Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Machine learning (30)
- Data mining (28)
- Neural networks (Computer science) (27)
- Reconstructability Analysis (27)
- Computer software -- Development (23)
-
- Computer vision (23)
- Electronic data processing -- Distributed processing (22)
- Information Theory (22)
- Multivariate analysis discrete multivariate modeling (22)
- Probabilistic graphical modeling (22)
- Adaptive computing systems (19)
- System theory (18)
- Functional programming (Computer science) (17)
- Computer algorithms (15)
- Database management (14)
- Multimedia systems (13)
- Parallel processing (Electronic computers) (13)
- Streaming technology (Telecommunications) (13)
- Computer science (12)
- Genetic algorithms (12)
- Image processing -- Digital techniques (12)
- Programming languages (Electronic computers) (12)
- Computer networks -- Security measures (10)
- Pattern recognition systems (10)
- Artificial intelligence (9)
- Algorithms (8)
- Computer architecture -- Design (8)
- Information storage and retrieval systems (8)
- Compilers (Computer programs) (7)
- Computer security (7)
- Publication Year
- Publication
-
- Computer Science Faculty Publications and Presentations (209)
- Dissertations and Theses (145)
- Systems Science Faculty Publications and Presentations (64)
- University Honors Theses (25)
- Systems Science Friday Noon Seminar Series (13)
-
- Student Research Symposium (10)
- Special Collections: Oregon Public Speakers (5)
- Engineering and Technology Management Faculty Publications and Presentations (4)
- Electrical and Computer Engineering Faculty Publications and Presentations (3)
- Engineering and Technology Management Student Projects (3)
- REU Final Reports (3)
- Undergraduate Research & Mentoring Program (3)
- Anthós (1)
- Civil and Environmental Engineering Faculty Publications and Presentations (1)
- Mathematics and Statistics Faculty Publications and Presentations (1)
- Mechanical and Materials Engineering Faculty Publications and Presentations (1)
- Portland Institute for Computational Science Publications (1)
- Rust-Edu Workshop (1)
- Systems Science Faculty Datasets (1)
- TREC Final Reports (1)
- TREC Project Briefs (1)
- altREU Projects (1)
- Publication Type
Articles 1 - 30 of 497
Full-Text Articles in Physical Sciences and Mathematics
Mask2former With Improved Query For Semantic Segmentation In Remote-Sensing Images, Shichen Guo, Qi Wang, Shiming Xiang, Shuwen Wang, Xuezhi Wang
Mask2former With Improved Query For Semantic Segmentation In Remote-Sensing Images, Shichen Guo, Qi Wang, Shiming Xiang, Shuwen Wang, Xuezhi Wang
Computer Science Faculty Publications and Presentations
Semantic segmentation of remote sensing (RS) images is vital in various practical applications, including urban construction planning, natural disaster monitoring, and land resources investigation. However, RS images are captured by airplanes or satellites at high altitudes and long distances, resulting in ground objects of the same category being scattered in various corners of the image. Moreover, objects of different sizes appear simultaneously in RS images. For example, some objects occupy a large area in urban scenes, while others only have small regions. Technically, the above two universal situations pose significant challenges to the segmentation with a high quality for RS …
Mmwave Rat Optimization: Mac Layer Initial Access Design And Transport Layer Integration, Suresh Srinivasan
Mmwave Rat Optimization: Mac Layer Initial Access Design And Transport Layer Integration, Suresh Srinivasan
Dissertations and Theses
MmWave Radio Access Technology (RAT) is a promising technology for wireless communication due its large bandwidth and is already being deployed in 5G cellular and emerging WiFi technologies. MmWave systems use highly directional beams with narrow beamwidths to overcome the high path loss associated with their frequency bands. A mmWave radio can be used either in a standalone mode (where all radios use the same technology) or simultaneously with other technologies such as LTE and low frequency WiFi in a communication mode commonly referred to as integrated mode. This thesis proposes two methods to optimize mmWave RAT performance in both …
Self-Optimizing Feature Generation Via Categorical Hashing Representation And Hierarchical Reinforcement Crossing, Wangyang Ying, Dongjie Wang, Kunpeng Liu, Leilei Sun, Yanjie Fu
Self-Optimizing Feature Generation Via Categorical Hashing Representation And Hierarchical Reinforcement Crossing, Wangyang Ying, Dongjie Wang, Kunpeng Liu, Leilei Sun, Yanjie Fu
