Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Old Dominion University

Series

Discipline
Keyword
Publication Year
Publication

Articles 1 - 30 of 196

Full-Text Articles in Computer Engineering

Methods That Support The Validation Of Agent-Based Models: An Overview And Discussion, Andrew Collins, Matthew Koehler, Christopher Lynch Jan 2024

Methods That Support The Validation Of Agent-Based Models: An Overview And Discussion, Andrew Collins, Matthew Koehler, Christopher Lynch

Engineering Management & Systems Engineering Faculty Publications

Validation is the process of determining if a model adequately represents the system under study for the model’s intended purpose. Validation is a critical component in building the credibility of a simulation model with its end-users. Effectively conducting validation can be a daunting task for both novice and experienced simulation developers. Further compounding the difficult task of conducting validation is that there is no universally accepted approach for assessing a simulation. These challenges are particularly relevant to the paradigm of Agent-Based Modeling and Simulation (ABMS) because of the complexity found in these models’ mechanisms and in the real-world situations they …


Iot Health Devices: Exploring Security Risks In The Connected Landscape, Abasi-Amefon Obot Affia, Hilary Finch, Woosub Jung, Issah Abubakari Samori, Lucas Potter, Xavier-Lewis Palmer May 2023

Iot Health Devices: Exploring Security Risks In The Connected Landscape, Abasi-Amefon Obot Affia, Hilary Finch, Woosub Jung, Issah Abubakari Samori, Lucas Potter, Xavier-Lewis Palmer

School of Cybersecurity Faculty Publications

The concept of the Internet of Things (IoT) spans decades, and the same can be said for its inclusion in healthcare. The IoT is an attractive target in medicine; it offers considerable potential in expanding care. However, the application of the IoT in healthcare is fraught with an array of challenges, and also, through it, numerous vulnerabilities that translate to wider attack surfaces and deeper degrees of damage possible to both consumers and their confidence within health systems, as a result of patient-specific data being available to access. Further, when IoT health devices (IoTHDs) are developed, a diverse range of …


A Structured Narrative Prompt For Prompting Narratives From Large Language Models: Sentiment Assessment Of Chatgpt-Generated Narratives And Real Tweets, Christopher J. Lynch, Erik J. Jensen, Virginia Zamponi, Kevin O'Brien, Erika Frydenlund, Ross Gore Jan 2023

A Structured Narrative Prompt For Prompting Narratives From Large Language Models: Sentiment Assessment Of Chatgpt-Generated Narratives And Real Tweets, Christopher J. Lynch, Erik J. Jensen, Virginia Zamponi, Kevin O'Brien, Erika Frydenlund, Ross Gore

VMASC Publications

Large language models (LLMs) excel in providing natural language responses that sound authoritative, reflect knowledge of the context area, and can present from a range of varied perspectives. Agent-based models and simulations consist of simulated agents that interact within a simulated environment to explore societal, social, and ethical, among other, problems. Simulated agents generate large volumes of data and discerning useful and relevant content is an onerous task. LLMs can help in communicating agents' perspectives on key life events by providing natural language narratives. However, these narratives should be factual, transparent, and reproducible. Therefore, we present a structured narrative prompt …


Past Challenges And The Future Of Discrete Event Simulation, Andrew J. Collins, Farinaz Sabz Ali Pour, Craig A. Jordan Jan 2023

Past Challenges And The Future Of Discrete Event Simulation, Andrew J. Collins, Farinaz Sabz Ali Pour, Craig A. Jordan

Engineering Management & Systems Engineering Faculty Publications

The American scientist Carl Sagan once said: “You have to know the past to understand the present.” We argue that having a meaningful dialogue on the future of simulation requires a baseline understanding of previous discussions on its future. For this paper, we conduct a review of the discrete event simulation (DES) literature that focuses on its future to understand better the path that DES has been following, both in terms of who is using simulation and what directions they think DES should take. Our review involves a qualitative literature review of DES and a quantitative bibliometric analysis of the …


Security Of Internet Of Things (Iot) Using Federated Learning And Deep Learning — Recent Advancements, Issues And Prospects, Vinay Gugueoth, Sunitha Safavat, Sachin Shetty Jan 2023

