure Geometries In Laser Powder Bed Fusion Additive Manufacturing, Andy Ramlatchan
Evaluation Of Generative Models For Predicting Microstructure Geometries In Laser Powder Bed Fusion Additive Manufacturing, Andy Ramlatchan
Computer Science Theses & Dissertations
In-situ process monitoring for metals additive manufacturing is paramount to the successful build of an object for application in extreme or high stress environments. In selective laser melting additive manufacturing, the process by which a laser melts metal powder during the build will dictate the internal microstructure of that object once the metal cools and solidifies. The difficulty lies in that obtaining enough variety of data to quantify the internal microstructures for the evaluation of its physical properties is problematic, as the laser passes at high speeds over powder grains at a micrometer scale. Imaging the process in-situ is complex …
The Message Design Of Raiders Of The Lost Ark On The Atari 2600 & A Fan’S Map, Quick Start, And Strategy Guide, Miguel Ramlatchan, William I. Ramlatchan
The Message Design Of Raiders Of The Lost Ark On The Atari 2600 & A Fan’S Map, Quick Start, And Strategy Guide, Miguel Ramlatchan, William I. Ramlatchan
Distance Learning Faculty & Staff Books
The message design and human performance technology in video games, especially early video games have always been fascinating to me. From an instructional design perspective, the capabilities of the technology of the classic game consoles required a careful balance of achievable objectives, cognitive task analysis, guided problem solving, and message design. Raiders on the Atari is an excellent example of this balance. It is an epic adventure game, spanning 13+ distinct areas, with an inventory of items, where those hard to find items had to be used by the player to solve problems during their quest (and who would have …
Runtime Energy Savings Based On Machine Learning Models For Multicore Applications, Vaibhav Sundriyal, Masha Sosonkina
Runtime Energy Savings Based On Machine Learning Models For Multicore Applications, Vaibhav Sundriyal, Masha Sosonkina
Electrical & Computer Engineering Faculty Publications
To improve the power consumption of parallel applications at the runtime, modern processors provide frequency scaling and power limiting capabilities. In this work, a runtime strategy is proposed to maximize energy savings under a given performance degradation. Machine learning techniques were utilized to develop performance models which would provide accurate performance prediction with change in operating core-uncore frequency. Experiments, performed on a node (28 cores) of a modern computing platform showed significant energy savings of as much as 26% with performance degradation of as low as 5% under the proposed strategy compared with the execution in the unlimited power case.
Data-Driven Framework For Understanding & Modeling Ride-Sourcing Transportation Systems, Bishoy Kelleny
Data-Driven Framework For Understanding & Modeling Ride-Sourcing Transportation Systems, Bishoy Kelleny
Civil & Environmental Engineering Theses & Dissertations
Ride-sourcing transportation services offered by transportation network companies (TNCs) like Uber and Lyft are disrupting the transportation landscape. The growing demand on these services, along with their potential short and long-term impacts on the environment, society, and infrastructure emphasize the need to further understand the ride-sourcing system. There were no sufficient data to fully understand the system and integrate it within regional multimodal transportation frameworks. This can be attributed to commercial and competition reasons, given the technology-enabled and innovative nature of the system. Recently, in 2019, the City of Chicago the released an extensive and complete ride-sourcing trip-level data for …
Deapsecure Computational Training For Cybersecurity: Third-Year Improvements And Impacts, Bahador Dodge, Jacob Strother, Rosby Asiamah, Karina Arcaute, Wirawan Purwanto, Masha Sosonkina, Hongyi Wu
Deapsecure Computational Training For Cybersecurity: Third-Year Improvements And Impacts, Bahador Dodge, Jacob Strother, Rosby Asiamah, Karina Arcaute, Wirawan Purwanto, Masha Sosonkina, Hongyi Wu
Modeling, Simulation and Visualization Student Capstone Conference
The Data-Enabled Advanced Training Program for Cybersecurity Research and Education (DeapSECURE) was introduced in 2018 as a non-degree training consisting of six modules covering a broad range of cyberinfrastructure techniques, including high performance computing, big data, machine learning and advanced cryptography, aimed at reducing the gap between current cybersecurity curricula and requirements needed for advanced research and industrial projects. By its third year, DeapSECURE, like many other educational endeavors, experienced abrupt changes brought by the COVID-19 pandemic. The training had to be retooled to adapt to fully online delivery. Hands-on activities were reformatted to accommodate self-paced learning. In this paper, …
Cova Cci Undergrad Cyber Research, Nana Jeffrey
Cova Cci Undergrad Cyber Research, Nana Jeffrey
Cybersecurity Undergraduate Research Showcase
Is your digital assistant your worst enemy? Modern technology has impacted our lives in a positive way making tasks that were once time consuming become more convenient. For example a few years ago writing down your grocery list with a paper and pen was a norm, now with technology we have access to IoT devices such as smart fridges that can inform us on what items are low in stock, send a message to our digital assistants such as iOS Siri and Amazon's Alexa to remind us to buy those groceries. Although these digital assistants have helped make our daily …
Ransombuster Iot: A Intrusion Detection And Dataset Creation Tool For Ransomware Attacks Within Iot Networks, Jackson M. Walker
Ransombuster Iot: A Intrusion Detection And Dataset Creation Tool For Ransomware Attacks Within Iot Networks, Jackson M. Walker
Cybersecurity Undergraduate Research Showcase
The proposed research follows the design-science guidelines(Hevner, 2004). This paper uses these design-science methods for developing the guidelines for the implementation of the proposed architecture, understanding previous research contributions, and evaluating of research. This paper proposes a network artifact for studying ransomware IoT intrusion detection techniques and offers a proposed network architecture to serve as a framework for creating a publicly available dataset for IoT research on ransomware.
