Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

University of Nevada, Las Vegas

Series

Computer Sciences

Keyword
Publication Year
Publication

Articles 1 - 30 of 119

Full-Text Articles in Physical Sciences and Mathematics

Broadband Equity, Access, And Deployment In Nevada, Brad Wimmer Oct 2023

Broadband Equity, Access, And Deployment In Nevada, Brad Wimmer

Policy Briefs and Reports

The $45.45 billion Broadband, Equity, Access, and Deployment (BEAD) program’s primary objective is to extend broadband service to all unserved and underserved locations in the U.S. and its territories. Several industry studies predict that the BEAD program can meet its goal of providing universal access to broadband service if eligible entities execute their grant programs well. My review of the BEAD program indicates that policy makers can enhance the likelihood of program success by designing competitive grant programs that give applicants the incentive to undercut the subsidies proposed by their rivals and provide applicants the flexibility to design networks that …


Artificial Intelligence In The Radiomic Analysis Of Glioblastomas: A Review, Taxonomy, And Perspective, Ming Zhu, Sijia Li, Yu Kuang, Virginia B. Hill, Amy B. Heimberger, Lijie Zhai, Shenjie Zhai Aug 2022

Artificial Intelligence In The Radiomic Analysis Of Glioblastomas: A Review, Taxonomy, And Perspective, Ming Zhu, Sijia Li, Yu Kuang, Virginia B. Hill, Amy B. Heimberger, Lijie Zhai, Shenjie Zhai

Electrical & Computer Engineering Faculty Research

Radiological imaging techniques, including magnetic resonance imaging (MRI) and positron emission tomography (PET), are the standard-of-care non-invasive diagnostic approaches widely applied in neuro-oncology. Unfortunately, accurate interpretation of radiological imaging data is constantly challenged by the indistinguishable radiological image features shared by different pathological changes associated with tumor progression and/or various therapeutic interventions. In recent years, machine learning (ML)-based artificial intelligence (AI) technology has been widely applied in medical image processing and bioinformatics due to its advantages in implicit image feature extraction and integrative data analysis. Despite its recent rapid development, ML technology still faces many hurdles for its broader applications …


Artificial Intelligence Framework Identifies Candidate Targets For Drug Repurposing In Alzheimer’S Disease, Jiansong Fang, Pengyue Zhang, Quan Wang, Chien Wei Chiang, Yadi Zhou, Yuan Hou, Jielin Xu, Rui Chen, Bin Zhang, Stephen J. Lewis, James B. Leverenz, Andrew A. Pieper, Bingshan Li, Lang Li, Jeffrey Cummings, Feixiong Cheng Jan 2022

Artificial Intelligence Framework Identifies Candidate Targets For Drug Repurposing In Alzheimer’S Disease, Jiansong Fang, Pengyue Zhang, Quan Wang, Chien Wei Chiang, Yadi Zhou, Yuan Hou, Jielin Xu, Rui Chen, Bin Zhang, Stephen J. Lewis, James B. Leverenz, Andrew A. Pieper, Bingshan Li, Lang Li, Jeffrey Cummings, Feixiong Cheng

Brain Health Faculty Publications

Background: Genome-wide association studies (GWAS) have identified numerous susceptibility loci for Alzheimer’s disease (AD). However, utilizing GWAS and multi-omics data to identify high-confidence AD risk genes (ARGs) and druggable targets that can guide development of new therapeutics for patients suffering from AD has heretofore not been successful. Methods: To address this critical problem in the field, we have developed a network-based artificial intelligence framework that is capable of integrating multi-omics data along with human protein–protein interactome networks to accurately infer accurate drug targets impacted by GWAS-identified variants to identify new therapeutics. When applied to AD, this approach integrates GWAS findings, …


Evaluation Of Continuous Power-Down Schemes, James Andro-Vasko, Wolfgang Bein Jan 2022

Evaluation Of Continuous Power-Down Schemes, James Andro-Vasko, Wolfgang Bein

Computer Science Faculty Research

We consider a power-down system with two states—“on” and “off”—and a continuous set of power states. The system has to respond to requests for service in the “on” state and, after service, the system can power off or switch to any of the intermediate power-saving states. The choice of states determines the cost to power on for subsequent requests. The protocol for requests is “online”, which means that the decision as to which intermediate state (or the off-state) the system will switch has to be made without knowledge of future requests. We model a linear and a non-linear system, and …


Novel Architecture Of Onem2m-Based Convergence Platform For Mixed Reality And Iot, Seungwoon Lee, Woogeun Kil, Byeong Hee Roh, Si-Jung Kim, Jin Suk Kang Jan 2022

