Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

2022

Series

Physical Sciences and Mathematics

Institution
Keyword
Publication

Articles 1 - 30 of 95

Full-Text Articles in Computer Engineering

Enhanced Neurologic Concept Recognition Using A Named Entity Recognition Model Based On Transformers, Sima Azizi, Daniel B. Hier, Donald C. Wunsch Dec 2022

Enhanced Neurologic Concept Recognition Using A Named Entity Recognition Model Based On Transformers, Sima Azizi, Daniel B. Hier, Donald C. Wunsch

Chemistry Faculty Research & Creative Works

Although Deep Learning Has Been Applied to the Recognition of Diseases and Drugs in Electronic Health Records and the Biomedical Literature, Relatively Little Study Has Been Devoted to the Utility of Deep Learning for the Recognition of Signs and Symptoms. the Recognition of Signs and Symptoms is Critical to the Success of Deep Phenotyping and Precision Medicine. We Have Developed a Named Entity Recognition Model that Uses Deep Learning to Identify Text Spans Containing Neurological Signs and Symptoms and Then Maps These Text Spans to the Clinical Concepts of a Neuro-Ontology. We Compared a Model based on Convolutional Neural Networks …


An Empirical Study On The Classification Of Python Language Features Using Eye-Tracking, Jigyasa Chauhan Dec 2022

An Empirical Study On The Classification Of Python Language Features Using Eye-Tracking, Jigyasa Chauhan

Department of Computer Science and Engineering: Dissertations, Theses, and Student Research

Python, currently one of the most popular programming languages, is an object-
oriented language that also provides language feature support for other programming
paradigms, such as functional and procedural. It is not currently understood how
support for multiple paradigms affects the ability of developers to comprehend that
code. Understanding the predominant paradigm in code, and how developers classify
the predominant paradigm, can benefit future research in program comprehension as
the paradigm may factor into how people comprehend that code. Other researchers
may want to look at how the paradigms in the code interact with various code smells.
To investigate how …


Attention In The Faithful Self-Explanatory Nlp Models, Mostafa Rafaiejokandan Dec 2022

Attention In The Faithful Self-Explanatory Nlp Models, Mostafa Rafaiejokandan

Department of Computer Science and Engineering: Dissertations, Theses, and Student Research

Deep neural networks (DNNs) can perform impressively in many natural language processing (NLP) tasks, but their black-box nature makes them inherently challenging to explain or interpret. Self-Explanatory models are a new approach to overcoming this challenge, generating explanations in human-readable languages besides task objectives like answering questions. The main focus of this thesis is the explainability of NLP tasks, as well as how attention methods can help enhance performance. Three different attention modules are proposed, SimpleAttention, CrossSelfAttention, and CrossModality. It also includes a new dataset transformation method called Two-Documents that converts every dataset into two separate documents required by the …


Learnfca: A Fuzzy Fca And Probability Based Approach For Learning And Classification, Suraj Ketan Samal Dec 2022

Learnfca: A Fuzzy Fca And Probability Based Approach For Learning And Classification, Suraj Ketan Samal

Department of Computer Science and Engineering: Dissertations, Theses, and Student Research

Formal concept analysis(FCA) is a mathematical theory based on lattice and order theory used for data analysis and knowledge representation. Over the past several years, many of its extensions have been proposed and applied in several domains including data mining, machine learning, knowledge management, semantic web, software development, chemistry ,biology, medicine, data analytics, biology and ontology engineering.

This thesis reviews the state-of-the-art of theory of Formal Concept Analysis(FCA) and its various extensions that have been developed and well-studied in the past several years. We discuss their historical roots, reproduce the original definitions and derivations with illustrative examples. Further, we provide …


Bevers: A General, Simple, And Performant Framework For Automatic Fact Verification, Mitchell Dehaven Dec 2022

Bevers: A General, Simple, And Performant Framework For Automatic Fact Verification, Mitchell Dehaven

Department of Computer Science and Engineering: Dissertations, Theses, and Student Research