Security Of Internet Of Things (Iot) Using Federated Learning And Deep Learning — Recent Advancements, Issues And Prospects, Vinay Gugueoth, Sunitha Safavat, Sachin Shetty

Electrical & Computer Engineering Faculty Publications

There is a great demand for an efficient security framework which can secure IoT systems from potential adversarial attacks. However, it is challenging to design a suitable security model for IoT considering the dynamic and distributed nature of IoT. This motivates the researchers to focus more on investigating the role of machine learning (ML) in the designing of security models. A brief analysis of different ML algorithms for IoT security is discussed along with the advantages and limitations of ML algorithms. Existing studies state that ML algorithms suffer from the problem of high computational overhead and risk of privacy leakage. …


Technology Adoption Of Computer-Aided Instruction In Healthcare: A Structured Review, Queenie Kate Cabanilla, Frevy Teofilo-Orencia, Rentor Cafino, Armando T. Isla Jr., Jehan Grace Maglaya, Xavier-Lewis Palmer, Lucas Potter, Dave E. Marcial, Lemuel Clark Velasco Jan 2023

Technology Adoption Of Computer-Aided Instruction In Healthcare: A Structured Review, Queenie Kate Cabanilla, Frevy Teofilo-Orencia, Rentor Cafino, Armando T. Isla Jr., Jehan Grace Maglaya, Xavier-Lewis Palmer, Lucas Potter, Dave E. Marcial, Lemuel Clark Velasco

Electrical & Computer Engineering Faculty Publications

Computer-Aided Instruction (CAI) is one of the interactive teaching methods that electronically presents instructional resources and enhances learner performance. In health settings, using CAI is one of the important ways to improve learners' knowledge and usefulness in their healthcare specialization yet there is still a lack of research that offers a comprehensive synthesis of investigating into the adoption of CAI in healthcare. This research aims to provide a comprehensive review of related literatures on the enablers and barriers for technology adoption of CAI in healthcare. 31 journals were analyzed and revealed that several studies were utilizing the Unified Theory of …


An Optimized And Scalable Blockchain-Based Distributed Learning Platform For Consumer Iot, Zhaocheng Wang, Xueying Liu, Xinming Shao, Abdullah Alghamdi, Md. Shirajum Munir, Sujit Biswas Jan 2023

An Optimized And Scalable Blockchain-Based Distributed Learning Platform For Consumer Iot, Zhaocheng Wang, Xueying Liu, Xinming Shao, Abdullah Alghamdi, Md. Shirajum Munir, Sujit Biswas

School of Cybersecurity Faculty Publications

Consumer Internet of Things (CIoT) manufacturers seek customer feedback to enhance their products and services, creating a smart ecosystem, like a smart home. Due to security and privacy concerns, blockchain-based federated learning (BCFL) ecosystems can let CIoT manufacturers update their machine learning (ML) models using end-user data. Federated learning (FL) uses privacy-preserving ML techniques to forecast customers' needs and consumption habits, and blockchain replaces the centralized aggregator to safeguard the ecosystem. However, blockchain technology (BCT) struggles with scalability and quick ledger expansion. In BCFL, local model generation and secure aggregation are other issues. This research introduces a novel architecture, emphasizing …


Robustembed: Robust Sentence Embeddings Using Self-Supervised Contrastive Pre-Training, Javad Asl, Eduardo Blanco, Daniel Takabi Jan 2023

Robustembed: Robust Sentence Embeddings Using Self-Supervised Contrastive Pre-Training, Javad Asl, Eduardo Blanco, Daniel Takabi

School of Cybersecurity Faculty Publications

Pre-trained language models (PLMs) have demonstrated their exceptional performance across a wide range of natural language processing tasks. The utilization of PLM-based sentence embeddings enables the generation of contextual representations that capture rich semantic information. However, despite their success with unseen samples, current PLM-based representations suffer from poor robustness in adversarial scenarios. In this paper, we propose RobustEmbed, a self-supervised sentence embedding framework that enhances both generalization and robustness in various text representation tasks and against diverse adversarial attacks. By generating high-risk adversarial perturbations to promote higher invariance in the embedding space and leveraging the perturbation within a novel contrastive …