Novel Architecture Of Onem2m-Based Convergence Platform For Mixed Reality And Iot, Seungwoon Lee, Woogeun Kil, Byeong Hee Roh, Si-Jung Kim, Jin Suk Kang

College of Engineering Faculty Research

There have been numerous works proposed to merge augmented reality/mixed reality (AR/MR) and Internet of Things (IoT) in various ways. However, they have focused on their specific target applications and have limitations on interoperability or reusability when utilizing them to different domains or adding other devices to the system. This paper proposes a novel architecture of a convergence platform for AR/MR and IoT systems and services. The proposed architecture adopts the oneM2M IoT standard as the basic framework that converges AR/MR and IoT systems and enables the development of application services used in general-purpose environments without being subordinate to specific …


Machine Learning And Radiomic Features To Predict Overall Survival Time For Glioblastoma Patients, Lina Chato, Shahram Latifi Dec 2021

Machine Learning And Radiomic Features To Predict Overall Survival Time For Glioblastoma Patients, Lina Chato, Shahram Latifi

Electrical & Computer Engineering Faculty Research

Glioblastoma is an aggressive brain tumor with a low survival rate. Understanding tumor behavior by predicting prognosis outcomes is a crucial factor in deciding a proper treatment plan. In this paper, an automatic overall survival time prediction system (OST) for glioblastoma patients is developed on the basis of radiomic features and machine learning (ML). This system is designed to predict prognosis outcomes by classifying a glioblastoma patient into one of three survival groups: short-term, mid-term, and long-term. To develop the prediction system, a medical dataset based on imaging information from magnetic resonance imaging (MRI) and non-imaging information is used. A …


Data Of The Constructivist Practices In The Learning Environment Survey From Engineering Undergraduates: An Exploratory Factor Analysis, Chengcheng Li, Shaoan Zhang, Tiberio Garza, Yingtao Jiang Dec 2021

Data Of The Constructivist Practices In The Learning Environment Survey From Engineering Undergraduates: An Exploratory Factor Analysis, Chengcheng Li, Shaoan Zhang, Tiberio Garza, Yingtao Jiang

Teaching and Learning Faculty Research

This paper presents the dataset of a questionnaire on first-year engineering undergraduates’ perceptions of constructivist practices in the learning environment. The questionnaire with a 5-Likert scale was adapted from previous research. The sample consisted of 293 first-year engineering undergraduates in the southwest region of the United States. The online questionnaire was sent to participants who completed it voluntarily at the end of Fall 2019. A total of 274 of 293 participants completed the questionnaire with a response rate of 93.515%. Exploratory factor analysis was conducted to test the underlying factor structure of the questionnaire, which serves as a good reference …


Novel Theorems And Algorithms Relating To The Collatz Conjecture, Michael R. Schwob, Peter Shiue, Rama Venkat Sep 2021

Novel Theorems And Algorithms Relating To The Collatz Conjecture, Michael R. Schwob, Peter Shiue, Rama Venkat

Mathematical Sciences Faculty Research

Proposed in 1937, the Collatz conjecture has remained in the spotlight for mathematicians and computer scientists alike due to its simple proposal, yet intractable proof. In this paper, we propose several novel theorems, corollaries, and algorithms that explore relationships and properties between the natural numbers, their peak values, and the conjecture. These contributions primarily analyze the number of Collatz iterations it takes for a given integer to reach 1 or a number less than itself, or the relationship between a starting number and its peak value.


A Survey On Securing Iot Ecosystems And Adaptive Network Vision, Tejaswini Goli, Yoohwan Kim Jun 2021

A Survey On Securing Iot Ecosystems And Adaptive Network Vision, Tejaswini Goli, Yoohwan Kim

Computer Science Faculty Research

The rapid growth of Internet-of-Things (IoT) devices and the large network of interconnected devices pose new security challenges and privacy threats that would put those devices at high risk and cause harm to the affiliated users. This paper emphasizes such potential security challenges and proposes possible solutions in the field of IoT Security, mostly focusing on automated or adaptive networks. Considering the fact that IoT became widely adopted, the intricacies in the security field tend to grow expeditiously. Therefore, it is necessary for businesses to adopt new security protocols and to the notion of automated network security practices driven by …


Bountychain: Toward Decentralizing A Bug Bounty Program With Blockchain And Ipfs, Alex Hoffman, Phillipe Austria, Chol Hyun Park, Yoohwan Kim Jun 2021

Bountychain: Toward Decentralizing A Bug Bounty Program With Blockchain And Ipfs, Alex Hoffman, Phillipe Austria, Chol Hyun Park, Yoohwan Kim