Computer Science Faculty Publications and Presentations
Feature generation aims to generate new and meaningful features to create a discriminative representation space. A generated feature is meaningful when the generated feature is from a feature pair with inherent feature interaction. In the real world, experienced data scientists can identify potentially useful feature-feature interactions, and generate meaningful dimensions from an exponentially large search space in an optimal crossing form over an optimal generation path. But, machines have limited human-like abilities. We generalize such learning tasks as self-optimizing feature generation. Self-optimizing feature generation imposes several under-addressed challenges on existing systems: meaningful, robust, and efficient generation. To tackle these challenges, …
Gated Recurrent Units For Blockage Mitigation In Mmwave Wireless, Ahmed H. Almutairi, Alireza Keshavarz-Haddad, Ehsan Aryafar
Gated Recurrent Units For Blockage Mitigation In Mmwave Wireless, Ahmed H. Almutairi, Alireza Keshavarz-Haddad, Ehsan Aryafar
Computer Science Faculty Publications and Presentations
Millimeter-Wave (mmWave) communication is susceptible to blockages, which can significantly reduce the signal strength at the receiver. Mitigating the negative impacts of blockages is a key requirement to ensure reliable and high throughput mmWave communication links. Previous research on blockage mitigation has introduced several model and protocol based blockage mitigation solutions that focus on one technique at a time, such as handoff to a different base station or beam adaptation to the same base station. In this paper, we address the overarching problem: what blockage mitigation method should be employed? and what is the optimal sub-selection within that method? To …
Preventing Inferences Through Data Dependencies On Sensitive Data, Primal Pappachan, Shufan Zhang, Xi He, Sharad Mehrotra
Preventing Inferences Through Data Dependencies On Sensitive Data, Primal Pappachan, Shufan Zhang, Xi He, Sharad Mehrotra
Computer Science Faculty Publications and Presentations
Simply restricting the computation to non-sensitive part of the data may lead to inferences on sensitive data through data dependencies. Inference control from data dependencies has been studied in the prior work. However, existing solutions either detect and deny queries which may lead to leakage – resulting in poor utility, or only protects against exact reconstruction of the sensitive data – resulting in poor security. In this paper, we present a novel security model called full deniability. Under this stronger security model, any information inferred about sensitive data from non-sensitive data is considered as a leakage. We describe algorithms for …
Parameterized Complexity Of Feature Selection For Categorical Data Clustering, Sayan Bandyapadhyay, Fedor V. Fomin, Petr A. Golovach, Kirill Simonov
Parameterized Complexity Of Feature Selection For Categorical Data Clustering, Sayan Bandyapadhyay, Fedor V. Fomin, Petr A. Golovach, Kirill Simonov
Computer Science Faculty Publications and Presentations
We develop new algorithmic methods with provable guarantees for feature selection in regard to categorical data clustering. While feature selection is one of the most common approaches to reduce dimensionality in practice, most of the known feature selection methods are heuristics. We study the following mathematical model. We assume that there are some inadvertent (or undesirable) features of the input data that unnecessarily increase the cost of clustering. Consequently, we want to select a subset of the original features from the data such that there is a small-cost clustering on the selected features. More precisely, for given integers ℓ (the …
Energy Auction With Non-Relational Persistence, Michael Ramez Howard
Energy Auction With Non-Relational Persistence, Michael Ramez Howard
Dissertations and Theses
As the current landscape for electric vehicles changes, options for remote charging are expanding to keep up. In the United States alone, sales of electric vehicles grew 85% from 2020 until hitting 450,000 units by the end of 2021. While these growing sales are encouraging, commercial charging stations have a long way to go before they are as ubiquitous as gasoline stations are today. The peer-to-peer energy auction helps fill the gap in underserved areas by allowing private homeowners to share their charging facilities with other electric vehicle drivers. The auction framework wraps existing charging outlets with a Cloud-connected microcontroller. …