Modeling Wealth Distribution In A Society, Dylan Berns, Peihsien Sun, Adrian V. Gheorghe Jan 2023

Modeling Wealth Distribution In A Society, Dylan Berns, Peihsien Sun, Adrian V. Gheorghe

Engineering Management & Systems Engineering Faculty Publications

The interconnectedness of social mood, changing dynamics, income inequality, and wealth distribution underscores the complexity of understanding and addressing these issues. This complexity inspires researchers to develop models and conduct further research to gain insights into the mechanisms driving income inequality and wealth distribution. By studying these phenomena more comprehensively, one can aim to develop strategies and policies that promote a more equitable distribution of wealth and opportunities, thereby fostering social stability and economic prosperity. In the present paper, there was build a model on wealth distribution and income inequality to help people understand the complexities of wealth inequality and …


A Structure-Aware Generative Adversarial Network For Bilingual Lexicon Induction, Bocheng Han, Qian Tao, Lusi Li, Zhihao Xiong Jan 2023

A Structure-Aware Generative Adversarial Network For Bilingual Lexicon Induction, Bocheng Han, Qian Tao, Lusi Li, Zhihao Xiong

Computer Science Faculty Publications

Bilingual lexicon induction (BLI) is the task of inducing word translations with a learned mapping function that aligns monolingual word embedding spaces in two different languages. However, most previous methods treat word embeddings as isolated entities and fail to jointly consider both the intra-space and inter-space topological relations between words. This limitation makes it challenging to align words from embedding spaces with distinct topological structures, especially when the assumption of isomorphism may not hold. To this end, we propose a novel approach called the Structure-Aware Generative Adversarial Network (SA-GAN) model to explicitly capture multiple topological structure information to achieve accurate …


Hashes Are Not Suitable To Verify Fixity Of The Public Archived Web, Mohamed Aturban, Martin Klein, Herbert Van De Sompel, Sawood Alam, Michael L. Nelson, Michele C. Weigle Jan 2023

Hashes Are Not Suitable To Verify Fixity Of The Public Archived Web, Mohamed Aturban, Martin Klein, Herbert Van De Sompel, Sawood Alam, Michael L. Nelson, Michele C. Weigle

Computer Science Faculty Publications

Web archives, such as the Internet Archive, preserve the web and allow access to prior states of web pages. We implicitly trust their versions of archived pages, but as their role moves from preserving curios of the past to facilitating present day adjudication, we are concerned with verifying the fixity of archived web pages, or mementos, to ensure they have always remained unaltered. A widely used technique in digital preservation to verify the fixity of an archived resource is to periodically compute a cryptographic hash value on a resource and then compare it with a previous hash value. If the …


Efficient Gpu Implementation Of Automatic Differentiation For Computational Fluid Dynamics, Mohammad Zubair, Desh Ranjan, Aaron Walden, Gabriel Nastac, Eric Nielsen, Boris Diskin, Marc Paterno, Samuel Jung, Joshua Hoke Davis Jan 2023

Efficient Gpu Implementation Of Automatic Differentiation For Computational Fluid Dynamics, Mohammad Zubair, Desh Ranjan, Aaron Walden, Gabriel Nastac, Eric Nielsen, Boris Diskin, Marc Paterno, Samuel Jung, Joshua Hoke Davis

Computer Science Faculty Publications

Many scientific and engineering applications require repeated calculations of derivatives of output functions with respect to input parameters. Automatic Differentiation (AD) is a method that automates derivative calculations and can significantly speed up code development. In Computational Fluid Dynamics (CFD), derivatives of flux functions with respect to state variables (Jacobian) are needed for efficient solutions of the nonlinear governing equations. AD of flux functions on graphics processing units (GPUs) is challenging as flux computations involve many intermediate variables that create high register pressure and require significant memory traffic because of the need to store the derivatives. This paper presents a …


Are Ride-Hailing Services Safer Than Taxis? A Multivariate Spatial Approach With Accomodation Of Exposure Uncertainty, Guocong Zhai, Kun Xie, Hong Yang, Di Yang Jan 2023