Fact verification has become an important process, primarily done manually by humans, to verify the authenticity of claims and statements made online. Increasingly, social media companies have utilized human effort to debunk false claims on their platforms, opting to either tag the content as misleading or false, or removing it entirely to combat misinformation on their sites. In tandem, the field of automatic fact verification has become a subject of focus among the natural language processing (NLP) community, spawning new datasets and research. The most popular dataset is the Fact Extraction and VERification (FEVER) dataset. In this thesis an end-to-end …


Sequence-Based Bioinformatics Approaches To Predict Virus-Host Relationships In Archaea And Eukaryotes, Yingshan Li Dec 2022

Sequence-Based Bioinformatics Approaches To Predict Virus-Host Relationships In Archaea And Eukaryotes, Yingshan Li

Department of Computer Science and Engineering: Dissertations, Theses, and Student Research

Viral metagenomics is independent of lab culturing and capable of investigating viromes of virtually any given environmental niches. While numerous sequences of viral genomes have been assembled from metagenomic studies over the past years, the natural hosts for the majority of these viral contigs have not been determined. Different computational approaches have been developed to predict hosts of bacteria phages. Nevertheless, little progress has been made in the virus-host prediction, especially for viruses that infect eukaryotes and archaea. In this study, by analyzing all documented viruses with known eukaryotic and archaeal hosts, we assessed the predictive power of four computational …


Mitigating Popularity Bias In Recommendation With Unbalanced Interactions: A Gradient Perspective, Weijieying Ren, Lei Wang, Kunpeng Liu, Ruocheng Guo, Ee-Peng Lim, Yanjie Fu Dec 2022

Mitigating Popularity Bias In Recommendation With Unbalanced Interactions: A Gradient Perspective, Weijieying Ren, Lei Wang, Kunpeng Liu, Ruocheng Guo, Ee-Peng Lim, Yanjie Fu

Research Collection School Of Computing and Information Systems

Recommender systems learn from historical user-item interactions to identify preferred items for target users. These observed interactions are usually unbalanced following a long-tailed distribution. Such long-tailed data lead to popularity bias to recommend popular but not personalized items to users. We present a gradient perspective to understand two negative impacts of popularity bias in recommendation model optimization: (i) the gradient direction of popular item embeddings is closer to that of positive interactions, and (ii) the magnitude of positive gradient for popular items are much greater than that of unpopular items. To address these issues, we propose a simple yet efficient …


A Pipeline To Generate Deep Learning Surrogates Of Genome-Scale Metabolic Models, Achilles Rasquinha Nov 2022

A Pipeline To Generate Deep Learning Surrogates Of Genome-Scale Metabolic Models, Achilles Rasquinha

Department of Computer Science and Engineering: Dissertations, Theses, and Student Research

Genome-Scale Metabolic Models (GEMMs) are powerful reconstructions of biological systems that help metabolic engineers understand and predict growth conditions subjected to various environmental factors around the cellular metabolism of an organism in observation, purely in silico. Applications of metabolic engineering range from perturbation analysis and drug-target discovery to predicting growth rates of biotechnologically important metabolites and reaction objectives within dierent single-cell and multi-cellular organism types. GEMMs use mathematical frameworks for quantitative estimations of flux distributions within metabolic networks. The reasons behind why an organism activates, stuns, or fluctuates between alternative pathways for growth and survival, however, remain relatively unknown. GEMMs …


A Patient-Specific Algorithm For Lung Segmentation In Chest Radiographs, Manawaduge Supun De Silva, Barath Narayanan Narayanan, Russell C. Hardie Nov 2022

A Patient-Specific Algorithm For Lung Segmentation In Chest Radiographs, Manawaduge Supun De Silva, Barath Narayanan Narayanan, Russell C. Hardie

Electrical and Computer Engineering Faculty Publications

Lung segmentation plays an important role in computer-aided detection and diagnosis using chest radiographs (CRs). Currently, the U-Net and DeepLabv3+ convolutional neural network architectures are widely used to perform CR lung segmentation. To boost performance, ensemble methods are often used, whereby probability map outputs from several networks operating on the same input image are averaged. However, not all networks perform adequately for any specific patient image, even if the average network performance is good. To address this, we present a novel multi-network ensemble method that employs a selector network. The selector network evaluates the segmentation outputs from several networks; on …


Computer Engineering Education, Marilyn Wolf Nov 2022

Computer Engineering Education, Marilyn Wolf

CSE Conference and Workshop Papers

Computer engineering is a rapidly evolving discipline. How should we teach it to our students?

