Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Electrical and Computer Engineering (5)
- Computer Sciences (4)
- Physical Sciences and Mathematics (4)
- Digital Communications and Networking (3)
- Medicine and Health Sciences (2)
-
- Signal Processing (2)
- Aerospace Engineering (1)
- Automotive Engineering (1)
- Data Science (1)
- Industrial Engineering (1)
- Medical Specialties (1)
- Navigation, Guidance, Control and Dynamics (1)
- Navigation, Guidance, Control, and Dynamics (1)
- Oncology (1)
- Operations Research, Systems Engineering and Industrial Engineering (1)
- Other Computer Engineering (1)
- Other Computer Sciences (1)
- Robotics (1)
- Systems and Communications (1)
- Institution
- Publication
-
- Articles (2)
- Department of Electrical and Computer Engineering: Faculty Publications (2)
- Computer Science Faculty Publications and Presentations (1)
- Department of Computer Science and Engineering: Dissertations, Theses, and Student Research (1)
- Electrical & Computer Engineering Faculty Publications (1)
Articles 1 - 10 of 10
Full-Text Articles in Computer Engineering
Sequential Frame-Interpolation And Dct-Based Video Compression Framework, Yeganeh Jalalpour, Wu-Chi Feng, Feng Liu
Sequential Frame-Interpolation And Dct-Based Video Compression Framework, Yeganeh Jalalpour, Wu-Chi Feng, Feng Liu
Computer Science Faculty Publications and Presentations
Video data is ubiquitous; capturing, transferring, and storing even compressed video data is challenging because it requires substantial resources. With the large amount of video traffic being transmitted on the internet, any improvement in compressing such data, even small, can drastically impact resource consumption. In this paper, we present a hybrid video compression framework that unites the advantages of both DCT-based and interpolation-based video compression methods in a single framework. We show that our work can deliver the same visual quality or, in some cases, improve visual quality while reducing the bandwidth by 10--20%.
Design Of Secure Communication Schemes To Provide Authentication And Integrity Among The Iot Devices, Vidya Rao Dr.
Design Of Secure Communication Schemes To Provide Authentication And Integrity Among The Iot Devices, Vidya Rao Dr.
Technical Collection
The fast growth in Internet-of-Things (IoT) based applications, has increased the number of end-devices communicating over the Internet. The end devices are made with fewer resources and are low battery-powered. These resource-constrained devices are exposed to various security and privacy concerns over publicly available Internet communication. Thus, it becomes essential to provide lightweight security solutions to safeguard data and user privacy. Elliptic Curve Cryptography (ECC) can be used to generate the digital signature and also encrypt the data. The method can be evaluated on a real-time testbed deployed using Raspberry Pi3 devices and every message transmitted is subjected to ECC. …
Sers Spectroscopy With Machine Learning To Analyze Human Plasma Derived Sevs For Coronary Artery Disease Diagnosis And Prognosis, Xi Huang, Bo Liu, Shenghan Guo, Weihong Guo, Ke Liao, Guoku Hu, Wen Shi, Mitchell Kuss, Michael J. Duryee, Daniel R. Anderson, Yongfeng Lu, Bin Duan
Sers Spectroscopy With Machine Learning To Analyze Human Plasma Derived Sevs For Coronary Artery Disease Diagnosis And Prognosis, Xi Huang, Bo Liu, Shenghan Guo, Weihong Guo, Ke Liao, Guoku Hu, Wen Shi, Mitchell Kuss, Michael J. Duryee, Daniel R. Anderson, Yongfeng Lu, Bin Duan
Department of Electrical and Computer Engineering: Faculty Publications
Coronary artery disease (CAD) is one of the major cardiovascular diseases and represents the leading causes of global mortality. Developing new diagnostic and therapeutic approaches for CAD treatment are critically needed, especially for an early accurate CAD detection and further timely intervention. In this study, we successfully isolated human plasma small extracellular vesicles (sEVs) from four stages of CAD patients, that is, healthy control, stable plaque, non-ST-elevation myocardial infarction, and ST-elevation myocardial infarction. Surface-enhanced Raman scattering (SERS) measurement in conjunction with five machine learning approaches, including Quadratic Discriminant Analysis, Support Vector Machine (SVM), K-Nearest Neighbor, Artificial Neural network, were then …
Sers Spectroscopy With Machine Learning To Analyze Human Plasma Derived Sevs For Coronary Artery Disease Diagnosis And Prognosis, Xi Huang, Bo Liu, Shenghan Guo, Weihong Guo, Ke Liao, Guoku Hu, Wen Shi, Mitchell Kuss, Michael J. Duryee, Daniel R. Anderson, Yongfeng Lu, Bin Duan
Sers Spectroscopy With Machine Learning To Analyze Human Plasma Derived Sevs For Coronary Artery Disease Diagnosis And Prognosis, Xi Huang, Bo Liu, Shenghan Guo, Weihong Guo, Ke Liao, Guoku Hu, Wen Shi, Mitchell Kuss, Michael J. Duryee, Daniel R. Anderson, Yongfeng Lu, Bin Duan
Department of Electrical and Computer Engineering: Faculty Publications
Coronary artery disease (CAD) is one of the major cardiovascular diseases and represents the leading causes of global mortality. Developing new diagnostic and therapeutic approaches for CAD treatment are critically needed, especially for an early accurate CAD detection and further timely intervention. In this study, we successfully isolated human plasma small extracellular vesicles (sEVs) from four stages of CAD patients, that is, healthy control, stable plaque, non-ST-elevation myocardial infarction, and ST-elevation myocardial infarction. Surface-enhanced Raman scattering (SERS) measurement in conjunction with five machine learning approaches, including Quadratic Discriminant Analysis, Support Vector Machine (SVM), K-Nearest Neighbor, Artificial Neural network, were then …
Runtime Energy Savings Based On Machine Learning Models For Multicore Applications, Vaibhav Sundriyal, Masha Sosonkina
Runtime Energy Savings Based On Machine Learning Models For Multicore Applications, Vaibhav Sundriyal, Masha Sosonkina
Electrical & Computer Engineering Faculty Publications
To improve the power consumption of parallel applications at the runtime, modern processors provide frequency scaling and power limiting capabilities. In this work, a runtime strategy is proposed to maximize energy savings under a given performance degradation. Machine learning techniques were utilized to develop performance models which would provide accurate performance prediction with change in operating core-uncore frequency. Experiments, performed on a node (28 cores) of a modern computing platform showed significant energy savings of as much as 26% with performance degradation of as low as 5% under the proposed strategy compared with the execution in the unlimited power case.