Are Ride-Hailing Services Safer Than Taxis? A Multivariate Spatial Approach With Accomodation Of Exposure Uncertainty, Guocong Zhai, Kun Xie, Hong Yang, Di Yang

Civil & Environmental Engineering Faculty Publications

Despite many research efforts on ride-hailing services and taxis, limited studies have compared the safety performance of the two modes. A major challenge is the need for reliable mode-specific exposure data to model their safety outcomes. Moreover, crash frequencies of the two modes by injury severities tend to be spatially and inherently correlated. To fully address these issues, this study proposes a novel multivariate conditional autoregressive model considering measurement errors in mode-specific exposures (MVCARME). More specially, a classical measurement error structure is used to accommodate the uncertainty of mode-specific exposures estimated, and a multivariate spatial specification is adopted to capture …


An Overview Of Bidirectional Electric Vehicles Charging System As A Vehicle To Anything (V2x) Under Cyber–Physical Power System (Cpps), Onur Elma, Umit Cali, Murat Kuzlu Dec 2022

An Overview Of Bidirectional Electric Vehicles Charging System As A Vehicle To Anything (V2x) Under Cyber–Physical Power System (Cpps), Onur Elma, Umit Cali, Murat Kuzlu

Engineering Technology Faculty Publications

Nowadays, EVs are rapidly increasing in popularity, and are accepted as the vehicles of the future all over the world. The most important components are their battery and charging systems. The energy capacity of EVs’ batteries has a significant potential to supply different energy requirements. Therefore, EVs must be designed in accordance with bidirectional power flow, and Electric Vehicle Supply Equipment (EVSE) should be upgraded as Electric Vehicle Power Exchange Equipment (EVPE). This power exchange infrastructure can be called Vehicle-to-Anything (V2X). V2X will also be the key solution for energy grids of the future that will turn into a much …


Applications Of Blockchain In Business Processes: A Comprehensive Review, Wattana Viriyasitavat, Li Xu, Dusit Niyato, Zhuming Bi, Danupol Hoonsopon Nov 2022

Applications Of Blockchain In Business Processes: A Comprehensive Review, Wattana Viriyasitavat, Li Xu, Dusit Niyato, Zhuming Bi, Danupol Hoonsopon

Information Technology & Decision Sciences Faculty Publications

Blockchain (BC), as an emerging technology, is revolutionizing Business Process Management (BPM) in multiple ways. The main adoption is to serve as a trusted infrastructure to guarantee the trust of collaborations among multiple partners in trustless environments. Especially, BC enables trust of information by using Distributed Ledger Technology (DLT). With the power of smart contracts, BC enforces the obligations of counterparties that transact in a business process (BP) by programming the contracts as transactions. This paper aims to study the state-of-the-art of BC technologies by (1) exploring its applications in BPM with the focus on how BC provides the trust …


Monocular Camera Viewpoint-Invariant Vehicular Traffic Segmentation And Classification Utilizing Small Datasets, Amr Yousef, Jeff Flora, Khan Iftekharuddin Oct 2022

Monocular Camera Viewpoint-Invariant Vehicular Traffic Segmentation And Classification Utilizing Small Datasets, Amr Yousef, Jeff Flora, Khan Iftekharuddin

Electrical & Computer Engineering Faculty Publications

The work presented here develops a computer vision framework that is view angle independent for vehicle segmentation and classification from roadway traffic systems installed by the Virginia Department of Transportation (VDOT). An automated technique for extracting a region of interest is discussed to speed up the processing. The VDOT traffic videos are analyzed for vehicle segmentation using an improved robust low-rank matrix decomposition technique. It presents a new and effective thresholding method that improves segmentation accuracy and simultaneously speeds up the segmentation processing. Size and shape physical descriptors from morphological properties and textural features from the Histogram of Oriented Gradients …


Integrating Plcs With Robot Motion Control In Engineering Capstone Courses, Sanjeevi Chitikeshi, Shirshak K. Dhali, Vukica Jovanovic Aug 2022

Integrating Plcs With Robot Motion Control In Engineering Capstone Courses, Sanjeevi Chitikeshi, Shirshak K. Dhali, Vukica Jovanovic

