Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- TÜBİTAK (202)
- University of Nebraska - Lincoln (32)
- University of South Carolina (18)
- Universitas Indonesia (14)
- Western University (12)
-
- Marquette University (9)
- Association of Arab Universities (7)
- Chapman University (6)
- Embry-Riddle Aeronautical University (6)
- The University of Akron (6)
- University of Tennessee, Knoxville (6)
- University of Central Florida (5)
- University of Massachusetts Amherst (5)
- University of New Haven (5)
- Kennesaw State University (4)
- University of Arkansas, Fayetteville (4)
- University of Kentucky (4)
- Air Force Institute of Technology (3)
- California Polytechnic State University, San Luis Obispo (3)
- Murray State University (3)
- New Jersey Institute of Technology (3)
- University of Louisville (3)
- University of Nevada, Las Vegas (3)
- University of New Mexico (3)
- American University in Cairo (2)
- City University of New York (CUNY) (2)
- Clemson University (2)
- Edith Cowan University (2)
- Florida International University (2)
- Marshall University (2)
- Keyword
-
- Deep learning (27)
- Machine learning (20)
- Classification (10)
- Deep Learning (9)
- Artificial intelligence (8)
-
- COVID-19 (8)
- Transfer learning (8)
- Machine Learning (7)
- Convolutional neural network (6)
- Cybersecurity (6)
- Reinforcement learning (6)
- Computer vision (5)
- Convolutional neural networks (5)
- Energy consumption (5)
- Genetic algorithm (5)
- Internet of things (5)
- Optimization (5)
- Robotics (5)
- Deep neural network (4)
- Electrical and Computer Engineering (4)
- Face recognition (4)
- Feature extraction (4)
- IoT (4)
- Natural language processing (4)
- Security (4)
- Support vector machine (4)
- Wireless sensor networks (4)
- AI (3)
- Automation (3)
- Blockchain (3)
- Publication
-
- Turkish Journal of Electrical Engineering and Computer Sciences (202)
- Publications (21)
- Department of Electrical and Computer Engineering: Faculty Publications (20)
- Makara Journal of Technology (14)
- Electrical and Computer Engineering Faculty Research and Publications (9)
-
- Electrical and Computer Engineering Publications (8)
- Electronic Theses and Dissertations (7)
- Future Computing and Informatics Journal (7)
- Theses and Dissertations (7)
- Doctoral Dissertations (6)
- Library Philosophy and Practice (e-journal) (6)
- Williams Honors College, Honors Research Projects (6)
- Electrical & Computer Engineering and Computer Science Faculty Publications (5)
- Engineering Faculty Articles and Research (5)
- Human-Machine Communication (5)
- Masters Theses (5)
- Department of Electrical and Computer Engineering: Dissertations, Theses, and Student Research (4)
- Doctoral Dissertations and Master's Theses (4)
- Dissertations (3)
- Electrical and Computer Engineering Faculty Publications (3)
- Electronic Thesis and Dissertation Repository (3)
- Theses and Dissertations--Electrical and Computer Engineering (3)
- UNLV Theses, Dissertations, Professional Papers, and Capstones (3)
- CSE Conference and Workshop Papers (2)
- Computer Science and Computer Engineering Undergraduate Honors Theses (2)
- Dissertations - ALL (2)
- Dissertations, Master's Theses and Master's Reports (2)
- Electrical and Computer Engineering ETDs (2)
- FIU Electronic Theses and Dissertations (2)
- Graduate Theses and Dissertations (2)
- Publication Type
Articles 1 - 30 of 418
Full-Text Articles in Computer Engineering
Machine Learning Techniques For Network Analysis, Irfan Lateef
Machine Learning Techniques For Network Analysis, Irfan Lateef
Dissertations
The network's size and the traffic on it are both increasing exponentially, making it difficult to look at its behavior holistically and address challenges by looking at link level behavior. It is possible that there are casual relationships between links of a network that are not directly connected and which may not be obvious to observe. The goal of this dissertation is to study and characterize the behavior of the entire network by using eigensubspace based techniques and apply them to network traffic engineering applications.