Ml-Based Online Traffic Classification For Sdns, Mohammed Nsaif, Gergely Kovasznai, Mohammed Abboosh, Ali Malik, Ruairí De Fréin
Ml-Based Online Traffic Classification For Sdns, Mohammed Nsaif, Gergely Kovasznai, Mohammed Abboosh, Ali Malik, Ruairí De Fréin
Articles
Traffic classification is a crucial aspect for Software-Defined Networking functionalities. This paper is a part of an on-going project aiming at optimizing power consumption in the environment of software-defined datacenter networks. We have developed a novel routing strategy that can blindly balance between the power consumption and the quality of service for the incoming traffic flows. In this paper, we demonstrate how to classify the network traffic flows so that the quality of service of each flow-class can be guaranteed efficiently. This is achieved by creating a dataset that encompasses different types of network traffic such as video, VoIP, game …
Machine Learning-Based Device Type Classification For Iot Device Re- And Continuous Authentication, Kaustubh Gupta
Machine Learning-Based Device Type Classification For Iot Device Re- And Continuous Authentication, Kaustubh Gupta
Department of Computer Science and Engineering: Dissertations, Theses, and Student Research
Today, the use of Internet of Things (IoT) devices is higher than ever and it is growing rapidly. Many IoT devices are usually manufactured by home appliance manufacturers where security and privacy are not the foremost concern. When an IoT device is connected to a network, currently there does not exist a strict authentication method that verifies the identity of the device, allowing any rogue IoT device to authenticate to an access point. This thesis addresses the issue by introducing methods for continuous and re-authentication of static and dynamic IoT devices, respectively. We introduce mechanisms and protocols for authenticating a …
A Brief Literature Review For Machine Learning In Autonomous Robotic Navigation, Jake Biddy, Jeremy Evert
A Brief Literature Review For Machine Learning In Autonomous Robotic Navigation, Jake Biddy, Jeremy Evert
Student Research
Machine learning is becoming very popular in many technological aspects worldwide, including robotic applications. One of the unique aspects of using machine learning in robotics is that it no longer requires the user to program every situation. The robotic application will be able to learn and adapt from its mistakes. In most situations, robotics using machine learning is designed to fulfill a task better than a human could, and with the machine learning aspect, it can function at the highest level of efficiency and quality. However, creating a machine learning program requires extensive coding and programming knowledge that can be …
Machine Learning Based Medical Image Deepfake Detection: A Comparative Study, Siddharth Solaiyappan, Yuxin Wen
Machine Learning Based Medical Image Deepfake Detection: A Comparative Study, Siddharth Solaiyappan, Yuxin Wen
Engineering Faculty Articles and Research
Deep generative networks in recent years have reinforced the need for caution while consuming various modalities of digital information. One avenue of deepfake creation is aligned with injection and removal of tumors from medical scans. Failure to detect medical deepfakes can lead to large setbacks on hospital resources or even loss of life. This paper attempts to address the detection of such attacks with a structured case study. Specifically, we evaluate eight different machine learning algorithms, which include three conventional machine learning methods (Support Vector Machine, Random Forest, Decision Tree) and five deep learning models (DenseNet121, DenseNet201, ResNet50, ResNet101, VGG19) …
Exploring The Concept Of The Digital Educator During Covid-19, Fernando Jimenez, Gracia Sanchez, Jose Palma, Luis Miralles-Pechuán, Juan A. Botia
Exploring The Concept Of The Digital Educator During Covid-19, Fernando Jimenez, Gracia Sanchez, Jose Palma, Luis Miralles-Pechuán, Juan A. Botia
Articles
T In many machine learning classification problems, datasets are usually of high dimensionality and therefore require efficient and effective methods for identifying the relative importance of their attributes, eliminating the redundant and irrelevant ones. Due to the huge size of the search space of the possible solutions, the attribute subset evaluation feature selection methods are not very suitable, so in these scenarios feature ranking methods are used. Most of the feature ranking methods described in the literature are univariate methods, which do not detect interactions between factors. In this paper, we propose two new multivariate feature ranking methods based on …