This virtual roundtable on computer engineering education was conducted in summer 2022 over a combination of email and virtual meetings. The panel considered what topics are of importance to the computer engineering curriculum, what distinguishes computer engineering from related disciplines, and how computer engineering concepts should be taught.


Tau Kinetics In Alzheimer's Disease, Daniel B. Hier, Sima Azizi, Matthew S. Thimgan, Donald C. Wunsch Nov 2022

Tau Kinetics In Alzheimer's Disease, Daniel B. Hier, Sima Azizi, Matthew S. Thimgan, Donald C. Wunsch

Chemistry Faculty Research & Creative Works

The Cytoskeletal Protein Tau is Implicated in the Pathogenesis of Alzheimer's Disease Which is Characterized by Intra-Neuronal Neurofibrillary Tangles Containing Abnormally Phosphorylated Insoluble Tau. Levels of Soluble Tau Are Elevated in the Brain, the CSF, and the Plasma of Patients with Alzheimer's Disease. to Better Understand the Causes of These Elevated Levels of Tau, We Propose a Three-Compartment Kinetic Model (Brain, CSF, and Plasma). the Model Assumes that the Synthesis of Tau Follows Zero-Order Kinetics (Uncorrelated with Compartmental Tau Levels) and that the Release, Absorption, and Clearance of Tau is Governed by First-Order Kinetics (Linearly Related to Compartmental Tau Levels). …


Design Of Secure Communication Schemes To Provide Authentication And Integrity Among The Iot Devices, Vidya Rao Dr. Nov 2022

Design Of Secure Communication Schemes To Provide Authentication And Integrity Among The Iot Devices, Vidya Rao Dr.

Technical Collection

The fast growth in Internet-of-Things (IoT) based applications, has increased the number of end-devices communicating over the Internet. The end devices are made with fewer resources and are low battery-powered. These resource-constrained devices are exposed to various security and privacy concerns over publicly available Internet communication. Thus, it becomes essential to provide lightweight security solutions to safeguard data and user privacy. Elliptic Curve Cryptography (ECC) can be used to generate the digital signature and also encrypt the data. The method can be evaluated on a real-time testbed deployed using Raspberry Pi3 devices and every message transmitted is subjected to ECC. …


Quality Evaluation Of Agricultural And Food Products By Using Image Processing And Soft Computing Paradigm, Narendra Vg Nov 2022

Quality Evaluation Of Agricultural And Food Products By Using Image Processing And Soft Computing Paradigm, Narendra Vg

Technical Collection

My research interests revolve around the problem of quality evaluation of Agricultural and Food Products by using Image Processing and Soft Computing Paradigm. Much of my recent work focuses on develop a framework for quality evaluation of Edible Nuts using Computer Vision and Soft Computing Techniques. Also, my interest in developing a framework for defects recognition and classification of Fruits and Vegetables using deep learning methods. My research has also explored many problems related to Blockchain Technology while considering the supply chain management of Agricultural and Food products in between with formers, retailers, and consumers.

  1. http://doi.org/10.1109/DELCON54057.2022.9752836
  2. http://doi.org/10.1007/978-3-031-07012-9_56
  3. http://doi.org/10.1007/978-981-15-8603-3_30
  4. http://doi.org/10.1007/978-981-15-8603-3_29
  5. http://doi.org/10.1007/978-981-15-8603-3_29


Classification Of Mudra And Posture Images Of Bharatanatyam, Venkatesh Bhandage Dr. Nov 2022

Classification Of Mudra And Posture Images Of Bharatanatyam, Venkatesh Bhandage Dr.

