Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Physical Sciences and Mathematics (22)
- Computer Sciences (21)
- Electrical and Computer Engineering (21)
- Digital Communications and Networking (8)
- Other Computer Engineering (7)
-
- Artificial Intelligence and Robotics (5)
- Signal Processing (5)
- Computer and Systems Architecture (3)
- Data Science (3)
- Medicine and Health Sciences (3)
- Operations Research, Systems Engineering and Industrial Engineering (3)
- Social and Behavioral Sciences (3)
- Systems and Communications (3)
- Civil and Environmental Engineering (2)
- Communication (2)
- Data Storage Systems (2)
- Industrial Engineering (2)
- Robotics (2)
- Transportation Engineering (2)
- Accounting (1)
- Aerospace Engineering (1)
- Automotive Engineering (1)
- Biomedical (1)
- Biomedical Engineering and Bioengineering (1)
- Business (1)
- Civil Engineering (1)
- Construction Engineering and Management (1)
- Electrical and Electronics (1)
- Institution
-
- TÜBİTAK (8)
- Old Dominion University (4)
- New Jersey Institute of Technology (3)
- University of Nebraska - Lincoln (3)
- Technological University Dublin (2)
-
- University of Massachusetts Amherst (2)
- Western University (2)
- Air Force Institute of Technology (1)
- Association of Arab Universities (1)
- Chapman University (1)
- City University of New York (CUNY) (1)
- Clemson University (1)
- Embry-Riddle Aeronautical University (1)
- Louisiana State University (1)
- Manipal Academy of Higher Education (1)
- Missouri State University (1)
- Olivet Nazarene University (1)
- Portland State University (1)
- Southwestern Oklahoma State University (1)
- University at Albany, State University of New York (1)
- University of Denver (1)
- University of Kentucky (1)
- University of Louisville (1)
- University of Nevada, Las Vegas (1)
- Virginia Commonwealth University (1)
- Wright State University (1)
- Publication
-
- Turkish Journal of Electrical Engineering and Computer Sciences (8)
- Articles (2)
- Department of Electrical and Computer Engineering: Faculty Publications (2)
- Dissertations (2)
- Doctoral Dissertations (2)
-
- Electronic Theses and Dissertations (2)
- Electronic Thesis and Dissertation Repository (2)
- All Dissertations (1)
- Browse all Theses and Dissertations (1)
- Civil & Environmental Engineering Theses & Dissertations (1)
- Computer Science Faculty Publications and Presentations (1)
- Department of Computer Science and Engineering: Dissertations, Theses, and Student Research (1)
- Dissertations, Theses, and Capstone Projects (1)
- Doctoral Dissertations and Master's Theses (1)
- Electrical & Computer Engineering Faculty Publications (1)
- Electrical & Computer Engineering Theses & Dissertations (1)
- Engineering Faculty Articles and Research (1)
- Future Computing and Informatics Journal (1)
- LSU Doctoral Dissertations (1)
- Legacy Theses & Dissertations (2009 - 2024) (1)
- MSU Graduate Theses (1)
- Modeling, Simulation and Visualization Student Capstone Conference (1)
- Scholar Week 2016 - present (1)
- Student Research (1)
- Summer REU Program (1)
- Technical Collection (1)
- Theses (1)
- Theses and Dissertations (1)
- Theses and Dissertations--Computer Science (1)
- UNLV Theses, Dissertations, Professional Papers, and Capstones (1)
- Publication Type
Articles 1 - 30 of 43
Full-Text Articles in Computer Engineering
Iot In Smart Communities, Technologies And Applications., Muhammad Zaigham Abbas Shah Syed
Iot In Smart Communities, Technologies And Applications., Muhammad Zaigham Abbas Shah Syed
Electronic Theses and Dissertations
Internet of Things is a system that integrates different devices and technologies, removing the necessity of human intervention. This enables the capacity of having smart (or smarter) cities around the world. By hosting different technologies and allowing interactions between them, the internet of things has spearheaded the development of smart city systems for sustainable living, increased comfort and productivity for citizens. The Internet of Things (IoT) for Smart Cities has many different domains and draws upon various underlying systems for its operation, in this work, we provide a holistic coverage of the Internet of Things in Smart Cities by discussing …
Sequential Frame-Interpolation And Dct-Based Video Compression Framework, Yeganeh Jalalpour, Wu-Chi Feng, Feng Liu
Sequential Frame-Interpolation And Dct-Based Video Compression Framework, Yeganeh Jalalpour, Wu-Chi Feng, Feng Liu
Computer Science Faculty Publications and Presentations
Video data is ubiquitous; capturing, transferring, and storing even compressed video data is challenging because it requires substantial resources. With the large amount of video traffic being transmitted on the internet, any improvement in compressing such data, even small, can drastically impact resource consumption. In this paper, we present a hybrid video compression framework that unites the advantages of both DCT-based and interpolation-based video compression methods in a single framework. We show that our work can deliver the same visual quality or, in some cases, improve visual quality while reducing the bandwidth by 10--20%.