An Overview Of Elements And Relations: Aspects Of A Scientific Metaphysics, Martin Zwick
An Overview Of Elements And Relations: Aspects Of A Scientific Metaphysics, Martin Zwick
Systems Science Faculty Publications and Presentations
A talk on my book, Elements and Relations: Aspects of a Scientific Metaphysics. Book description:
This book develops the core proposition that systems theory is an attempt to construct an “exact and scientific metaphysics,” a system of general ideas central to science that can be expressed mathematically. Collectively, these ideas would constitute a non-reductionist “theory of everything” unlike what is being sought in physics. Inherently transdisciplinary, systems theory offers ideas and methods that are relevant to all of the sciences and also to professional fields such as systems engineering, public policy, business, and social work. To demonstrate the generality …
Effective Entity Augmentation By Querying External Data Sources, Christopher Buss, Jasmin Mousavi, Mikhail Tokarev, Arash Termehchy, David Maier, Stefan Lee
Effective Entity Augmentation By Querying External Data Sources, Christopher Buss, Jasmin Mousavi, Mikhail Tokarev, Arash Termehchy, David Maier, Stefan Lee
Computer Science Faculty Publications and Presentations
Users often want to augment and enrich entities in their datasets with relevant information from external data sources. As many external sources are accessible only via keyword-search interfaces, a user usually has to manually formulate a keyword query that extract relevant information for each entity. This approach is challenging as many data sources contain numerous tuples, only a small fraction of which may contain entity-relevant information. Furthermore, different datasets may represent the same information in distinct forms and under different terms (e.g., different data source may use different names to refer to the same person). In such cases, it is …
Auxiliary Features-Guided Super Resolution For Monte Carlo Rendering, Qiqi Hou, Feng Liu
Auxiliary Features-Guided Super Resolution For Monte Carlo Rendering, Qiqi Hou, Feng Liu
Computer Science Faculty Publications and Presentations
This paper investigates super-resolution to reduce the number of pixels to render and thus speed up Monte Carlo rendering algorithms. While great progress has been made to super-resolution technologies, it is essentially an ill-posed problem and cannot recover high-frequency details in renderings. To address this problem, we exploit high-resolution auxiliary features to guide super-resolution of low-resolution renderings. These high-resolution auxiliary features can be quickly rendered by a rendering engine and at the same time provide valuable high-frequency details to assist super-resolution. To this end, we develop a cross-modality transformer network that consists of an auxiliary feature branch and a low-resolution …
Multi-Agent Deep Reinforcement Learning For Radiation Localization, Benjamin Scott Totten
Multi-Agent Deep Reinforcement Learning For Radiation Localization, Benjamin Scott Totten
Dissertations and Theses
For the safety of both equipment and human life, it is important to identify the location of orphaned radioactive material as quickly and accurately as possible. There are many factors that make radiation localization a challenging task, such as low gamma radiation signal strength and the need to search in unknown environments without prior information. The inverse-square relationship between the intensity of radiation and the source location, the probabilistic nature of nuclear decay and gamma ray detection, and the pervasive presence of naturally occurring environmental radiation complicates localization tasks. The presence of obstructions in complex environments can further attenuate the …
Formalizing Stack Safety As A Security Property, Sean Noble Anderson, Roberto Blanco, Leonidas Lampropoulos, Benjamin C. Pierce, Andrew Tolmach
Formalizing Stack Safety As A Security Property, Sean Noble Anderson, Roberto Blanco, Leonidas Lampropoulos, Benjamin C. Pierce, Andrew Tolmach
Computer Science Faculty Publications and Presentations
The term stack safety is used to describe a variety of compiler, runtime, and hardware mechanisms for protecting stack memory. Unlike “the heap,” the ISA-level stack does not correspond to a single high-level language concept: different compilers use it in different ways to support procedural and functional abstraction mechanisms from a wide range of languages. This protean nature makes it difficult to nail down what it means to correctly enforce stack safety.