A new method that uses the joint time-frequency interpretation of eigensubspace representation for network statistics …
On Resource-Efficiency And Performance Optimization In Big Data Computing And Networking Using Machine Learning, Wuji Liu
Dissertations
Due to the rapid transition from traditional experiment-based approaches to large-scale, computational intensive simulations, next-generation scientific applications typically involve complex numerical modeling and extreme-scale simulations. Such model-based simulations oftentimes generate colossal amounts of data, which must be transferred over high-performance network (HPN) infrastructures to remote sites and analyzed against experimental or observation data on high-performance computing (HPC) facility. Optimizing the performance of both data transfer in HPN and simulation-based model development on HPC is critical to enabling and accelerating knowledge discovery and scientific innovation. However, such processes generally involve an enormous set of attributes including domain-specific model parameters, network transport …
Comparative Analysis Of Rgb-Based Eye-Tracking For Large-Scale Human-Machine Applications, Brett Thaman, Trung Cao
Comparative Analysis Of Rgb-Based Eye-Tracking For Large-Scale Human-Machine Applications, Brett Thaman, Trung Cao
Posters-at-the-Capitol
Gaze tracking has become an established technology that enables using an individual’s gaze as an input signal to support a variety of applications in the context of Human-Computer Interaction. Gaze tracking primarily relies on sensing devices such as infrared (IR) cameras. Nevertheless, in the recent years, several attempts have been realized at detecting gaze by acquiring and processing images acquired from standard RGB cameras. Nowadays, there are only a few publicly available open-source libraries and they have not been tested extensively. In this paper, we present the result of a comparative analysis that studied a commercial eye-tracking device using IR …
Enhanced Security Utilizing Side Channel Data Analysis, Michael Taylor
Enhanced Security Utilizing Side Channel Data Analysis, Michael Taylor
Computer Science and Engineering Theses and Dissertations
The physical state of a system is affected by the activities and processes in which it is tasked with carrying out. In the past there have been many instances where such physical changes have been exploited by bad actors in order to gain insight into the operational state and even the data being held on a system. This method of side channel exploitation is very often effective due to the relative difficulty of obfuscating activity on a physical level. However, in order to take advantage of side channel data streams one must have a detailed working knowledge of how a …
Defining And Detecting Toxicity On Social Media: Context And Knowledge Are Key, Amit Sheth, Valerie Shalin, Ugur Kursuncu
Defining And Detecting Toxicity On Social Media: Context And Knowledge Are Key, Amit Sheth, Valerie Shalin, Ugur Kursuncu
Publications
As the role of online platforms has become increasingly prominent for communication, toxic behaviors, such as cyberbullying and harassment, have been rampant in the last decade. On the other hand, online toxicity is multi-dimensional and sensitive in nature, which makes its detection challenging. As the impact of exposure to online toxicity can lead to serious implications for individuals and communities, reliable models and algorithms are required for detecting and understanding such communications. In this paper We define toxicity to provide a foundation drawing social theories. Then, we provide an approach that identifies multiple dimensions of toxicity and incorporates explicit knowledge …
Autonomous Control And Signal Acquisition System, Rion Cadell Krampe
Autonomous Control And Signal Acquisition System, Rion Cadell Krampe
Honors College Theses
Our goal is to continue a previous teams project to build a NDE autonomous control and signal acquisition system that is more precise, more customizable with both code and mechanical parts, and cheaper than a similar system bought by the school. This goal has two stages to it. First, to repair the system from considerable damage it received during transportation. Secondly, to continue designing and developing the system to make considerable progress towards the goal of a fully functional NDE system. Along with making progress we must consider the team after us and create an easy stepping off point for …
Improving Noise Immunity And Efficiency Using High-Precision Iterative Codes, Sherzod Shukhratovich Atadjanov, Aziza Ahmadjanovna Tursunova
Improving Noise Immunity And Efficiency Using High-Precision Iterative Codes, Sherzod Shukhratovich Atadjanov, Aziza Ahmadjanovna Tursunova
Bulletin of TUIT: Management and Communication Technologies