Cyber Resilience Analytics For Cyber-Physical Systems, Md Ariful Haque
Cyber Resilience Analytics For Cyber-Physical Systems, Md Ariful Haque
Electrical & Computer Engineering Theses & Dissertations
Cyber-physical systems (CPSs) are complex systems that evolve from the integrations of components dealing with physical processes and real-time computations, along with networking. CPSs often incorporate approaches merging from different scientific fields such as embedded systems, control systems, operational technology, information technology systems (ITS), and cybernetics. Today critical infrastructures (CIs) (e.g., energy systems, electric grids, etc.) and other CPSs (e.g., manufacturing industries, autonomous transportation systems, etc.) are experiencing challenges in dealing with cyberattacks. Major cybersecurity concerns are rising around CPSs because of their ever-growing use of information technology based automation. Often the security concerns are limited to probability-based possible attack …
A Framework For Stable Robot-Environment Interaction Based On The Generalized Scattering Transformation, Kanstantsin Pachkouski
A Framework For Stable Robot-Environment Interaction Based On The Generalized Scattering Transformation, Kanstantsin Pachkouski
Electronic Thesis and Dissertation Repository
This thesis deals with development and experimental evaluation of control algorithms for stabilization of robot-environment interaction based on the conic systems formalism and scattering transformation techniques. A framework for stable robot-environment interaction is presented and evaluated on a real physical system. The proposed algorithm fundamentally generalizes the conventional passivity-based approaches to the coupled stability problem. In particular, it allows for stabilization of not necessarily passive robot-environment interaction. The framework is based on the recently developed non-planar conic systems formalism and generalized scattering-based stabilization methods. A comprehensive theoretical background on the scattering transformation techniques, planar and non-planar conic systems is presented. …
Design Of Secure Communication Schemes To Provide Authentication And Integrity Among The Iot Devices, Vidya Rao Dr.
Design Of Secure Communication Schemes To Provide Authentication And Integrity Among The Iot Devices, Vidya Rao Dr.
Technical Collection
The fast growth in Internet-of-Things (IoT) based applications, has increased the number of end-devices communicating over the Internet. The end devices are made with fewer resources and are low battery-powered. These resource-constrained devices are exposed to various security and privacy concerns over publicly available Internet communication. Thus, it becomes essential to provide lightweight security solutions to safeguard data and user privacy. Elliptic Curve Cryptography (ECC) can be used to generate the digital signature and also encrypt the data. The method can be evaluated on a real-time testbed deployed using Raspberry Pi3 devices and every message transmitted is subjected to ECC. …
Machine Learning And Artificial Intelligence Methods For Cybersecurity Data Within The Aviation Ecosystem, Anna Baron Garcia
Machine Learning And Artificial Intelligence Methods For Cybersecurity Data Within The Aviation Ecosystem, Anna Baron Garcia
Doctoral Dissertations and Master's Theses
Aviation cybersecurity research has proven to be a complex topic due to the intricate nature of the aviation ecosystem. Over the last two decades, research has been centered on isolated modules of the entire aviation systems, and it has lacked the state-of-the-art tools (e.g. ML/AI methods) that other cybersecurity disciplines have leveraged in their fields. Security research in aviation in the last two decades has mainly focused on: (i) reverse engineering avionics and software certification; (ii) communications due to the rising new technologies of Software Defined Radios (SDRs); (iii) networking cybersecurity concerns such as the inter and intra connections of …
Sers Spectroscopy With Machine Learning To Analyze Human Plasma Derived Sevs For Coronary Artery Disease Diagnosis And Prognosis, Xi Huang, Bo Liu, Shenghan Guo, Weihong Guo, Ke Liao, Guoku Hu, Wen Shi, Mitchell Kuss, Michael J. Duryee, Daniel R. Anderson, Yongfeng Lu, Bin Duan
Sers Spectroscopy With Machine Learning To Analyze Human Plasma Derived Sevs For Coronary Artery Disease Diagnosis And Prognosis, Xi Huang, Bo Liu, Shenghan Guo, Weihong Guo, Ke Liao, Guoku Hu, Wen Shi, Mitchell Kuss, Michael J. Duryee, Daniel R. Anderson, Yongfeng Lu, Bin Duan
Department of Electrical and Computer Engineering: Faculty Publications