Engineering Technology Faculty Publications

Robotic motion control methods and Programmable Logic Controllers (PLCs) are critical in engineering automation and process control applications. In most manufacturing and automation processes, robots are used for moving parts and are controlled by industrial PLCs. Proper integration of external I/O devices, sensors and actuating motors with PLC input and output cards is very important to run the process smoothly without any faults and/or safety concerns. Most traditional electrical and computer engineering (ECE) programs offer high level of motion theory and controls but little hands-on exposure to PLCs which are the main industrial controllers. This paper provides a framework for …


Measuring The Rol Of Digital Engineering: It's A Journey, Not A Number, Tom Mcdermott, Kaitlin Henderson, Eileen Van Aken, Alejandro Salado, Joseph Bradley Jul 2022

Measuring The Rol Of Digital Engineering: It's A Journey, Not A Number, Tom Mcdermott, Kaitlin Henderson, Eileen Van Aken, Alejandro Salado, Joseph Bradley

Engineering Management & Systems Engineering Faculty Publications

Systems engineering as a discipline has long had difficulty providing quantifiable evidence of its value (Honour 2004); DE transformation provides an opportunity to better measure its value. Transitioning from a document-based to a model-based approach is expensive, and organizations want to know if the effort and cost to adopt MBSE is worth it.


Runtime Energy Savings Based On Machine Learning Models For Multicore Applications, Vaibhav Sundriyal, Masha Sosonkina Jun 2022

Runtime Energy Savings Based On Machine Learning Models For Multicore Applications, Vaibhav Sundriyal, Masha Sosonkina

Electrical & Computer Engineering Faculty Publications

To improve the power consumption of parallel applications at the runtime, modern processors provide frequency scaling and power limiting capabilities. In this work, a runtime strategy is proposed to maximize energy savings under a given performance degradation. Machine learning techniques were utilized to develop performance models which would provide accurate performance prediction with change in operating core-uncore frequency. Experiments, performed on a node (28 cores) of a modern computing platform showed significant energy savings of as much as 26% with performance degradation of as low as 5% under the proposed strategy compared with the execution in the unlimited power case.


Agile Research - Getting Beyond The Buzzword, Trupti Narayan Rane Jan 2022

Agile Research - Getting Beyond The Buzzword, Trupti Narayan Rane

Engineering Management & Systems Engineering Faculty Publications

"Oh yeah, we're an Agile shop, we gave up Waterfall years ago." - product owners, managers, or could be anyone else. You will seldom have a conversation with a product or software development team member without the agile buzzword thrown at you at the drop of a hat. It would not be an oversell to say that Agile software development has been adopted at a large scale across several big and small organizations. Clearly, Agile is an ideology that is working, which made me explore more on its applicability in research. As someone who has been in the Information Technology …


Spectrum Sensing With Energy Detection In Multiple Alternating Time Slots, Călin Vlădeanu, Alexandru Marţian, Dimitrie C. Popescu Jan 2022

Spectrum Sensing With Energy Detection In Multiple Alternating Time Slots, Călin Vlădeanu, Alexandru Marţian, Dimitrie C. Popescu

Electrical & Computer Engineering Faculty Publications

Energy detection (ED) represents a low complexity approach used by secondary users (SU) to sense spectrum occupancy by primary users (PU) in cognitive radio (CR) systems. In this paper, we present a new algorithm that senses the spectrum occupancy by performing ED in K consecutive sensing time slots starting from the current slot and continuing by alternating before and after the current slot. We consider a PU traffic model specified in terms of an average duty cycle value, and derive analytical expressions for the false alarm probability (FAP) and correct detection probability (CDP) for any value of K . Our …


A Literature Review On Combining Heuristics And Exact Algorithms In Combinatorial Optimization, Hesamoddin Tahami, Hengameh Fakhravar Jan 2022

A Literature Review On Combining Heuristics And Exact Algorithms In Combinatorial Optimization, Hesamoddin Tahami, Hengameh Fakhravar