Technical Collection

Bharatanatyam is an Indian classical dance form which has to be studies under the supervision of experts/gurus. In this modern era there is scarcity of Bharatanatyam teachers and also the youth is less fascinated towards the classical dance forms. To promote and propagate this Indian classical dance form it is required to take leverage of technology. Hence, the automatic classification of Mudras and Postures was attempted as part of the research work. The research work can be used in training the novice learners, to provide online commentary during the concerts and e-learning of Bharatanatyam dance. The research work can help …


Applications Of Blockchain In Business Processes: A Comprehensive Review, Wattana Viriyasitavat, Li Xu, Dusit Niyato, Zhuming Bi, Danupol Hoonsopon Nov 2022

Applications Of Blockchain In Business Processes: A Comprehensive Review, Wattana Viriyasitavat, Li Xu, Dusit Niyato, Zhuming Bi, Danupol Hoonsopon

Information Technology & Decision Sciences Faculty Publications

Blockchain (BC), as an emerging technology, is revolutionizing Business Process Management (BPM) in multiple ways. The main adoption is to serve as a trusted infrastructure to guarantee the trust of collaborations among multiple partners in trustless environments. Especially, BC enables trust of information by using Distributed Ledger Technology (DLT). With the power of smart contracts, BC enforces the obligations of counterparties that transact in a business process (BP) by programming the contracts as transactions. This paper aims to study the state-of-the-art of BC technologies by (1) exploring its applications in BPM with the focus on how BC provides the trust …


A Smart Parallel Gripper Industrial Automation System For Measurement Of Gripped Work Piece Thickness, Erik Kocher, Chukwuemeka George Ochieze, Ahmat Oumar, Travis Winter, Aleksandr Sergeyev, Mark Gauthier, Nathir Rawashdeh Nov 2022

A Smart Parallel Gripper Industrial Automation System For Measurement Of Gripped Work Piece Thickness, Erik Kocher, Chukwuemeka George Ochieze, Ahmat Oumar, Travis Winter, Aleksandr Sergeyev, Mark Gauthier, Nathir Rawashdeh

Michigan Tech Publications

As part of the advanced programmable logic controllers (PLC) course at Michigan Tech, this class project is performed on a mechatronics system gifted by Donald Engineering, a Michigan-based supplier of industrial automation systems and components. This paper explores the functionality and ladder programming of the smart parallel gripper system to measure the width of components grasped with the gripper. In addition, details of the system’s components, operation, more advanced uses are discussed. On the automation line, this smart gripper can be used to measure the thickness of work pieces while handling them and classifying these as either acceptable, too large …


Gesture Controlled Collaborative Robot Arm And Lab Kit, Abel A. Reyes, Skylar Reinhardt, Tony Wise, Nathir Rawashdeh, Sidike Paheding Nov 2022

Gesture Controlled Collaborative Robot Arm And Lab Kit, Abel A. Reyes, Skylar Reinhardt, Tony Wise, Nathir Rawashdeh, Sidike Paheding

Michigan Tech Publications

In this paper, a mechatronics system was designed and implemented to include the subjects of artificial intelligence, control algorithms, robot servo motor control, and human-machine interface (HMI). The goal was to create an inexpensive, multi-functional robotics lab kit to promote students’ interest in STEM fields including computing and mechtronics. Industrial robotic systems have become vastly popular in manufacturing and other industries, and the demand for individuals with related skills is rapidly increasing. Robots can complete jobs that are dangerous, dull, or dirty for humans to perform. Recently, more and more collaborative robotic systems have been developed and implemented in the …


Mechatronics Bachelor Curriculum Development In Light Of Industry 4.0 Technology Needs: Contrasting Us And German University Curricula, Paniz Hazaveh, Aleksandr Sergeyev, Nathir Rawashdeh Nov 2022

Mechatronics Bachelor Curriculum Development In Light Of Industry 4.0 Technology Needs: Contrasting Us And German University Curricula, Paniz Hazaveh, Aleksandr Sergeyev, Nathir Rawashdeh