Coronary artery disease (CAD) is one of the major cardiovascular diseases and represents the leading causes of global mortality. Developing new diagnostic and therapeutic approaches for CAD treatment are critically needed, especially for an early accurate CAD detection and further timely intervention. In this study, we successfully isolated human plasma small extracellular vesicles (sEVs) from four stages of CAD patients, that is, healthy control, stable plaque, non-ST-elevation myocardial infarction, and ST-elevation myocardial infarction. Surface-enhanced Raman scattering (SERS) measurement in conjunction with five machine learning approaches, including Quadratic Discriminant Analysis, Support Vector Machine (SVM), K-Nearest Neighbor, Artificial Neural network, were then …
Sers Spectroscopy With Machine Learning To Analyze Human Plasma Derived Sevs For Coronary Artery Disease Diagnosis And Prognosis, Xi Huang, Bo Liu, Shenghan Guo, Weihong Guo, Ke Liao, Guoku Hu, Wen Shi, Mitchell Kuss, Michael J. Duryee, Daniel R. Anderson, Yongfeng Lu, Bin Duan
Sers Spectroscopy With Machine Learning To Analyze Human Plasma Derived Sevs For Coronary Artery Disease Diagnosis And Prognosis, Xi Huang, Bo Liu, Shenghan Guo, Weihong Guo, Ke Liao, Guoku Hu, Wen Shi, Mitchell Kuss, Michael J. Duryee, Daniel R. Anderson, Yongfeng Lu, Bin Duan
Department of Electrical and Computer Engineering: Faculty Publications
Coronary artery disease (CAD) is one of the major cardiovascular diseases and represents the leading causes of global mortality. Developing new diagnostic and therapeutic approaches for CAD treatment are critically needed, especially for an early accurate CAD detection and further timely intervention. In this study, we successfully isolated human plasma small extracellular vesicles (sEVs) from four stages of CAD patients, that is, healthy control, stable plaque, non-ST-elevation myocardial infarction, and ST-elevation myocardial infarction. Surface-enhanced Raman scattering (SERS) measurement in conjunction with five machine learning approaches, including Quadratic Discriminant Analysis, Support Vector Machine (SVM), K-Nearest Neighbor, Artificial Neural network, were then …
Comparison Of Ml Algorithms To Distinguish Between Human Or Human-Like Targets Using The Hog Features Of Range-Time And Range-Doppler Images In Through-The-Wall Applications, Yunus Emre Acar, İsmai̇l Saritaş, Ercan Yaldiz
Comparison Of Ml Algorithms To Distinguish Between Human Or Human-Like Targets Using The Hog Features Of Range-Time And Range-Doppler Images In Through-The-Wall Applications, Yunus Emre Acar, İsmai̇l Saritaş, Ercan Yaldiz
Turkish Journal of Electrical Engineering and Computer Sciences
When detecting the human targets behind walls, false detections occur for many systematic and environmental reasons. Identifying and eliminating these false detections is of great importance for many applications. This study investigates the potential of machine learning (ML) algorithms to distinguish between the human and human-like targets behind walls. For this purpose, a stepped-frequency continuous-wave (SFCW) radar has been set up. Experiments have been carried out with real human targets and moving plates imitating a regular breath of a healthy human. Unlike conventional methods, human and human-like returns are classified using range-Doppler images containing range and Doppler information. Then, the …
Learning To Play An Imperfect Information Card Game Using Reinforcement Learning, Buğra Kaan Demi̇rdöver, Ömer Baykal, Ferdanur Alpaslan
Learning To Play An Imperfect Information Card Game Using Reinforcement Learning, Buğra Kaan Demi̇rdöver, Ömer Baykal, Ferdanur Alpaslan
Turkish Journal of Electrical Engineering and Computer Sciences
Artificial intelligence and machine learning are widely popular in many areas. One of the most popular ones is gaming. Games are perfect testbeds for machine learning and artificial intelligence with various scenarios and types. This study aims to develop a self-learning intelligent agent to play the Hearts game. Hearts is one of the most popular trick-taking card games around the world. It is an imperfect information card game. In addition to having a huge state space, Hearts offers many extra challenges due to its nature. In order to ease the development process, the agent developed in the scope of this …
Deception Detection Across Domains, Languages And Modalities, Subhadarshi Panda
Deception Detection Across Domains, Languages And Modalities, Subhadarshi Panda
Dissertations, Theses, and Capstone Projects