The article discusses the issues of ensuring noise immunity in digital broadcasting systems, shows the importance of the transition to the optimal code and the need to use it in the field of noiseless coding in various areas of telecommunication transmission and reception of digital signals. The previous algorithms and error-correcting coding methods based on the Gray code, which are used in multi-level digital broadcast modulation schemes to minimize the intensity of bit errors, are highlighted. A model of error-correcting coding by the Gray method and methods for estimating the probability of error for the Gray code are presented. Based …
Tinyml For Gait Stride Classification, Priyanka Rajendra
Tinyml For Gait Stride Classification, Priyanka Rajendra
UNLV Theses, Dissertations, Professional Papers, and Capstones
Human gait classification and analysis become very important when a person has been diagnosed with a neurological disorder or has suffered an injury which has affected their ability to walk correctly. Gait strides are an important parameter to be studied as it helps the doctor to diagnose any underlying gait condition and evaluate what type of treatment suits the best for the patient’s recovery. Studying gait strides also helps athletes to improve their performance.In today’s world, machine learning has emerged as one of the most widely used technology for classification and analysis of gait characteristics. TinyML is a field of …
Network Management, Optimization And Security With Machine Learning Applications In Wireless Networks, Mariam Nabil
Network Management, Optimization And Security With Machine Learning Applications In Wireless Networks, Mariam Nabil
Theses and Dissertations
Wireless communication networks are emerging fast with a lot of challenges and ambitions. Requirements that are expected to be delivered by modern wireless networks are complex, multi-dimensional, and sometimes contradicting. In this thesis, we investigate several types of emerging wireless networks and tackle some challenges of these various networks. We focus on three main challenges. Those are Resource Optimization, Network Management, and Cyber Security. We present multiple views of these three aspects and propose solutions to probable scenarios. The first challenge (Resource Optimization) is studied in Wireless Powered Communication Networks (WPCNs). WPCNs are considered a very promising approach towards sustainable, …
Design, Extraction, And Optimization Tool Flows And Methodologies For Homogeneous And Heterogeneous Multi-Chip 2.5d Systems, Md Arafat Kabir
Design, Extraction, And Optimization Tool Flows And Methodologies For Homogeneous And Heterogeneous Multi-Chip 2.5d Systems, Md Arafat Kabir
Graduate Theses and Dissertations
Chip and packaging industries are making significant progress in 2.5D design as a result of increasing popularity of their application. In advanced high-density 2.5D packages, package redistribution layers become similar to chip Back-End-of-Line routing layers, and the gap between them scales down with pin density improvement. Chiplet-package interactions become significant and severely affect system performance and reliability. Moreover, 2.5D integration offers opportunities to apply novel design techniques. The traditional die-by-die design approach neither carefully considers these interactions nor fully exploits the cross-boundary design opportunities.
This thesis presents chiplet-package cross-boundary design, extraction, analysis, and optimization tool flows and methodologies for high-density …
An Analysis Of Camera Configurations And Depth Estimation Algorithms For Triple-Camera Computer Vision Systems, Jared Peter-Contesse
An Analysis Of Camera Configurations And Depth Estimation Algorithms For Triple-Camera Computer Vision Systems, Jared Peter-Contesse
Master's Theses
The ability to accurately map and localize relevant objects surrounding a vehicle is an important task for autonomous vehicle systems. Currently, many of the environmental mapping approaches rely on the expensive LiDAR sensor. Researchers have been attempting to transition to cheaper sensors like the camera, but so far, the mapping accuracy of single-camera and dual-camera systems has not matched the accuracy of LiDAR systems. This thesis examines depth estimation algorithms and camera configurations of a triple-camera system to determine if sensor data from an additional perspective will improve the accuracy of camera-based systems. Using a synthetic dataset, the performance of …
Evaluation Of Robust Deep Learning Pipelines Targeting Low Swap Edge Deployment, David Carter Cornett
Evaluation Of Robust Deep Learning Pipelines Targeting Low Swap Edge Deployment, David Carter Cornett
Masters Theses
The deep learning technique of convolutional neural networks (CNNs) has greatly advanced the state-of-the-art for computer vision tasks such as image classification and object detection. These solutions rely on large systems leveraging wattage-hungry GPUs to provide the computational power to achieve such performance. However, the size, weight and power (SWaP) requirements of these conventional GPU-based deep learning systems are not suitable when a solution requires deployment to so called "Edge" environments such as autonomous vehicles, unmanned aerial vehicles (UAVs) and smart security cameras.