Lossy Kernelization Of Same-Size Clustering, Sayan Bandyapadhyay, Fedor V. Fomin, Petr A. Golovach, Nidhi Purohit, Kirill Simonov
Lossy Kernelization Of Same-Size Clustering, Sayan Bandyapadhyay, Fedor V. Fomin, Petr A. Golovach, Nidhi Purohit, Kirill Simonov
Computer Science Faculty Publications and Presentations
In this work, we study the k-median clustering problem with an additional equal-size constraint on the clusters from the perspective of parameterized preprocessing. Our main result is the first lossy (2-approximate) polynomial kernel for this problem parameterized by the cost of clustering. We complement this result by establishing lower bounds for the problem that eliminate the existence of an (exact) kernel of polynomial size and a PTAS.
Classification Of Drainage Crossings On High-Resolution Digital Elevation Models: A Deep Learning Approach, Di Wu, Ruopu Li, Banafsheh Rekabdar, Claire Talbert, Michael Edidem, Guangxing Wang
Classification Of Drainage Crossings On High-Resolution Digital Elevation Models: A Deep Learning Approach, Di Wu, Ruopu Li, Banafsheh Rekabdar, Claire Talbert, Michael Edidem, Guangxing Wang
Computer Science Faculty Publications and Presentations
High-Resolution Digital Elevation Models (HRDEMs) have been used to delineate fine-scale hydrographic features in landscapes with relatively level topography. However, artificial flow barriers associated with roads are known to cause incorrect modeled flowlines, because these barriers substantially increase the terrain elevation and often terminate flowlines. A common practice is to breach the elevation of roads near drainage crossing locations, which, however, are often unavailable. Thus, developing a reliable drainage crossing dataset is essential to improve the HRDEMs for hydrographic delineation. The purpose of this research is to develop deep learning models for classifying the images that contain the locations of …
The Power Of (Virtual) Convergence: The Unrealized Potential Of Pair Programming And Remote Work, Mikayla Maki
The Power Of (Virtual) Convergence: The Unrealized Potential Of Pair Programming And Remote Work, Mikayla Maki
University Honors Theses
Remote work is expensive. It can lead to isolation, miscommunications, and ossified organizations. These problems occur because of a synchronicity mismatch between how we need to communicate as humans, and what today's tools are capable of. This mismatch can be solved by the adoption of remote pair programming, as exemplified by the authors work at a startup (Zed). Pair programming provides the organic, synchronous, reciprocal interaction necessary to develop the sorts of relationships that remote firms currently lack.
Job Management Portal Software Review, Ruchir Elukurthy
Job Management Portal Software Review, Ruchir Elukurthy
University Honors Theses
This essay provides an overview of a computer science capstone project focused on developing a website for Abilities At Work, a non-profit organization. The website aims to assist employment specialists in managing clients' information and tracking their job application in finding meaningful employment. The essay highlights the various stages of the project, understanding requirements, selecting tools and technologies, creating an application architecture, and writing code. Also, this essay focuses on the challenges encountered during the project, along with the valuable lessons learned. This essay emphasizes how the project closely resembles real-world software development, offering insights for prospective students and professionals. …
A Deep Hierarchical Variational Autoencoder For World Models In Complex Reinforcement Learning Environments, Sriharshitha Ayyalasomayajula
A Deep Hierarchical Variational Autoencoder For World Models In Complex Reinforcement Learning Environments, Sriharshitha Ayyalasomayajula
Dissertations and Theses
Model-based reinforcement learning (MBRL) approaches leverage learned models of the environment to plan and make optimal decisions, reducing the need for extensive real-world interactions and enabling more efficient learning in complex domains such as robotics, autonomous systems, and resource allocation problems. They also provide interpretability and insight into the underlying dynamics, facilitating better decision-making and system understanding.