With the increase of deception and misinformation especially in social media, it has become crucial to develop machine learning methods to automatically identify deception. In this dissertation, we identify key challenges underlying text-based deception detection in a cross-domain setting, where we do not have training data in the target domain. We analyze the differences between domains and as a result develop methods to improve cross-domain deception detection. We additionally develop approaches that take advantage of cross-lingual properties to support deception detection across languages. This involves the usage of either multilingual NLP models or translation models. Finally, to better understand multi-modal …
Analyzing Microarchitectural Residue In Various Privilege Strata To Identify Computing Tasks, Tor J. Langehaug
Analyzing Microarchitectural Residue In Various Privilege Strata To Identify Computing Tasks, Tor J. Langehaug
Theses and Dissertations
Modern multi-tasking computer systems run numerous applications simultaneously. These applications must share hardware resources including the Central Processing Unit (CPU) and memory while maximizing each application’s performance. Tasks executing in this shared environment leave residue which should not reveal information. This dissertation applies machine learning and statistical analysis to evaluate task residue as footprints which can be correlated to identify tasks. The concept of privilege strata, drawn from an analogy with physical geology, organizes the investigation into the User, Operating System, and Hardware privilege strata. In the User Stratum, an adversary perspective is taken to build an interrogator program that …
Artificial Neural Networks And Their Applications To Intelligent Fault Diagnosis Of Power Transmission Lines, Fatemeh Mohammadi Shakiba
Artificial Neural Networks And Their Applications To Intelligent Fault Diagnosis Of Power Transmission Lines, Fatemeh Mohammadi Shakiba
Dissertations
Over the past thirty years, the idea of computing based on models inspired by human brains and biological neural networks emerged. Artificial neural networks play an important role in the field of machine learning and hold the key to the success of performing many intelligent tasks by machines. They are used in various applications such as pattern recognition, data classification, stock market prediction, aerospace, weather forecasting, control systems, intelligent automation, robotics, and healthcare. Their architectures generally consist of an input layer, multiple hidden layers, and one output layer. They can be implemented on software or hardware. Nowadays, various structures with …
Efficient Discovery And Utilization Of Radio Information In Ultra-Dense Heterogeneous 3d Wireless Networks, Mattaka Gamage Samantha Sriyananda
Efficient Discovery And Utilization Of Radio Information In Ultra-Dense Heterogeneous 3d Wireless Networks, Mattaka Gamage Samantha Sriyananda
Electronic Thesis and Dissertation Repository
Emergence of new applications, industrial automation and the explosive boost of smart concepts have led to an environment with rapidly increasing device densification and service diversification. This revolutionary upward trend has led the upcoming 6th-Generation (6G) and beyond communication systems to be globally available communication, computing and intelligent systems seamlessly connecting devices, services and infrastructure facilities. In this kind of environment, scarcity of radio resources would be upshot to an unimaginably high level compelling them to be very efficiently utilized. In this case, timely action is taken to deviate from approximate site-specific 2-Dimensional (2D) network concepts in radio resource utilization …
Credit Card Fraud Detection Using Machine Learning Techniques, Nermin Samy Elhusseny, Shimaa Mohamed Ouf, Amira M. Idrees Ami
Credit Card Fraud Detection Using Machine Learning Techniques, Nermin Samy Elhusseny, Shimaa Mohamed Ouf, Amira M. Idrees Ami
Future Computing and Informatics Journal
This is a systematic literature review to reflect the previous studies that dealt with credit card fraud detection and highlight the different machine learning techniques to deal with this problem. Credit cards are now widely utilized daily. The globe has just begun to shift toward financial inclusion, with marginalized people being introduced to the financial sector. As a result of the high volume of e-commerce, there has been a significant increase in credit card fraud. One of the most important parts of today's banking sector is fraud detection. Fraud is one of the most serious concerns in terms of monetary …
Development Of A Hybrid System Based On Abc Algorithm For Selection Of Appropriate Parameters For Disease Diagnosis From Ecg Signals, Ersi̇n Ersoy, Gazi̇ Erkan Bostanci, Mehmet Serdar Güzel