The objective of this work is to benchmark FPGA-based alternatives to conventional GPU systems that have the …
Deep Learning Based Speech Enhancement And Its Application To Speech Recognition, Ju Lin
Deep Learning Based Speech Enhancement And Its Application To Speech Recognition, Ju Lin
All Dissertations
Speech enhancement is the task that aims to improve the quality and the intelligibility of a speech signal that is degraded by ambient noise and room reverberation. Speech enhancement algorithms are used extensively in many audio- and communication systems, including mobile handsets, speech recognition, speaker verification systems and hearing aids. Recently, deep learning has achieved great success in many applications, such as computer vision, nature language processing and speech recognition. Speech enhancement methods have been introduced that use deep-learning techniques, as these techniques are capable of learning complex hierarchical functions using large-scale training data. This dissertation investigates the deep learning …
Augmented Communications : A Solution For Overcoming High Spatial Correlation Of The Massive-Miso Vlc Channel, Monette Khadr
Augmented Communications : A Solution For Overcoming High Spatial Correlation Of The Massive-Miso Vlc Channel, Monette Khadr
Legacy Theses & Dissertations (2009 - 2024)
A key challenge for future wireless networks is to come upon a riveting compromise between spectral efficiency, complexity, and energy efficiency. The challenge is also intensified due to the pace at which the Internet-of-Things (IoT) technology is arriving, causing an upheaval to pre-existing network infrastructures in terms of elevating spectrum scarcity. To keep pace with the exploding data demand forecasts, a circumvention is required. One realization is by utilizing the high-band spectrum and the rich body of knowledge on multiple-input multiple-output (MIMO) technologies. One of the prominent high frequency technologies is visible light communications (VLC). VLC provide a large unregulated …
Risk-Based Machine Learning Approaches For Probabilistic Transient Stability, Umair Shahzad
Risk-Based Machine Learning Approaches For Probabilistic Transient Stability, Umair Shahzad
Department of Electrical and Computer Engineering: Dissertations, Theses, and Student Research
Power systems are getting more complex than ever and are consequently operating close to their limit of stability. Moreover, with the increasing demand of renewable wind generation, and the requirement to maintain a secure power system, the importance of transient stability cannot be overestimated. Considering its significance in power system security, it is important to propose a different approach for enhancing the transient stability, considering uncertainties. Current deterministic industry practices of transient stability assessment ignore the probabilistic nature of variables (fault type, fault location, fault clearing time, etc.). These approaches typically provide a conservative criterion and can result in expensive …
Collaborative Human-Machine Interfaces For Mobile Manipulators., Shamsudeen Olawale Abubakar
Collaborative Human-Machine Interfaces For Mobile Manipulators., Shamsudeen Olawale Abubakar
Electronic Theses and Dissertations
The use of mobile manipulators in service industries as both agents in physical Human Robot Interaction (pHRI) and for social interactions has been on the increase in recent times due to necessities like compensating for workforce shortages and enabling safer and more efficient operations amongst other reasons. Collaborative robots, or co-bots, are robots that are developed for use with human interaction through direct contact or close proximity in a shared space with the human users. The work presented in this dissertation focuses on the design, implementation and analysis of components for the next-generation collaborative human machine interfaces (CHMI) needed for …
Machine Learning For Unmanned Aerial System (Uas) Networking, Jian Wang
Machine Learning For Unmanned Aerial System (Uas) Networking, Jian Wang
Doctoral Dissertations and Master's Theses