Spectrum Sensing With Energy Detection In Multiple Alternating Time Slots, Călin Vlădeanu, Alexandru Marţian, Dimitrie C. Popescu
Spectrum Sensing With Energy Detection In Multiple Alternating Time Slots, Călin Vlădeanu, Alexandru Marţian, Dimitrie C. Popescu
Electrical & Computer Engineering Faculty Publications
Energy detection (ED) represents a low complexity approach used by secondary users (SU) to sense spectrum occupancy by primary users (PU) in cognitive radio (CR) systems. In this paper, we present a new algorithm that senses the spectrum occupancy by performing ED in K consecutive sensing time slots starting from the current slot and continuing by alternating before and after the current slot. We consider a PU traffic model specified in terms of an average duty cycle value, and derive analytical expressions for the false alarm probability (FAP) and correct detection probability (CDP) for any value of K . Our …
Corporate Cybersecurity In The Context Of M&A Transactions, Cameron Beck
Corporate Cybersecurity In The Context Of M&A Transactions, Cameron Beck
Cybersecurity Undergraduate Research Showcase
The rapid rise of digital devices has unlocked a new dimension of innovation and prosperity in the 21st century. Computers are now an integrated and ubiquitous part of our global culture. You would be hard-pressed to walk into any given room without several computer chips humming inaudibly inside the machines that facilitate our modern world. Even lightbulbs and doorbells are connected to the Internet, capturing information from the world around them and sending that information to the Cloud. The Internet expands access to communication, international marketplaces, entertainment, professional resources, and nearly every book in the world.
Modeling Iot Solutions: A Lack Of Iot Device Security, And User Education, Benjamin Newlin
Modeling Iot Solutions: A Lack Of Iot Device Security, And User Education, Benjamin Newlin
Cybersecurity Undergraduate Research Showcase
The Internet of Things, more commonly known as IoT devices, is an ever growing topic, both in the marketplace and in cyber security. While new devices are released into the public every year, a lack of standardized security concepts is also growing ever so clear. By having a model or standard for IoT devices and manufacturers to follow, the customer-base of these devices will have an easier time identifying trustworthy devices as well as how to secure their own devices.
Deepfakes: Ai Technology Of The Future, Hosanna Root
Deepfakes: Ai Technology Of The Future, Hosanna Root
Cybersecurity Undergraduate Research Showcase
Deepfakes technology’s danger stems from its ability to create realistic but fake synthesized media that people often identify as something that is real. With this powerful technology in the wrong hands, deepfakes can cause devastating havoc through information warfare, election campaign disruptions, and more, creating distrust in society. Disinformation is already rampant today, even without wide deployments of deepfakes, which is concerning given the fact that deepfakes’ nefarious full potentials are yet to be reached.
Security Issues With Network Connected Scada Systems, Chad Holm
Security Issues With Network Connected Scada Systems, Chad Holm
Cybersecurity Undergraduate Research Showcase
The use of Supervisory Control and Data Acquisition (SCADA) systems has become common place and are being used in several different industries. These have evolved as the technology has progressed. The use of Internet of Things (IOT) devices makes for less human intervention to run daily operations in these industries. This can also allow hackers to gain access to these devices due to security holes that are overlooked. There have several different ways that have been exploited on SCADA networks and the goal is to recognize and secure them so hackers cannot gain access to them.