Development Of A Hybrid System Based On Abc Algorithm For Selection Of Appropriate Parameters For Disease Diagnosis From Ecg Signals, Ersi̇n Ersoy, Gazi̇ Erkan Bostanci, Mehmet Serdar Güzel
Turkish Journal of Electrical Engineering and Computer Sciences
The number of people who die due to cardiovascular diseases is quite high. In our study, ECG (electrocar-diogram) signals were divided into segments and waves based on temporal boundaries. Signal similarity methods such as convolution, correlation, covariance, signal peak to noise ratio (PNRS), structural similarity index (SSIM), one of the basic statistical parameters, arithmetic mean and entropy were applied to each of these sections. In addition, a square error-based new approach was applied and the difference of the signs from the mean sign was taken and used as a feature vector. The obtained feature vectors are used in the artificial …
Data Parallel Frameworks For Training Machine Learning Models, Guoyi Zhao
Data Parallel Frameworks For Training Machine Learning Models, Guoyi Zhao
Doctoral Dissertations
Machine learning is the study of computer algorithms that focuses on analyzing and interpreting patterns and structures in data. It has been successfully applied to many areas in computer science and achieved state-of-the-art results to enable learning, reasoning, and decision-making without human interactions. This research aims to develop innovated data parallel frameworks to accommodate the computing resources to parallelize different machine learning and deep learning algorithms and speed up the training. To achieve that, we explore three interesting frameworks in this dissertation: (1) Sync-on-the-fly framework for gradient descent algorithms on transient resources; (2) Asynchronous Proactive Data Parallel framework for both …
Models And Machine Learning Techniques For Improving The Planning And Operation Of Electricity Systems In Developing Regions, Santiago Correa Cardona
Models And Machine Learning Techniques For Improving The Planning And Operation Of Electricity Systems In Developing Regions, Santiago Correa Cardona
Doctoral Dissertations
The enormous innovation in computational intelligence has disrupted the traditional ways we solve the main problems of our society and allowed us to make more data-informed decisions. Energy systems and the ways we deliver electricity are not exceptions to this trend: cheap and pervasive sensing systems and new communication technologies have enabled the collection of large amounts of data that are being used to monitor and predict in real-time the behavior of this infrastructure. Bringing intelligence to the power grid creates many opportunities to integrate new renewable energy sources more efficiently, facilitate grid planning and expansion, improve reliability, optimize electricity …
Runtime Energy Savings Based On Machine Learning Models For Multicore Applications, Vaibhav Sundriyal, Masha Sosonkina
Runtime Energy Savings Based On Machine Learning Models For Multicore Applications, Vaibhav Sundriyal, Masha Sosonkina
Electrical & Computer Engineering Faculty Publications
To improve the power consumption of parallel applications at the runtime, modern processors provide frequency scaling and power limiting capabilities. In this work, a runtime strategy is proposed to maximize energy savings under a given performance degradation. Machine learning techniques were utilized to develop performance models which would provide accurate performance prediction with change in operating core-uncore frequency. Experiments, performed on a node (28 cores) of a modern computing platform showed significant energy savings of as much as 26% with performance degradation of as low as 5% under the proposed strategy compared with the execution in the unlimited power case.
Local Learning Algorithms For Stochastic Spiking Neural Networks, Bleema Rosenfeld
Local Learning Algorithms For Stochastic Spiking Neural Networks, Bleema Rosenfeld
Dissertations
This dissertation focuses on the development of machine learning algorithms for spiking neural networks, with an emphasis on local three-factor learning rules that are in keeping with the constraints imposed by current neuromorphic hardware. Spiking neural networks (SNNs) are an alternative to artificial neural networks (ANNs) that follow a similar graphical structure but use a processing paradigm more closely modeled after the biological brain in an effort to harness its low power processing capability. SNNs use an event based processing scheme which leads to significant power savings when implemented in dedicated neuromorphic hardware such as Intel’s Loihi chip.