The world model is a model-based RL approach that employs generative neural network models to learn a compressed spatial and temporal representation of the environment. This work explores world models and a simple single-layered RNN model to learn a simple policy based on …
How Photorealistic Images Are Generated, Nahom Ketema
How Photorealistic Images Are Generated, Nahom Ketema
University Honors Theses
The field of computer graphics looks into how computers can be used to generate images. From using some trigonometry to plot 3D objects to using rays to calculate the lighting of an object, there are a variety of ways that we can use to draw objects onto a screen. For this thesis, we will be looking at a few of those methods to determine how photorealistic images are generated.
Epl Card Reader Capstone: The Strengths Of Partner Programming From A Team Leader's Perspective, Zach Yost
Epl Card Reader Capstone: The Strengths Of Partner Programming From A Team Leader's Perspective, Zach Yost
University Honors Theses
This essay looks to reflect back upon the successes and failures of the EPL Card Reader capstone project, sponsored by Edward Ivory, head of Portland State University's Electronics Prototyping Lab. The EPL Card Reader's goal is to provide a means of tracking and updating student activity and training on the various machines in the lab. Using a local computer port to host this web app a lab administrator or manager is able to scan a student's access badge to review which machines they have been trained on as well as update that training status. The app also has a running …
Implementing A Functional Logic Programming Language Via The Fair Scheme, Andrew Michael Jost
Implementing A Functional Logic Programming Language Via The Fair Scheme, Andrew Michael Jost
Dissertations and Theses
This document presents a new compiler for the Functional Logic programming language Curry based on a novel pull-tabbing evaluation strategy called the Fair Scheme. A simple version of the Fair Scheme is proven sound, complete, and optimal. An elaborated version is also developed, which supports narrowing computations and other features of Curry, such as constraint programming, equational constraints, and set functions.
The Fair Scheme is used to develop a new Curry system called Sprite, a high-quality, performant implementation whose aims are to promote practical uses of Curry and to serve as a laboratory for further research. An important aspect of …
Quantum Multi-Solution Bernoulli Search With Applications To Bitcoin’S Post-Quantum Security, Alexandru Cojocaru, Juan Garay, Fang Song, Petros Wallden
Quantum Multi-Solution Bernoulli Search With Applications To Bitcoin’S Post-Quantum Security, Alexandru Cojocaru, Juan Garay, Fang Song, Petros Wallden
Computer Science Faculty Publications and Presentations
A proof of work (PoW) is an important cryptographic construct which enables a party to convince other parties that they have invested some effort in solving a computational task. Arguably, its main impact has been in the setting of cryptocurrencies such as Bitcoin and its underlying blockchain protocol, which have received significant attention in recent years due to its potential for various applications as well as for solving fundamental distributed computing questions in novel threat models. PoWs enable the linking of blocks in the blockchain data structure, and thus the problem of interest is the feasibility of obtaining a sequence …
Caspi: Collaborative Photon Processing For Active Single-Photon Imaging, Jongho Lee, Atul Ingle, Jenu V. Chacko, Kevin W. Eliceiri, Mohit Gupta
Caspi: Collaborative Photon Processing For Active Single-Photon Imaging, Jongho Lee, Atul Ingle, Jenu V. Chacko, Kevin W. Eliceiri, Mohit Gupta
Computer Science Faculty Publications and Presentations
Image sensors capable of capturing individual photons have made tremendous progress in recent years. However, this technology faces a major limitation. Because they capture scene information at the individual photon level, the raw data is sparse and noisy. Here we propose CASPI: Collaborative Photon Processing for Active Single-Photon Imaging, a technology-agnostic, application-agnostic, and training-free photon processing pipeline for emerging high-resolution single-photon cameras. By collaboratively exploiting both local and non-local correlations in the spatio-temporal photon data cubes, CASPI estimates scene properties reliably even under very challenging lighting conditions. We demonstrate the versatility of CASPI with two applications: LiDAR imaging over a …