Core Point Pixel-Level Localization By Fingerprint Features In Spatial Domain, Xueyi Ye, Yuzhong Shen, Maosheng Zeng, Yirui Liu, Huahua Chen, Zhijing Zhao
Core Point Pixel-Level Localization By Fingerprint Features In Spatial Domain, Xueyi Ye, Yuzhong Shen, Maosheng Zeng, Yirui Liu, Huahua Chen, Zhijing Zhao
Computational Modeling & Simulation Engineering Faculty Publications
Singular point detection is a primary step in fingerprint recognition, especially for fingerprint alignment and classification. But in present there are still some problems and challenges such as more false-positive singular points or inaccurate reference point localization. This paper proposes an accurate core point localization method based on spatial domain features of fingerprint images from a completely different viewpoint to improve the fingerprint core point displacement problem of singular point detection. The method first defines new fingerprint features, called furcation and confluence, to represent specific ridge/valley distribution in a core point area, and uses them to extract the innermost Curve …
Bfv-Based Homomorphic Encryption For Privacy-Preserving Cnn Models, Febrianti Wibawa, Ferhat Ozgur Catak, Salih Sarp, Murat Kuzlu
Bfv-Based Homomorphic Encryption For Privacy-Preserving Cnn Models, Febrianti Wibawa, Ferhat Ozgur Catak, Salih Sarp, Murat Kuzlu
Engineering Technology Faculty Publications
Medical data is frequently quite sensitive in terms of data privacy and security. Federated learning has been used to increase the privacy and security of medical data, which is a sort of machine learning technique. The training data is disseminated across numerous machines in federated learning, and the learning process is collaborative. There are numerous privacy attacks on deep learning (DL) models that attackers can use to obtain sensitive information. As a result, the DL model should be safeguarded from adversarial attacks, particularly in medical data applications. Homomorphic encryption-based model security from the adversarial collaborator is one of the answers …
Joint Linear And Nonlinear Computation With Data Encryption For Efficient Privacy-Preserving Deep Learning, Qiao Zhang
Joint Linear And Nonlinear Computation With Data Encryption For Efficient Privacy-Preserving Deep Learning, Qiao Zhang
Electrical & Computer Engineering Theses & Dissertations
Deep Learning (DL) has shown unrivalled performance in many applications such as image classification, speech recognition, anomalous detection, and business analytics. While end users and enterprises own enormous data, DL talents and computing power are mostly gathered in technology giants having cloud servers. Thus, data owners, i.e., the clients, are motivated to outsource their data, along with computationally-intensive tasks, to the server in order to leverage the server’s abundant computation resources and DL talents for developing cost-effective DL solutions. However, trust is required between the server and the client to finish the computation tasks (e.g., conducting inference for the newly-input …
Data-Driven Operational And Safety Analysis Of Emerging Shared Electric Scooter Systems, Qingyu Ma
Data-Driven Operational And Safety Analysis Of Emerging Shared Electric Scooter Systems, Qingyu Ma
Computational Modeling & Simulation Engineering Theses & Dissertations
The rapid rise of shared electric scooter (E-Scooter) systems offers many urban areas a new micro-mobility solution. The portable and flexible characteristics have made E-Scooters a competitive mode for short-distance trips. Compared to other modes such as bikes, E-Scooters allow riders to freely ride on different facilities such as streets, sidewalks, and bike lanes. However, sharing lanes with vehicles and other users tends to cause safety issues for riding E-Scooters. Conventional methods are often not applicable for analyzing such safety issues because well-archived historical crash records are not commonly available for emerging E-Scooters.
Perceiving the growth of such a micro-mobility …
Protection Of Patient Privacy On Mobile Device Machine Learning, Matthew Nguyen
Protection Of Patient Privacy On Mobile Device Machine Learning, Matthew Nguyen
Cybersecurity Undergraduate Research Showcase
An existing StudentLife Study mobile dataset was evaluated and organized to be applied to different machine learning methods. Different variables like user activity, exercise, sleep, study space, social, and stress levels are optimized to train a model that could predict user stress level. The different machine learning methods would test if both patient data privacy and training efficiency can be ensured.