This work …
Un-Fair Trojan: Targeted Backdoor Attacks Against Model Fairness, Nicholas Furth
Un-Fair Trojan: Targeted Backdoor Attacks Against Model Fairness, Nicholas Furth
Theses
Machine learning models have been shown to be vulnerable against various backdoor and data poisoning attacks that adversely affect model behavior. Additionally, these attacks have been shown to make unfair predictions with respect to certain protected features. In federated learning, multiple local models contribute to a single global model communicating only using local gradients, the issue of attacks become more prevalent and complex. Previously published works revolve around solving these issues both individually and jointly. However, there has been little study on the effects of attacks against model fairness. Demonstrated in this work, a flexible attack, which we call Un-Fair …
Ml-Based Online Traffic Classification For Sdns, Mohammed Nsaif, Gergely Kovasznai, Mohammed Abboosh, Ali Malik, Ruairí De Fréin
Ml-Based Online Traffic Classification For Sdns, Mohammed Nsaif, Gergely Kovasznai, Mohammed Abboosh, Ali Malik, Ruairí De Fréin
Articles
Traffic classification is a crucial aspect for Software-Defined Networking functionalities. This paper is a part of an on-going project aiming at optimizing power consumption in the environment of software-defined datacenter networks. We have developed a novel routing strategy that can blindly balance between the power consumption and the quality of service for the incoming traffic flows. In this paper, we demonstrate how to classify the network traffic flows so that the quality of service of each flow-class can be guaranteed efficiently. This is achieved by creating a dataset that encompasses different types of network traffic such as video, VoIP, game …
Digitalization Of Construction Project Requirements Using Natural Language Processing (Nlp) Techniques, Fahad Ul Hassan
Digitalization Of Construction Project Requirements Using Natural Language Processing (Nlp) Techniques, Fahad Ul Hassan
All Dissertations
Contract documents are a critical legal component of a construction project that specify all wishes and expectations of the owner toward the design, construction, and handover of a project. A single contract package, especially of a design-build (DB) project, comprises hundreds of documents including thousands of requirements. Precise comprehension and management of the requirements are critical to ensure that all important explicit and implicit requirements of the project scope are captured, managed, and completed. Since requirements are mainly written in a natural human language, the current manual methods impose a significant burden on practitioners to process and restructure them into …
A Comprehensive Survey For Non-Intrusive Load Monitoring, Efe İsa Tezde, Eray Yildiz
A Comprehensive Survey For Non-Intrusive Load Monitoring, Efe İsa Tezde, Eray Yildiz
Turkish Journal of Electrical Engineering and Computer Sciences
Energy-saving and efficiency are as important as benefiting from new energy sources to supply increasing energy demand globally. Energy demand and resources for energy saving should be managed effectively. Therefore, electrical loads need to be monitored and controlled. Demand-side energy management plays a vital role in achieving this objective. Energy management systems schedule an optimal operation program for these loads by obtaining more accurate and precise residential and commercial loads information. Different intellegent measurement applications and machine learning algorithms have been proposed for the measurement and control of electrical devices/loads used in buildings. Of these, nonintrusive load monitoring (NILM) is …
Modeling And Analysis Of Subcellular Protein Localization In Hyper-Dimensional Fluorescent Microscopy Images Using Deep Learning Methods, Yang Jiao
UNLV Theses, Dissertations, Professional Papers, and Capstones
Hyper-dimensional images are informative and become increasingly common in biomedical research. However, the machine learning methods of studying and processing the hyper-dimensional images are underdeveloped. Most of the methods only model the mapping functions between input and output by focusing on the spatial relationship, whereas neglect the temporal and causal relationships. In many cases, the spatial, temporal, and causal relationships are correlated and become a relationship complex. Therefore, only modeling the spatial relationship may result in inaccurate mapping function modeling and lead to undesired output. Despite the importance, there are multiple challenges on modeling the relationship complex, including the model …
Data-Driven Framework For Understanding & Modeling Ride-Sourcing Transportation Systems, Bishoy Kelleny
Data-Driven Framework For Understanding & Modeling Ride-Sourcing Transportation Systems, Bishoy Kelleny