Michigan Tech Publications

This study compares Mechatronics bachelor curricula at universities in the United States of America and German universities. Mechatronics education is relatively new in the United States, but has been common in Germany for over a decade. With the multidisciplinary nature of technologies required by the 4’th industrial revolution, a.k.a. Industry 4.0, composing an appropriate Mechatronics curriculum becomes a challenge and an opportunity. This paper studies how Mechatronics education can address the future needs of industry, while building on a specific university’s strengths and industry links. We have also analyzed the new undergraduate Mechatronics program at Michigan Technological University (MTU) and …


A Quality Metric For K-Means Clustering Based On Centroid Locations, Manoj Thulasidas Nov 2022

A Quality Metric For K-Means Clustering Based On Centroid Locations, Manoj Thulasidas

Research Collection School Of Computing and Information Systems

K-Means clustering algorithm does not offer a clear methodology to determine the appropriate number of clusters; it does not have a built-in mechanism for K selection. In this paper, we present a new metric for clustering quality and describe its use for K selection. The proposed metric, based on the locations of the centroids, as well as the desired properties of the clusters, is developed in two stages. In the initial stage, we take into account the full covariance matrix of the clustering variables, thereby making it mathematically similar to a reduced chi2. We then extend it to account for …


Operation Of A Controllable Force-Sensing Industrial Pneumatic Parallel Gripper System, Brian Piechocki, Chelsey Spitzner, Namratha Karanam, Travis Winter, Aleksandr Sergeyev, Mark Gauthier, Nathir Rawashdeh Nov 2022

Operation Of A Controllable Force-Sensing Industrial Pneumatic Parallel Gripper System, Brian Piechocki, Chelsey Spitzner, Namratha Karanam, Travis Winter, Aleksandr Sergeyev, Mark Gauthier, Nathir Rawashdeh

Michigan Tech Publications

As part of the advanced programmable logic controllers (PLC) course at Michigan Tech, this class project was performed on a mechatronics system gifted by Donald Engineering, a Michigan-based supplier of industrial automation systems and components. This paper explores the functionality and application of a force-programmable and sensing pneumatic parallel gripper system. Force sensing is a critical part of many systems in modern automation systems. Applications such as prosthetics, robotic surgery, or basic manufacturing systems may rely on the ability to properly read and control forces applied to an object. This work evaluates the basic operation of the pneumatic force-sensing gripper …


An Industrial Pneumatic And Servo Four-Axis Robotic Gripper System: Description And Unitronics Ladder Logic Programming, Zongguang Liu, Chrispin Johnston, Aleksi Leino, Travis Winter, Aleksandr Sergeyev, Mark Gauthier, Nathir Rawashdeh Nov 2022

An Industrial Pneumatic And Servo Four-Axis Robotic Gripper System: Description And Unitronics Ladder Logic Programming, Zongguang Liu, Chrispin Johnston, Aleksi Leino, Travis Winter, Aleksandr Sergeyev, Mark Gauthier, Nathir Rawashdeh

Michigan Tech Publications

As part of the advanced programmable logic controllers (PLC) course at Michigan Tech, this class project is performed on a mechatronics system gifted by Donald Engineering, a Michigan-based supplier of industrial automation systems and components. This paper explores the functionality and ladder programming of a four-axis robot enclosed in a cage with one side guarded by an optical fence. The robot has pneumatically actuated X-Y linear motion and a pneumatic gripper. Furthermore, the Z-axis motion and gripper wrist rotation are controlled by servo motors. A human machine interface (HMI) is also present, and it allows for easy manipulation and programming …


Virtual Sensor Middleware: Managing Iot Data For The Fog-Cloud Platform, Fadi Almahamid, Hanan Lutfiyya, Katarina Grolinger Oct 2022

Virtual Sensor Middleware: Managing Iot Data For The Fog-Cloud Platform, Fadi Almahamid, Hanan Lutfiyya, Katarina Grolinger