Effects Of Cloud Computing In The Workforce, Kevin Rossi Acosta
Effects Of Cloud Computing In The Workforce, Kevin Rossi Acosta
Cybersecurity Undergraduate Research Showcase
In recent years, the incorporation of cloud computing and cloud services has increased in many different types of organizations and companies. This paper will focus on the philosophical, economical, and political factors that cloud computing and cloud services have in the workforce and different organizations. Based on various scholarly articles and resources it was observed that organizations used cloud computing and cloud services to increase their overall productivity as well as decrease the overall cost of their operations, as well as the different policies that were created by lawmakers to control the realm of cloud computing. The results of this …
Feature Extraction And Design In Deep Learning Models, Daniel Perez
Feature Extraction And Design In Deep Learning Models, Daniel Perez
Computational Modeling & Simulation Engineering Theses & Dissertations
The selection and computation of meaningful features is critical for developing good deep learning methods. This dissertation demonstrates how focusing on this process can significantly improve the results of learning-based approaches. Specifically, this dissertation presents a series of different studies in which feature extraction and design was a significant factor for obtaining effective results. The first two studies are a content-based image retrieval system (CBIR) and a seagrass quantification study in which deep learning models were used to extract meaningful high-level features that significantly increased the performance of the approaches. Secondly, a method for change detection is proposed where the …
Wg2An: Synthetic Wound Image Generation Using Generative Adversarial Network, Salih Sarp, Murat Kuzlu, Emmanuel Wilson, Ozgur Guler
Wg2An: Synthetic Wound Image Generation Using Generative Adversarial Network, Salih Sarp, Murat Kuzlu, Emmanuel Wilson, Ozgur Guler
Engineering Technology Faculty Publications
In part due to its ability to mimic any data distribution, Generative Adversarial Network (GAN) algorithms have been successfully applied to many applications, such as data augmentation, text-to-image translation, image-to-image translation, and image inpainting. Learning from data without crafting loss functions for each application provides broader applicability of the GAN algorithm. Medical image synthesis is also another field that the GAN algorithm has great potential to assist clinician training. This paper proposes a synthetic wound image generation model based on GAN architecture to increase the quality of clinical training. The proposed model is trained on chronic wound datasets with various …
Role Of Artificial Intelligence In The Internet Of Things (Iot) Cybersecurity, Murat Kuzlu, Corinne Fair, Ozgur Guler
Role Of Artificial Intelligence In The Internet Of Things (Iot) Cybersecurity, Murat Kuzlu, Corinne Fair, Ozgur Guler
Engineering Technology Faculty Publications
In recent years, the use of the Internet of Things (IoT) has increased exponentially, and cybersecurity concerns have increased along with it. On the cutting edge of cybersecurity is Artificial Intelligence (AI), which is used for the development of complex algorithms to protect networks and systems, including IoT systems. However, cyber-attackers have figured out how to exploit AI and have even begun to use adversarial AI in order to carry out cybersecurity attacks. This review paper compiles information from several other surveys and research papers regarding IoT, AI, and attacks with and against AI and explores the relationship between these …
Simulation For Cybersecurity: State Of The Art And Future Directions, Hamdi Kavak, Jose J. Padilla, Daniele Vernon-Bido, Saikou Y. Diallo, Ross Gore, Sachin Shetty
Simulation For Cybersecurity: State Of The Art And Future Directions, Hamdi Kavak, Jose J. Padilla, Daniele Vernon-Bido, Saikou Y. Diallo, Ross Gore, Sachin Shetty
VMASC Publications
In this article, we provide an introduction to simulation for cybersecurity and focus on three themes: (1) an overview of the cybersecurity domain; (2) a summary of notable simulation research efforts for cybersecurity; and (3) a proposed way forward on how simulations could broaden cybersecurity efforts. The overview of cybersecurity provides readers with a foundational perspective of cybersecurity in the light of targets, threats, and preventive measures. The simulation research section details the current role that simulation plays in cybersecurity, which mainly falls on representative environment building; test, evaluate, and explore; training and exercises; risk analysis and assessment; and humans …
Human Factors, Ergonomics And Industry 4.0 In The Oil & Gas Industry: A Bibliometric Analysis, Francesco Longo, Antonio Padovano, Lucia Gazzaneo, Jessica Frangella, Rafael Diaz
Human Factors, Ergonomics And Industry 4.0 In The Oil & Gas Industry: A Bibliometric Analysis, Francesco Longo, Antonio Padovano, Lucia Gazzaneo, Jessica Frangella, Rafael Diaz