Fueled by the advancement of 5G new radio (5G NR), rapid development has occurred in many fields. Compared with the conventional approaches, beamforming and network slicing enable 5G NR to have ten times decrease in latency, connection density, and experienced throughput than 4G long term evolution (4G LTE). These advantages pave the way for the evolution of Cyber-physical Systems (CPS) on a large scale. The reduction of consumption, the advancement of control engineering, and the simplification of Unmanned Aircraft System (UAS) enable the UAS networking deployment on a large scale to become feasible. The UAS networking can finish multiple complex …
Let's Read: Designing A Smart Display Application To Support Codas When Learning Spoken Language, Katie Rodeghiero, Yingying Yuki Chen, Annika M. Hettmann, Franceli L. Cibrian
Let's Read: Designing A Smart Display Application To Support Codas When Learning Spoken Language, Katie Rodeghiero, Yingying Yuki Chen, Annika M. Hettmann, Franceli L. Cibrian
Engineering Faculty Articles and Research
Hearing children of Deaf adults (CODAs) face many challenges including having difficulty learning spoken languages, experiencing social judgment, and encountering greater responsibilities at home. In this paper, we present a proposal for a smart display application called Let's Read that aims to support CODAs when learning spoken language. We conducted a qualitative analysis using online community content in English to develop the first version of the prototype. Then, we conducted a heuristic evaluation to improve the proposed prototype. As future work, we plan to use this prototype to conduct participatory design sessions with Deaf adults and CODAs to evaluate the …
Digital Markers Of Autism, Ivonne Monarca, Franceli L. Cibrian, Monica Tentori
Digital Markers Of Autism, Ivonne Monarca, Franceli L. Cibrian, Monica Tentori
Engineering Faculty Articles and Research
Autism Spectrum Disorder (ASD) is a neurological condition that affects how a people communicate and interact with others. The use of screening tools during childhood is very important to detect those children who need to be referred for a diagnosis of ASD. However, most screening tools are based on parents' responses so the result can be subjective. In addition, most screening tools focus on social and communicative skills leaving aside sensory features, which have shown to have the potential to be ASD markers. Tactile processing has been little explored due to lack of tools to asses it, however with the …
Feel And Touch: A Haptic Mobile Game To Assess Tactile Processing, Ivonne Monarca, Monica Tentori, Franceli L. Cibrian
Feel And Touch: A Haptic Mobile Game To Assess Tactile Processing, Ivonne Monarca, Monica Tentori, Franceli L. Cibrian
Engineering Faculty Articles and Research
Haptic interfaces have great potential for assessing the tactile processing of children with Autism Spectrum Disorder (ASD), an area that has been under-explored due to the lack of tools to assess it. Until now, haptic interfaces for children have mostly been used as a teaching or therapeutic tool, so there are still open questions about how they could be used to assess tactile processing of children with ASD. This article presents the design process that led to the development of Feel and Touch, a mobile game augmented with vibrotactile stimuli to assess tactile processing. Our feasibility evaluation, with 5 children …
Plasmonic Field-Effect Transistors (Terafets) For 6g Communications, Michael Shur, Gregory Aizin, Taiichi Otsuji, Victor Ryzhii
Plasmonic Field-Effect Transistors (Terafets) For 6g Communications, Michael Shur, Gregory Aizin, Taiichi Otsuji, Victor Ryzhii
Publications and Research
Ever increasing demands of data traffic makes the transition to 6G communications in the 300 GHz band inevitable. Short-channel field-effect transistors (FETs) have demonstrated excellent potential for detection and generation of terahertz (THz) and sub-THz radiation. Such transistors (often referred to as TeraFETs) include short-channel silicon complementary metal oxide (CMOS). The ballistic and quasi-ballistic electron transport in the TeraFET channels determine the TeraFET response at the sub-THz and THz frequencies. TeraFET arrays could form plasmonic crystals with nanoscale unit cells smaller or comparable to the electron mean free path but with the overall dimensions comparable with the radiation wavelength. Such …
The Factors Influencing The Acceptance Of Web-Based E-Learning System Among Academic Staffs Of Saudi Arabia, Ikhlas Zamzami
The Factors Influencing The Acceptance Of Web-Based E-Learning System Among Academic Staffs Of Saudi Arabia, Ikhlas Zamzami