Electrical and Computer Engineering Publications

This paper introduces the Virtual Sensor Middleware (VSM), which facilitates distributed sensor data processing on multiple fog nodes. VSM uses a Virtual Sensor as the core component of the middleware. The virtual sensor concept is redesigned to support functionality beyond sensor/device virtualization, such as deploying a set of virtual sensors to represent an IoT application and distributed sensor data processing across multiple fog nodes. Furthermore, the virtual sensor deals with the heterogeneous nature of IoT devices and the various communication protocols using different adapters to communicate with the IoT devices and the underlying protocol. VSM uses the publish-subscribe design pattern …


Agglomerative Hierarchical Clustering With Dynamic Time Warping For Household Load Curve Clustering, Fadi Almahamid, Katarina Grolinger Oct 2022

Agglomerative Hierarchical Clustering With Dynamic Time Warping For Household Load Curve Clustering, Fadi Almahamid, Katarina Grolinger

Electrical and Computer Engineering Publications

Energy companies often implement various demand response (DR) programs to better match electricity demand and supply by offering the consumers incentives to reduce their demand during critical periods. Classifying clients according to their consumption patterns enables targeting specific groups of consumers for DR. Traditional clustering algorithms use standard distance measurement to find the distance between two points. The results produced by clustering algorithms such as K-means, K-medoids, and Gaussian Mixture Models depend on the clustering parameters or initial clusters. In contrast, our methodology uses a shape-based approach that combines Agglomerative Hierarchical Clustering (AHC) with Dynamic Time Warping (DTW) to classify …


Tutorial: Neuro-Symbolic Ai For Mental Healthcare, Kaushik Roy, Usha Lokala, Manas Gaur, Amit Sheth Oct 2022

Tutorial: Neuro-Symbolic Ai For Mental Healthcare, Kaushik Roy, Usha Lokala, Manas Gaur, Amit Sheth

Publications

Artificial Intelligence (AI) systems for mental healthcare (MHCare) have been ever-growing after realizing the importance of early interventions for patients with chronic mental health (MH) conditions. Social media (SocMedia) emerged as the go-to platform for supporting patients seeking MHCare. The creation of peer-support groups without social stigma has resulted in patients transitioning from clinical settings to SocMedia supported interactions for quick help. Researchers started exploring SocMedia content in search of cues that showcase correlation or causation between different MH conditions to design better interventional strategies. User-level Classification-based AI systems were designed to leverage diverse SocMedia data from various MH conditions, …


Towards Qos-Based Embedded Machine Learning, Tom Springer, Erik Linstead, Peiyi Zhao, Chelsea Parlett-Pelleriti Oct 2022

Towards Qos-Based Embedded Machine Learning, Tom Springer, Erik Linstead, Peiyi Zhao, Chelsea Parlett-Pelleriti

Engineering Faculty Articles and Research

Due to various breakthroughs and advancements in machine learning and computer architectures, machine learning models are beginning to proliferate through embedded platforms. Some of these machine learning models cover a range of applications including computer vision, speech recognition, healthcare efficiency, industrial IoT, robotics and many more. However, there is a critical limitation in implementing ML algorithms efficiently on embedded platforms: the computational and memory expense of many machine learning models can make them unsuitable in resource-constrained environments. Therefore, to efficiently implement these memory-intensive and computationally expensive algorithms in an embedded computing environment, innovative resource management techniques are required at the …


Learning To Automate Follow-Up Question Generation Using Process Knowledge For Depression Triage On Reddit Posts, Shrey Gupta, Anmol Agarwal, Manas Gaur, Kaushik Roy, Vignesh Narayanan, Ponnurangam Kumaraguru, Amit Sheth Oct 2022

Learning To Automate Follow-Up Question Generation Using Process Knowledge For Depression Triage On Reddit Posts, Shrey Gupta, Anmol Agarwal, Manas Gaur, Kaushik Roy, Vignesh Narayanan, Ponnurangam Kumaraguru, Amit Sheth

Publications

Conversational Agents (CAs) powered with deep language models (DLMs) have shown tremendous promise in the domain of mental health. Prominently, the CAs have been used to provide informational or therapeutic services (e.g., cognitive behavioral therapy) to patients. However, the utility of CAs to assist in mental health triaging has not been explored in the existing work as it requires a controlled generation of follow-up questions (FQs), which are often initiated and guided by the mental health professionals (MHPs) in clinical settings. In the context of `depression', our experiments show that DLMs coupled with process knowledge in a mental health questionnaire …