Engineering Management & Systems Engineering Faculty Publications

There are several approaches for solving hard optimization problems. Mathematical programming techniques such as (integer) linear programming-based methods and metaheuristic approaches are two extremely effective streams for combinatorial problems. Different research streams, more or less in isolation from one another, created these two. Only several years ago, many scholars noticed the advantages and enormous potential of building hybrids of combining mathematical programming methodologies and metaheuristics. In reality, many problems can be solved much better by exploiting synergies between these approaches than by “pure” classical algorithms. The key question is how to integrate mathematical programming methods and metaheuristics to achieve such …


Core Point Pixel-Level Localization By Fingerprint Features In Spatial Domain, Xueyi Ye, Yuzhong Shen, Maosheng Zeng, Yirui Liu, Huahua Chen, Zhijing Zhao Jan 2022

Core Point Pixel-Level Localization By Fingerprint Features In Spatial Domain, Xueyi Ye, Yuzhong Shen, Maosheng Zeng, Yirui Liu, Huahua Chen, Zhijing Zhao

Computational Modeling & Simulation Engineering Faculty Publications

Singular point detection is a primary step in fingerprint recognition, especially for fingerprint alignment and classification. But in present there are still some problems and challenges such as more false-positive singular points or inaccurate reference point localization. This paper proposes an accurate core point localization method based on spatial domain features of fingerprint images from a completely different viewpoint to improve the fingerprint core point displacement problem of singular point detection. The method first defines new fingerprint features, called furcation and confluence, to represent specific ridge/valley distribution in a core point area, and uses them to extract the innermost Curve …


Bfv-Based Homomorphic Encryption For Privacy-Preserving Cnn Models, Febrianti Wibawa, Ferhat Ozgur Catak, Salih Sarp, Murat Kuzlu Jan 2022

Bfv-Based Homomorphic Encryption For Privacy-Preserving Cnn Models, Febrianti Wibawa, Ferhat Ozgur Catak, Salih Sarp, Murat Kuzlu

Engineering Technology Faculty Publications

Medical data is frequently quite sensitive in terms of data privacy and security. Federated learning has been used to increase the privacy and security of medical data, which is a sort of machine learning technique. The training data is disseminated across numerous machines in federated learning, and the learning process is collaborative. There are numerous privacy attacks on deep learning (DL) models that attackers can use to obtain sensitive information. As a result, the DL model should be safeguarded from adversarial attacks, particularly in medical data applications. Homomorphic encryption-based model security from the adversarial collaborator is one of the answers …


Can We Make Our Robot Play Soccer? Influence Of Collaborating With Preservice Teachers And Fifth Graders On Undergraduate Engineering Students' Learning During A Robotic Design Process (Work In Progress), Krishnanand Kaipa, Jennifer Kidd, Julia Noginova, Francisco Cima, Stacie Ringleb, Orlando Ayala, Pilar Pazos, Kristie Gutierrez, Min Jung Lee Jan 2022

Can We Make Our Robot Play Soccer? Influence Of Collaborating With Preservice Teachers And Fifth Graders On Undergraduate Engineering Students' Learning During A Robotic Design Process (Work In Progress), Krishnanand Kaipa, Jennifer Kidd, Julia Noginova, Francisco Cima, Stacie Ringleb, Orlando Ayala, Pilar Pazos, Kristie Gutierrez, Min Jung Lee

Mechanical & Aerospace Engineering Faculty Publications

This work-in-progress paper describes engineering students’ experiences in an NSF-funded project that partnered undergraduate engineering students with pre-service teachers to plan and deliver robotics lessons to fifth graders at a local school. This project aims to address an apparent gap between what is taught in academia and industry’s expectations of engineers to integrate perspectives from outside their field to solve modern societal problems requiring a multidisciplinary approach. Working in small teams over Zoom, participating engineering, education, and fifth grade students designed, built, and coded bio-inspired COVID companion robots. The goal for the engineering students was to build new interprofessional skills, …


Supporting Transportation System Management And Operations Using Internet Of Things Technology, Hong Yang, Yuzhong Shen, Mecit Cetin, Zhenyu Wang May 2021

Supporting Transportation System Management And Operations Using Internet Of Things Technology, Hong Yang, Yuzhong Shen, Mecit Cetin, Zhenyu Wang