Civil & Environmental Engineering Theses & Dissertations
Ride-sourcing transportation services offered by transportation network companies (TNCs) like Uber and Lyft are disrupting the transportation landscape. The growing demand on these services, along with their potential short and long-term impacts on the environment, society, and infrastructure emphasize the need to further understand the ride-sourcing system. There were no sufficient data to fully understand the system and integrate it within regional multimodal transportation frameworks. This can be attributed to commercial and competition reasons, given the technology-enabled and innovative nature of the system. Recently, in 2019, the City of Chicago the released an extensive and complete ride-sourcing trip-level data for …
Machine Learning-Based Device Type Classification For Iot Device Re- And Continuous Authentication, Kaustubh Gupta
Machine Learning-Based Device Type Classification For Iot Device Re- And Continuous Authentication, Kaustubh Gupta
Department of Computer Science and Engineering: Dissertations, Theses, and Student Research
Today, the use of Internet of Things (IoT) devices is higher than ever and it is growing rapidly. Many IoT devices are usually manufactured by home appliance manufacturers where security and privacy are not the foremost concern. When an IoT device is connected to a network, currently there does not exist a strict authentication method that verifies the identity of the device, allowing any rogue IoT device to authenticate to an access point. This thesis addresses the issue by introducing methods for continuous and re-authentication of static and dynamic IoT devices, respectively. We introduce mechanisms and protocols for authenticating a …
A Brief Literature Review For Machine Learning In Autonomous Robotic Navigation, Jake Biddy, Jeremy Evert
A Brief Literature Review For Machine Learning In Autonomous Robotic Navigation, Jake Biddy, Jeremy Evert
Student Research
Machine learning is becoming very popular in many technological aspects worldwide, including robotic applications. One of the unique aspects of using machine learning in robotics is that it no longer requires the user to program every situation. The robotic application will be able to learn and adapt from its mistakes. In most situations, robotics using machine learning is designed to fulfill a task better than a human could, and with the machine learning aspect, it can function at the highest level of efficiency and quality. However, creating a machine learning program requires extensive coding and programming knowledge that can be …
Deapsecure Computational Training For Cybersecurity: Third-Year Improvements And Impacts, Bahador Dodge, Jacob Strother, Rosby Asiamah, Karina Arcaute, Wirawan Purwanto, Masha Sosonkina, Hongyi Wu
Deapsecure Computational Training For Cybersecurity: Third-Year Improvements And Impacts, Bahador Dodge, Jacob Strother, Rosby Asiamah, Karina Arcaute, Wirawan Purwanto, Masha Sosonkina, Hongyi Wu
Modeling, Simulation and Visualization Student Capstone Conference
The Data-Enabled Advanced Training Program for Cybersecurity Research and Education (DeapSECURE) was introduced in 2018 as a non-degree training consisting of six modules covering a broad range of cyberinfrastructure techniques, including high performance computing, big data, machine learning and advanced cryptography, aimed at reducing the gap between current cybersecurity curricula and requirements needed for advanced research and industrial projects. By its third year, DeapSECURE, like many other educational endeavors, experienced abrupt changes brought by the COVID-19 pandemic. The training had to be retooled to adapt to fully online delivery. Hands-on activities were reformatted to accommodate self-paced learning. In this paper, …
Machine Learning Based Medical Image Deepfake Detection: A Comparative Study, Siddharth Solaiyappan, Yuxin Wen
Machine Learning Based Medical Image Deepfake Detection: A Comparative Study, Siddharth Solaiyappan, Yuxin Wen
Engineering Faculty Articles and Research
Deep generative networks in recent years have reinforced the need for caution while consuming various modalities of digital information. One avenue of deepfake creation is aligned with injection and removal of tumors from medical scans. Failure to detect medical deepfakes can lead to large setbacks on hospital resources or even loss of life. This paper attempts to address the detection of such attacks with a structured case study. Specifically, we evaluate eight different machine learning algorithms, which include three conventional machine learning methods (Support Vector Machine, Random Forest, Decision Tree) and five deep learning models (DenseNet121, DenseNet201, ResNet50, ResNet101, VGG19) …