Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Authentication (1)
- Biomedical imaging (1)
- Cancer (1)
- Cloud LAMP Stack (1)
- Curricular Analytics (1)
-
- Cyber-physical exams (1)
- Deep learning (1)
- Electricity (1)
- Influence spread (1)
- Information diffusion (1)
- Initial spreader selection (1)
- Interdependent networks (1)
- Machine learning (1)
- Multi-Objective (1)
- Multi-layer networks (1)
- Network Security (1)
- Optimization (1)
- Phenomena propagation (1)
- Policy Enforcement (1)
- Power (1)
- RNA-seq (1)
- Security Exceptions (1)
- Seed selection (1)
- Smart grid (1)
- Social networks (1)
- Software-Defined Networking (1)
- Splice junction (1)
- Publication
- Publication Type
Articles 1 - 5 of 5
Full-Text Articles in Computer Engineering
Influence Spread In Two-Layer Interdependent Networks: Designed Single-Layer Or Random Two-Layer Initial Spreaders?, Hana Khamfroush, Nathaniel Hudson, Samuel Iloo, Mahshid R. Naeini
Influence Spread In Two-Layer Interdependent Networks: Designed Single-Layer Or Random Two-Layer Initial Spreaders?, Hana Khamfroush, Nathaniel Hudson, Samuel Iloo, Mahshid R. Naeini
Computer Science Faculty Publications
Influence spread in multi-layer interdependent networks (M-IDN) has been studied in the last few years; however, prior works mostly focused on the spread that is initiated in a single layer of an M-IDN. In real world scenarios, influence spread can happen concurrently among many or all components making up the topology of an M-IDN. This paper investigates the effectiveness of different influence spread strategies in M-IDNs by providing a comprehensive analysis of the time evolution of influence propagation given different initial spreader strategies. For this study we consider a two-layer interdependent network and a general probabilistic threshold influence spread model …
Anonymous And Efficient Message Authentication Scheme For Smart Grid, Libing Wu, Jing Wang, Sherali Zeadally, Debiao He
Anonymous And Efficient Message Authentication Scheme For Smart Grid, Libing Wu, Jing Wang, Sherali Zeadally, Debiao He
Information Science Faculty Publications
Smart grid has emerged as the next-generation electricity grid with power flow optimization and high power quality. Smart grid technologies have attracted the attention of industry and academia in the last few years. However, the tradeoff between security and efficiency remains a challenge in the practical deployment of the smart grid. Most recently, Li et al. proposed a lightweight message authentication scheme with user anonymity and claimed that their scheme is provably secure. But we found that their scheme fails to achieve mutual authentication and mitigate some typical attacks (e.g., impersonation attack, denial of service attack) in the smart grid …
Novel Applications Of Machine Learning In Bioinformatics, Yi Zhang
Novel Applications Of Machine Learning In Bioinformatics, Yi Zhang
Theses and Dissertations--Computer Science
Technological advances in next-generation sequencing and biomedical imaging have led to a rapid increase in biomedical data dimension and acquisition rate, which is challenging the conventional data analysis strategies. Modern machine learning techniques promise to leverage large data sets for finding hidden patterns within them, and for making accurate predictions. This dissertation aims to design novel machine learning-based models to transform biomedical big data into valuable biological insights. The research presented in this dissertation focuses on three bioinformatics domains: splice junction classification, gene regulatory network reconstruction, and lesion detection in mammograms.
A critical step in defining gene structures and mRNA …
Automated Network Security With Exceptions Using Sdn, Sergio A. Rivera Polanco
Automated Network Security With Exceptions Using Sdn, Sergio A. Rivera Polanco
Theses and Dissertations--Computer Science
Campus networks have recently experienced a proliferation of devices ranging from personal use devices (e.g. smartphones, laptops, tablets), to special-purpose network equipment (e.g. firewalls, network address translation boxes, network caches, load balancers, virtual private network servers, and authentication servers), as well as special-purpose systems (badge readers, IP phones, cameras, location trackers, etc.). To establish directives and regulations regarding the ways in which these heterogeneous systems are allowed to interact with each other and the network infrastructure, organizations typically appoint policy writing committees (PWCs) to create acceptable use policy (AUP) documents describing the rules and behavioral guidelines that all campus network …
Curricular Optimization: Solving For The Optimal Student Success Pathway, William G. Thompson-Arjona
Curricular Optimization: Solving For The Optimal Student Success Pathway, William G. Thompson-Arjona
Theses and Dissertations--Electrical and Computer Engineering
Considering the significant investment of higher education made by students and their families, graduating in a timely manner is of the utmost importance. Delay attributed to drop out or the retaking of a course adds cost and negatively affects a student’s academic progression. Considering this, it becomes paramount for institutions to focus on student success in relation to term scheduling.
Often overlooked, complexity of a course schedule may be one of the most important factors in whether or not a student successfully completes his or her degree. More often than not students entering an institution as a first time full …