VMASC Publications
Over the last few years, the Human Factors and Ergonomics (HF/E) discipline has significantly benefited from new human-centric engineered digital solutions of the 4.0 industrial age. Technologies are creating new socio-technical interactions between human and machine that minimize the risk of design-induced human errors and have largely contributed to remarkable improvements in terms of process safety, productivity, quality, and workers’ well-being. However, despite the Oil&Gas (O&G) sector is one of the most hazardous environments where human error can have severe consequences, Industry 4.0 aspects are still scarcely integrated with HF/E. This paper calls for a holistic understanding of the changing …
Developing An Artificial Intelligence Framework To Assess Shipbuilding And Repair Sub-Tier Supply Chains Risk, Rafael Diaz, Katherine Smith, Beatriz Acero, Francesco Longo, Antonio Padovano
Developing An Artificial Intelligence Framework To Assess Shipbuilding And Repair Sub-Tier Supply Chains Risk, Rafael Diaz, Katherine Smith, Beatriz Acero, Francesco Longo, Antonio Padovano
VMASC Publications
The defense shipbuilding and repair industry is a labor-intensive sector that can be characterized by low-product volumes and high investments in which a large number of shared resources, technology, suppliers, and processes asynchronously converge into large construction projects. It is mainly organized by the execution of a complex combination of sequential and overlapping stages. While entities engaged in this large-scale endeavor are often knowledgeable about their first-tier suppliers, they usually do not have insight into the lower tiers suppliers. A sizable part of any supply chain disruption is attributable to instabilities in sub-tier suppliers. This research note conceptually delineates a …
Blockchain For A Resilient, Efficient, And Effective Supply Chain, Evidence From Cases, Adrian Gheorghe, Farinaz Sabz Ali Pour, Unal Tatar, Omer Faruk Keskin
Blockchain For A Resilient, Efficient, And Effective Supply Chain, Evidence From Cases, Adrian Gheorghe, Farinaz Sabz Ali Pour, Unal Tatar, Omer Faruk Keskin
Engineering Management & Systems Engineering Faculty Publications
In the modern acquisition, it is unrealistic to consider single entities as producing and delivering a product independently. Acquisitions usually take place through supply networks. Resiliency, efficiency, and effectiveness of supply networks directly contribute to the acquisition system's resiliency, efficiency, and effectiveness. All the involved firms form a part of a supply network essential to producing the product or service. The decision-makers have to look for new methodologies for supply chain management. Blockchain technology introduces new methods of decentralization and delegation of services, which can transform supply chains and result in a more resilient, efficient, and effective supply chain. This …
A Monte-Carlo Analysis Of Monetary Impact Of Mega Data Breaches, Mustafa Canan, Omer Ilker Poyraz, Anthony Akil
A Monte-Carlo Analysis Of Monetary Impact Of Mega Data Breaches, Mustafa Canan, Omer Ilker Poyraz, Anthony Akil
Engineering Management & Systems Engineering Faculty Publications
The monetary impact of mega data breaches has been a significant concern for enterprises. The study of data breach risk assessment is a necessity for organizations to have effective cybersecurity risk management. Due to the lack of available data, it is not easy to obtain a comprehensive understanding of the interactions among factors that affect the cost of mega data breaches. The Monte Carlo analysis results were used to explicate the interactions among independent variables and emerging patterns in the variation of the total data breach cost. The findings of this study are as follows: The total data breach cost …
Ship Deck Segmentation In Engineering Document Using Generative Adversarial Networks, Mohammad Shahab Uddin, Raphael Pamie-George, Daron Wilkins, Andres Sousa Poza, Mustafa Canan, Samuel Kovacic, Jiang Li
Ship Deck Segmentation In Engineering Document Using Generative Adversarial Networks, Mohammad Shahab Uddin, Raphael Pamie-George, Daron Wilkins, Andres Sousa Poza, Mustafa Canan, Samuel Kovacic, Jiang Li
Engineering Management & Systems Engineering Faculty Publications
Generative adversarial networks (GANs) have become very popular in recent years. GANs have proved to be successful in different computer vision tasks including image-translation, image super-resolution etc. In this paper, we have used GAN models for ship deck segmentation. We have used 2D scanned raster images of ship decks provided by US Navy Military Sealift Command (MSC) to extract necessary information including ship walls, objects etc. Our segmentation results will be helpful to get vector and 3D image of a ship that can be later used for maintenance of the ship. We applied the trained models to engineering documents provided …