Future Computing and Informatics Journal
It is possible to learn more quickly and effectively with e-learning software development because it provides learners with convenient and flexible learning environments. This allows them to progress further in their careers. Reports on web-based e-learning systems for in-service education have frequently neglected to include the viewpoint of the instructor. In order to conduct quantitative research, a sample of 50 academic staff members was selected. The purpose of this study was to investigate various factors that influence the intention to use web-based e-learning, with the theoretical foundation being provided by university lecturers. According to the findings of the study, the …
Enhancing Academic Advising In Credit Hours System Using Dss, Alaa Salah Eldin Ghoneim
Enhancing Academic Advising In Credit Hours System Using Dss, Alaa Salah Eldin Ghoneim
Future Computing and Informatics Journal
Academic advising plays a vital role in achieving higher educational institution’s purposes. Academic advising is a process where an academic advisor decides to select a certain number of courses for a student to register in each semester to fulfil the graduation requirements. This paper presents an Academic Advising Decision Support System (AADSS) to enhance advisors make better decisions regarding their students’ cases. AADSS framework divided into four layers, data preparation layer, data layer, processing layer and decision layer. The testing results from those participating academic advisors and students considered are that AADSS beneficial in enhancing their decision for selecting courses.
Image Hiding Using Qr Factorization And Discrete Wavelet Transform Techniques, Reham Ahmed El-Shahed, Maryam Al-Berry, Hala Ebied, Howida Shedeed
Image Hiding Using Qr Factorization And Discrete Wavelet Transform Techniques, Reham Ahmed El-Shahed, Maryam Al-Berry, Hala Ebied, Howida Shedeed
Future Computing and Informatics Journal
Steganography is one of the most important tools in the data security field as there is a huge amount of data transferred each moment over the internet. Hiding secret messages in an image has been widely used because the images are mostly used in social media applications. The proposed algorithm is a simple algorithm for hiding an image in another image. The proposed technique uses QR factorization to conceal the secret image. The technique successfully hid a gray and color image in another one and the performance of the algorithm was measured by PSNR, SSIM and NCC. The PSNR for …
A Statistical-Mining Techniques’ Collaboration For Minimizing Dimensionality In Ovarian Cancer Data, Mohamed Attia, Maha Farghaly, Mohamed Hamada, Amira M. Idrees Ami
A Statistical-Mining Techniques’ Collaboration For Minimizing Dimensionality In Ovarian Cancer Data, Mohamed Attia, Maha Farghaly, Mohamed Hamada, Amira M. Idrees Ami
Future Computing and Informatics Journal
A feature is a single measurable criterion to an observation of a process. While knowledge discovery techniques successfully contribute in many fields, however, the extensive required data processing could hinder the performance of these techniques. One of the main issues in processing data is the dimensionality of the data. Therefore, focusing on reducing the data dimensionality through eliminating the insignificant attributes could be considered one of the successful steps for raising the applied techniques’ performance. On the other hand, focusing on the applied field, ovarian cancer patients continuously suffer from the extensive analysis requirements for detecting the disease as well …
Multilayer Lateral Heterostructures Of Van Der Waals Crystals With Sharp, Carrier–Transparent Interfaces, Eli A. Sutter, Raymond R. Unocic, Juan-Carlos Idrobo, Peter Sutter
Multilayer Lateral Heterostructures Of Van Der Waals Crystals With Sharp, Carrier–Transparent Interfaces, Eli A. Sutter, Raymond R. Unocic, Juan-Carlos Idrobo, Peter Sutter
Department of Electrical and Computer Engineering: Faculty Publications
