Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Average Run Length (2)
- Change Detection (2)
- Control Charts (2)
- Filtered Derivative (2)
- Moving Average (2)
-
- 5G (1)
- Advanced wireless communications (1)
- Adversarial attack (1)
- Adversarial examples (1)
- Android (1)
- Cell Broadband Engine (1)
- Controlled islanding (1)
- Cyber security (1)
- False data attack (1)
- Feature squeeze (1)
- Internet of Things (1)
- Isolation (1)
- Machine learning (1)
- Metrics (1)
- Multi-Core CPU (1)
- Multi-objective Algorithms (1)
- OpenCL (1)
- Optimization (1)
- Parallel Programming (1)
- Person re-identification (1)
- Privacy (1)
- Reference Set (1)
- Remedial action scheme (1)
- Security (1)
- Smart communities (1)
- Publication
- Publication Type
Articles 1 - 8 of 8
Full-Text Articles in Computer Engineering
Person Re-Identification And An Adversarial Attack And Defense For Person Re-Identification Networks, Yu Zheng
Person Re-Identification And An Adversarial Attack And Defense For Person Re-Identification Networks, Yu Zheng
Dissertations - ALL
Person re-identification (ReID) is the task of retrieving the same person, across different camera views or on the same camera view captured at a different time, given a query person of interest. There has been great interest and significant progress in person ReID, which is important for security and wide-area surveillance applications as well as human computer interaction systems. In order to continuously track targets across multiple cameras with disjoint views, it is essential to re-identify the same target across different cameras. This is a challenging task due to several reasons including changes in illumination and target appearance, and variations …
Impact Assessment, Detection, And Mitigation Of False Data Attacks In Electrical Power Systems, Sagnik Basumallik
Impact Assessment, Detection, And Mitigation Of False Data Attacks In Electrical Power Systems, Sagnik Basumallik
Dissertations - ALL
The global energy market has seen a massive increase in investment and capital flow in the last few decades. This has completely transformed the way power grids operate - legacy systems are now being replaced by advanced smart grid infrastructures that attest to better connectivity and increased reliability. One popular example is the extensive deployment of phasor measurement units, which is referred to PMUs, that constantly provide time-synchronized phasor measurements at a high resolution compared to conventional meters. This enables system operators to monitor in real-time the vast electrical network spanning thousands of miles. However, a targeted cyber attack on …
How Can 5g Make Our Lives Better?, Firas Slewa Dawod
How Can 5g Make Our Lives Better?, Firas Slewa Dawod
English Language Institute
Our lives will be significantly improved with the advent of the new cellular wireless technology due to all its new features and applications. This Poster discusses the main features and application of 5G technology and its positive impact on society, in particular facilitating interactive and smart communities.
Pinpoint: Efficient And Effective Resource Isolation For Mobile Security And Privacy, Paul Ratazzi, Ashok Bommisetti, Nian Ji, Wenliang Du
Pinpoint: Efficient And Effective Resource Isolation For Mobile Security And Privacy, Paul Ratazzi, Ashok Bommisetti, Nian Ji, Wenliang Du
Electrical Engineering and Computer Science - All Scholarship
Virtualization is frequently used to isolate untrusted processes and control their access to sensitive resources. However, isolation usually carries a price in terms of less resource sharing and reduced inter-process communication. In an open architecture such as Android, this price and its impact on performance, usability, and transparency must be carefully considered. Although previous efforts in developing general-purpose isolation solutions have shown that some of these negative sideeffects can be mitigated, doing so involves overcoming significant design challenges by incorporating numerous additional platform complexities not directly related to improved security. Thus, the general purpose solutions become inefficient and burdensome if …
Reference Set Metrics For Multi-Objective Algorithms, Chilukuri K. Mohan, Kishan Mehrotra
Reference Set Metrics For Multi-Objective Algorithms, Chilukuri K. Mohan, Kishan Mehrotra
Electrical Engineering and Computer Science - All Scholarship
Several metrics and indicators have been suggested in the past to evaluate multi-objective evolutionary and non-evolutionary algo- rithms. However, these metrics are known to have many problems that make their application sometimes unsound, and sometimes infeasible. This paper proposes a new approach, in which metrics are parameter- ized with respect to a reference set, on which depend the properties of any metric.
Average Run Length Of Two-Span Moving Sum Algorithms, Swarnendu Kar, Kishan G. Mehrotra, Pramod Varshney
Average Run Length Of Two-Span Moving Sum Algorithms, Swarnendu Kar, Kishan G. Mehrotra, Pramod Varshney
Electrical Engineering and Computer Science - All Scholarship
Among the various procedures used to detect potential changes in a stochastic process the moving sum algorithms are very popular due to their intuitive appeal and good statistical performance. One of the important design parameters of a change detection algorithm is the expected interval between false positives, also known as the average run length (ARL). In this paper, we have derived closed form expressions of ARL for two special cases - namely the two-span moving sum and filtered derivative algorithms. We have assumed that the random variables are uniformly distributed.
Approximation Of Average Run Length Of Moving Sum Algorithms Using Multivariate Probabilities, Swarnendu Kar, Kishan Mehrotra, Pramod Varshney
Approximation Of Average Run Length Of Moving Sum Algorithms Using Multivariate Probabilities, Swarnendu Kar, Kishan Mehrotra, Pramod Varshney
Electrical Engineering and Computer Science - All Scholarship
Among the various procedures used to detect potential changes in a stochastic process the moving sum algorithms are very popular due to their intuitive appeal and good statistical performance. One of the important design parameters of a change detection algorithm is the expected interval between false positives, also known as the average run length (ARL). Computation of the ARL usually involves numerical procedures but in some cases it can be approximated using a series involving multivariate probabilities. In this paper, we present an analysis of this series approach by providing sufficient conditions for convergence and derive an error bound. Using …
Univercl 1.0 --- Phase I Of A Complete Opencl Implementation, Phil Pratt-Szeliga, Jim Fawcett
Univercl 1.0 --- Phase I Of A Complete Opencl Implementation, Phil Pratt-Szeliga, Jim Fawcett
Electrical Engineering and Computer Science - All Scholarship
Recently the Khronos group has released an open specification for OpenCL, the Open Computation Language. OpenCL strives to create a standard language for programming novel computer architectures such as the multi-core CPU, the GPU and accelerators. The programming model is similar to Nvidia's CUDA. UniverCL is a partial implementation of the OpenCL 1.0 Specification that has enough functionality to demonstrate the major components of the specification. It currently includes support for two hardware devices: the multi-core CPU and the Cell Broadband Engine. This technical report captures the work done in Phase I of UniverCL's development and outlines Phase II of …