Softskip: Empowering Multi-Modal Dynamic Pruning For Single-Stage Referring Comprehension, Dulanga Weerakoon, Vigneshwaran Subbaraju, Tuan Tran, Archan Misra Oct 2022

Softskip: Empowering Multi-Modal Dynamic Pruning For Single-Stage Referring Comprehension, Dulanga Weerakoon, Vigneshwaran Subbaraju, Tuan Tran, Archan Misra

Research Collection School Of Computing and Information Systems

Supporting real-time referring expression comprehension (REC) on pervasive devices is an important capability for human-AI collaborative tasks. Model pruning techniques, applied to DNN models, can enable real-time execution even on resource-constrained devices. However, existing pruning strategies are designed principally for uni-modal applications, and suffer a significant loss of accuracy when applied to REC tasks that require fusion of textual and visual inputs. We thus present a multi-modal pruning model, LGMDP, which uses language as a pivot to dynamically and judiciously select the relevant computational blocks that need to be executed. LGMDP also introduces a new SoftSkip mechanism, whereby 'skipped' visual …


Quantifying Dds-Cerberus Network Control Overhead, Andrew T. Park, Nathaniel R. Peck, Richard Dill, Douglas D. Hodson, Michael R. Grimaila, Wayne C. Henry Sep 2022

Quantifying Dds-Cerberus Network Control Overhead, Andrew T. Park, Nathaniel R. Peck, Richard Dill, Douglas D. Hodson, Michael R. Grimaila, Wayne C. Henry

Faculty Publications

Securing distributed device communication is critical because the private industry and the military depend on these resources. One area that adversaries target is the middleware, which is the medium that connects different systems. This paper evaluates a novel security layer, DDS-Cerberus (DDS-C), that protects in-transit data and improves communication efficiency on data-first distribution systems. This research contributes a distributed robotics operating system testbed and designs a multifactorial performance-based experiment to evaluate DDS-C efficiency and security by assessing total packet traffic generated in a robotics network. The performance experiment follows a 2:1 publisher to subscriber node ratio, varying the number of …


Parasol: Efficient Parallel Synthesis Of Large Model Spaces, Clay Stevens, Hamid Bagheri Sep 2022

Parasol: Efficient Parallel Synthesis Of Large Model Spaces, Clay Stevens, Hamid Bagheri

CSE Conference and Workshop Papers

Formal analysis is an invaluable tool for software engineers, yet state-of-the-art formal analysis techniques suffer from well-known limitations in terms of scalability. In particular, some software design domains—such as tradeoff analysis and security analysis—require systematic exploration of potentially huge model spaces, which further exacerbates the problem. Despite this present and urgent challenge, few techniques exist to support the systematic exploration of large model spaces. This paper introduces Parasol, an approach and accompanying tool suite, to improve the scalability of large-scale formal model space exploration. Parasol presents a novel parallel model space synthesis approach, backed with unsupervised learning to automatically derive …


An Attribute-Aware Attentive Gcn Model For Attribute Missing In Recommendation, Fan Liu, Zhiyong Cheng, Lei Zhu, Chenghao Liu, Liqiang Nie Sep 2022

An Attribute-Aware Attentive Gcn Model For Attribute Missing In Recommendation, Fan Liu, Zhiyong Cheng, Lei Zhu, Chenghao Liu, Liqiang Nie

Research Collection School Of Computing and Information Systems

As important side information, attributes have been widely exploited in the existing recommender system for better performance. However, in the real-world scenarios, it is common that some attributes of items/users are missing (e.g., some movies miss the genre data). Prior studies usually use a default value (i.e., "other") to represent the missing attribute, resulting in sub-optimal performance. To address this problem, in this paper, we present an attribute-aware attentive graph convolution network (A(2)-GCN). In particular, we first construct a graph, where users, items, and attributes are three types of nodes and their associations are edges. Thereafter, we leverage the graph …