Computational Modeling & Simulation Engineering Faculty Publications

Low power wide-area network (LPWAN) technology aims to provide long range and low power wireless communication. It can serve as an alternative technology for data transmissions in many application scenarios (e.g., parking monitoring and remote flood sensing). In order to explore its feasibility in transportation systems, this project conducted a review of relevant literature to understand the current status of LPWAN applications. An online survey that targeted professionals concerned with transportation was also developed to elicit input about their experiences in using LPWAN technology for their projects. The literature review and survey results showed that LPWAN’s application in the U.S. …


Wg2An: Synthetic Wound Image Generation Using Generative Adversarial Network, Salih Sarp, Murat Kuzlu, Emmanuel Wilson, Ozgur Guler Mar 2021

Wg2An: Synthetic Wound Image Generation Using Generative Adversarial Network, Salih Sarp, Murat Kuzlu, Emmanuel Wilson, Ozgur Guler

Engineering Technology Faculty Publications

In part due to its ability to mimic any data distribution, Generative Adversarial Network (GAN) algorithms have been successfully applied to many applications, such as data augmentation, text-to-image translation, image-to-image translation, and image inpainting. Learning from data without crafting loss functions for each application provides broader applicability of the GAN algorithm. Medical image synthesis is also another field that the GAN algorithm has great potential to assist clinician training. This paper proposes a synthetic wound image generation model based on GAN architecture to increase the quality of clinical training. The proposed model is trained on chronic wound datasets with various …


Role Of Artificial Intelligence In The Internet Of Things (Iot) Cybersecurity, Murat Kuzlu, Corinne Fair, Ozgur Guler Feb 2021

Role Of Artificial Intelligence In The Internet Of Things (Iot) Cybersecurity, Murat Kuzlu, Corinne Fair, Ozgur Guler

Engineering Technology Faculty Publications

In recent years, the use of the Internet of Things (IoT) has increased exponentially, and cybersecurity concerns have increased along with it. On the cutting edge of cybersecurity is Artificial Intelligence (AI), which is used for the development of complex algorithms to protect networks and systems, including IoT systems. However, cyber-attackers have figured out how to exploit AI and have even begun to use adversarial AI in order to carry out cybersecurity attacks. This review paper compiles information from several other surveys and research papers regarding IoT, AI, and attacks with and against AI and explores the relationship between these …


Modeling The Effects Of Religious Belief And Affiliation On Prosociality, Luke Galen, Ross Gore, F. Leron Shults Jan 2021

Modeling The Effects Of Religious Belief And Affiliation On Prosociality, Luke Galen, Ross Gore, F. Leron Shults

VMASC Publications

To what extent do supernatural beliefs, group affiliation, and social interaction produce values and behaviors that benefit others, i.e., prosociality? Addressing this question involves multiple variables interacting within complex social networks that shape and constrain the beliefs and behaviors of individuals. We examine the relationships among some of these factors utilizing data from the World Values Survey to inform the construction of an Agent-Based Model. The latter was able to identify the conditions under which - and the mechanisms by which - the prosociality of simulated agents was increased or decreased within an "artificial society" designed to reflect real world …


Vind: A Blockchain-Enabled Supply Chain Provenance Framework For Energy Delivery Systems, Eranga Bandara, Sachin Shetty, Deepak Tosh, Xueping Liang Jan 2021

Vind: A Blockchain-Enabled Supply Chain Provenance Framework For Energy Delivery Systems, Eranga Bandara, Sachin Shetty, Deepak Tosh, Xueping Liang

VMASC Publications

Enterprise-level energy delivery systems (EDSs) depend on different software or hardware vendors to achieve operational efficiency. Critical components of these systems are typically manufactured and integrated by overseas suppliers, which expands the attack surface to adversaries with additional opportunities to infiltrate into EDSs. Due to this reason, the risk management of the EDS supply chain is crucial to ensure that we are knowledgeable about the vulnerabilities in software and hardware components that comprise any critical part, quantifiable risk metrics to assess the severity and exploitability of the attack, and provide remediation solutions that can influence a prioritized mitigation plan. There …