Systems Thinking Activities Used In K-12 For Up To Two Decades, Diana Fisher, Systems Thinking Association
Systems Thinking Activities Used In K-12 For Up To Two Decades, Diana Fisher, Systems Thinking Association
Systems Science Faculty Publications and Presentations
Infusing systems thinking activities in pre-college education (grades K-12) means updating precollege education so it includes a study of many systemic behavior patterns that are ubiquitous in the real world. Systems thinking tools include those using both paper and pencil and the computer and enhance learning in the classroom making it more student-centered, more active, and allowing students to analyze problems that have been heretofore beyond the scope of K-12 classrooms. Students in primary school have used behavior over time graphs to demonstrate dynamics described in story books, like the Lorax, and created stock-flow diagrams to describe what was needed …
Machine Learning Predictions Of Electricity Capacity, Marcus Harris, Elizabeth Kirby, Ameeta Agrawal, Rhitabrat Pokharel, Francis Puyleart, Martin Zwick
Machine Learning Predictions Of Electricity Capacity, Marcus Harris, Elizabeth Kirby, Ameeta Agrawal, Rhitabrat Pokharel, Francis Puyleart, Martin Zwick
Systems Science Faculty Publications and Presentations
This research applies machine learning methods to build predictive models of Net Load Imbalance for the Resource Sufficiency Flexible Ramping Requirement in the Western Energy Imbalance Market. Several methods are used in this research, including Reconstructability Analysis, developed in the systems community, and more well-known methods such as Bayesian Networks, Support Vector Regression, and Neural Networks. The aims of the research are to identify predictive variables and obtain a new stand-alone model that improves prediction accuracy and reduces the INC (ability to increase generation) and DEC (ability to decrease generation) Resource Sufficiency Requirements for Western Energy Imbalance Market participants. This …
An Equivalence Checking Framework For Agile Hardware Design, Yanzhao Wang, Fei Xie, Zhenkun Yang, Pascuale Cocchini, Jin Yang
An Equivalence Checking Framework For Agile Hardware Design, Yanzhao Wang, Fei Xie, Zhenkun Yang, Pascuale Cocchini, Jin Yang
Computer Science Faculty Publications and Presentations
Agile hardware design enables designers to produce new design iterations efficiently. Equivalence checking is critical in ensuring that a new design iteration conforms to its specification. In this paper, we introduce an equivalence checking framework for hardware designs represented in HalideIR. HalideIR is a popular intermediate representation in software domains such as deep learning and image processing, and it is increasingly utilized in agile hardware design.We have developed a fully automatic equivalence checking workflow seamlessly integrated with HalideIR and several optimizations that leverage the incremental nature of agile hardware design to scale equivalence checking. Evaluations of two deep learning accelerator …
The Role Of Preprocessing For Word Representation Learning In Affective Tasks, Nastaran Babanejad, Heidar Davoudi, Ameeta Agrawal, Manos Papagelis
The Role Of Preprocessing For Word Representation Learning In Affective Tasks, Nastaran Babanejad, Heidar Davoudi, Ameeta Agrawal, Manos Papagelis
Computer Science Faculty Publications and Presentations
Affective tasks, including sentiment analysis, emotion classification, and sarcasm detection have drawn a lot of attention in recent years due to a broad range of useful applications in various domains. The main goal of affect detection tasks is to recognize states such as mood, sentiment, and emotions from textual data (e.g., news articles or product reviews). Despite the importance of utilizing preprocessing steps in different stages (i.e., word representation learning and building a classification model) of affect detection tasks, this topic has not been studied well. To that end, we explore whether applying various preprocessing methods (stemming, lemmatization, stopword removal, …