Research on engineered materials that integrate different 2D crystals has largely focused on two prototypical heterostructures: Vertical van der Waals stacks and lateral heterostructures of covalently stitched monolayers. Extending lateral integration to few layer or even multilayer van der Waals crystals could enable architectures that combine the superior light absorption and photonic properties of thicker crystals with close proximity to interfaces and efficient carrier separation within the layers, potentially benefiting applications such as photovoltaics. Here, the realization of multilayer heterstructures of the van der Waals semiconductors SnS and GeS with lateral interfaces spanning up to several hundred individual layers is …
Intelligent Internet Of Things Frameworks For Smart City Safety, Dimitrios Sikeridis
Intelligent Internet Of Things Frameworks For Smart City Safety, Dimitrios Sikeridis
Electrical and Computer Engineering ETDs
The emerging Smart City ecosystem consists of a vast edge network of Internet of Things (IoT) devices that continuously interact with mobile devices carried by its citizens. In this setting, the IoT infrastructure, apart from the main communications facilitator, acts as a crowdsourcing mechanism that collects massive amounts of user data, and can support public safety applications for the Smart City. In this thesis, we design and analyze learning mechanisms that extract intelligence from crowd interactions with the wireless IoT infrastructure, and optimize its energy efficiency while operating as a public safety network. First, we deploy a multi-story facility testbed …
Cybert: Cybersecurity Claim Classification By Fine-Tuning The Bert Language Model, Kimia Ameri, Michael Hempel, Hamid Sharif, Juan Lopez Jr., Kalyan Perumalla
Cybert: Cybersecurity Claim Classification By Fine-Tuning The Bert Language Model, Kimia Ameri, Michael Hempel, Hamid Sharif, Juan Lopez Jr., Kalyan Perumalla
Department of Electrical and Computer Engineering: Faculty Publications
We introduce CyBERT, a cybersecurity feature claims classifier based on bidirectional encoder representations from transformers and a key component in our semi-automated cybersecurity vetting for industrial control systems (ICS). To train CyBERT, we created a corpus of labeled sequences from ICS device documentation collected across a wide range of vendors and devices. This corpus provides the foundation for fine-tuning BERT’s language model, including a prediction-guided relabeling process. We propose an approach to obtain optimal hyperparameters, including the learning rate, the number of dense layers, and their configuration, to increase the accuracy of our classifier. Fine-tuning all hyperparameters of the resulting …
Reliability Models For Smartphone Applications, Sonia Meskini, Ali Bou Nassif, Luiz Fernando Capretz
Reliability Models For Smartphone Applications, Sonia Meskini, Ali Bou Nassif, Luiz Fernando Capretz
Electrical and Computer Engineering Publications
Smartphones have become the most used electronic devices. They carry out most of the functionalities of desktops, offering various useful applications that suit the user’s needs. Therefore, instead of the operator, the user has been the main controller of the device and its applications, therefore its reliability has become an emergent requirement. As a first step, based on collected smartphone applications failure data, we investigated and evaluated the efficacy of Software Reliability Growth Models (SRGMs) when applied to these smartphone data in order to check whether they achieve the same accuracy as in the desktop/laptop area. None of the selected …
Resampling And Super-Resolution Of Hexagonally Sampled Images Using Deep Learning, Dylan Flaute, Russell C. Hardie, Hamed Elwarfalli
Resampling And Super-Resolution Of Hexagonally Sampled Images Using Deep Learning, Dylan Flaute, Russell C. Hardie, Hamed Elwarfalli
Electrical and Computer Engineering Faculty Publications
Super-resolution (SR) aims to increase the resolution of imagery. Applications include security, medical imaging, and object recognition. We propose a deep learning-based SR system that takes a hexagonally sampled low-resolution image as an input and generates a rectangularly sampled SR image as an output. For training and testing, we use a realistic observation model that includes optical degradation from diffraction and sensor degradation from detector integration. Our SR approach first uses non-uniform interpolation to partially upsample the observed hexagonal imagery and convert it to a rectangular grid. We then leverage a state-of-the-art convolutional neural network (CNN) architecture designed for SR …