An Improved Lower Bound For Sparse Reconstruction From Subsampled Walsh Matrices, Jaroslaw Blasiok, Patrick Lopatto, Kyle Luh, Jake Marcinek, Shravas Rao
An Improved Lower Bound For Sparse Reconstruction From Subsampled Walsh Matrices, Jaroslaw Blasiok, Patrick Lopatto, Kyle Luh, Jake Marcinek, Shravas Rao
Computer Science Faculty Publications and Presentations
We give a short argument that yields a new lower bound on the number of uniformly and independently subsampled rows from a bounded, orthonormal matrix necessary to form a matrix with the restricted isometry property. We show that a matrix formed by uniformly and independently subsampling rows of an N ×N Walsh matrix contains a K-sparse vector in the kernel, unless the number of subsampled rows is Ω(KlogKlog(N/K)) — our lower bound applies whenever min(K,N/K) > logC N. Containing a sparse vector in the kernel precludes not only the restricted isometry property, but more generally the application of those matrices for …
Data From: Machine Learning Predictions Of Electricity Capacity, Marcus Harris, Elizabeth Kirby, Ameeta Agrawal, Rhitabrat Pokharel, Francis Puyleart, Martin Zwick
Data From: Machine Learning Predictions Of Electricity Capacity, Marcus Harris, Elizabeth Kirby, Ameeta Agrawal, Rhitabrat Pokharel, Francis Puyleart, Martin Zwick
Systems Science Faculty Datasets
This research applies machine learning methods to build predictive models of Net Load Imbalance for the Resource Sufficiency Flexible Ramping Requirement in the Western Energy Imbalance Market. Several methods are used in this research, including Reconstructability Analysis, developed in the systems community, and more well-known methods such as Bayesian Networks, Support Vector Regression, and Neural Networks. The aims of the research are to identify predictive variables and obtain a new stand-alone model that improves prediction accuracy and reduces the INC (ability to increase generation) and DEC (ability to decrease generation) Resource Sufficiency Requirements for Western Energy Imbalance Market participants. This …
Quantum Key-Length Extension, Joseph Jaeger, Fang Song, Stefano Tessaro
Quantum Key-Length Extension, Joseph Jaeger, Fang Song, Stefano Tessaro
Computer Science Faculty Publications and Presentations
Should quantum computers become available, they will reduce the effective key length of basic secret-key primitives, such as blockciphers. To address this we will either need to use blockciphers with inherently longer keys or develop key-length extension techniques to amplify the security of a blockcipher to use longer keys.
We consider the latter approach and revisit the FX and double encryption constructions. Classically, FX was proven to be a secure key-length extension technique, while double encryption fails to be more secure than single encryption due to a meet-in-the-middle attack. In this work we provide positive results, with concrete and tight …
From Machine Learning To Deep Learning: A Comprehensive Study Of Alcohol And Drug Use Disorder, Banafsheh Rekabdar, David L. Albright, Haelim Jeong, Sameerah Talafha
From Machine Learning To Deep Learning: A Comprehensive Study Of Alcohol And Drug Use Disorder, Banafsheh Rekabdar, David L. Albright, Haelim Jeong, Sameerah Talafha
Computer Science Faculty Publications and Presentations
This study aims to train and validate machine learning and deep learning models to identify patients with risky alcohol and drug misuse in a Screening, Brief Intervention, and Referral to Treatment (SBIRT) program. An observational cohort of 6978 adults was admitted in the western region of Alabama at three medical facilities between January and December of 2019. Data were cleaned and pre-processed using data imputation techniques and an augmented sampling data method. The primary analysis involved the multi-class classification of alcohol and drug misuse. Our study shows that accurate identification of alcohol and drug use screening instrument scores was best …