Computer Science Faculty Research

Bug Bounty Programs (BBPs) play an important role in providing and maintaining security in software applications. These programs allow testers to discover and resolve bugs before the general public is aware of them, preventing incidents of widespread abuse. However, they have shown problems such as organizations providing accountability of reporting bugs and nonrecognition of testers. In this paper, we discuss Bountychain, a decentralized application using Ethereum-based Smart Contracts (SCs) and the Interplanetary File System (IPFS), a distributed file storage system. Blockchain and SCs provide a safe, secure and transparent platform for a BBP. Testers can submit bug reports and organizations …


Topology Identification In Distribution System Via Machine Learning Algorithms, Peyman Razmi, Mahdi Ghaemi Asl, Giorgio Canarella, Afsaneh Sadat Emami Jun 2021

Topology Identification In Distribution System Via Machine Learning Algorithms, Peyman Razmi, Mahdi Ghaemi Asl, Giorgio Canarella, Afsaneh Sadat Emami

Economics Faculty Publications

This paper contributes to the literature on topology identification (TI) in distribution networks and, in particular, on change detection in switching devices' status. The lack of measurements in distribution networks compared to transmission networks is a notable challenge. In this paper, we propose an approach to topology identification (TI) of distribution systems based on supervised machine learning (SML) algorithms. This methodology is capable of analyzing the feeder's voltage profile without requiring the utilization of sensors or any other extraneous measurement device. We show that machine learning algorithms can track the voltage profile's behavior in each feeder, detect the status of …


Machine Learning Approaches For The Prediction Of Bone Mineral Density By Using Genomic And Phenotypic Data Of 5130 Older Men, Qing Wu, Fatma Nasoz, Jongyun Jung, Bibek Bhattarai, Mira V. Han, Robert A. Greenes, Kenneth G. Saag Feb 2021

Machine Learning Approaches For The Prediction Of Bone Mineral Density By Using Genomic And Phenotypic Data Of 5130 Older Men, Qing Wu, Fatma Nasoz, Jongyun Jung, Bibek Bhattarai, Mira V. Han, Robert A. Greenes, Kenneth G. Saag

School of Medicine Faculty Publications

The study aimed to utilize machine learning (ML) approaches and genomic data to develop a prediction model for bone mineral density (BMD) and identify the best modeling approach for BMD prediction. The genomic and phenotypic data of Osteoporotic Fractures in Men Study (n = 5130) was analyzed. Genetic risk score (GRS) was calculated from 1103 associated SNPs for each participant after a comprehensive genotype imputation. Data were normalized and divided into a training set (80%) and a validation set (20%) for analysis. Random forest, gradient boosting, neural network, and linear regression were used to develop BMD prediction models separately. Ten-fold …


Computation And Data Driven Discovery Of Topological Phononic Materials, Jiangxu Li, Jiaxi Liu, Stanley A. Baronett, Mingfeng Liu, Lei Wang, Ronghan Li, Yun Chen, Dianzhong Li, Qiang Zhu, Xing Qiu Chen Feb 2021

Computation And Data Driven Discovery Of Topological Phononic Materials, Jiangxu Li, Jiaxi Liu, Stanley A. Baronett, Mingfeng Liu, Lei Wang, Ronghan Li, Yun Chen, Dianzhong Li, Qiang Zhu, Xing Qiu Chen

Physics & Astronomy Faculty Research

© 2021, The Author(s). The discovery of topological quantum states marks a new chapter in both condensed matter physics and materials sciences. By analogy to spin electronic system, topological concepts have been extended into phonons, boosting the birth of topological phononics (TPs). Here, we present a high-throughput screening and data-driven approach to compute and evaluate TPs among over 10,000 real materials. We have discovered 5014 TP materials and grouped them into two main classes of Weyl and nodal-line (ring) TPs. We have clarified the physical mechanism for the occurrence of single Weyl, high degenerate Weyl, individual nodal-line (ring), nodal-link, nodal-chain, …


Pyxtal_Ff: A Python Library For Automated Force Field Generation, Howard Yanxon, David Zagaceta, Binh Tang, David S. Matteson, Qiang Zhu Dec 2020

Pyxtal_Ff: A Python Library For Automated Force Field Generation, Howard Yanxon, David Zagaceta, Binh Tang, David S. Matteson, Qiang Zhu

Physics & Astronomy Faculty Research

We present PyXtal_FF—a package based on Python programming language—for developing machine learning potentials (MLPs). The aim of PyXtal_FF is to promote the application of atomistic simulations through providing several choices of atom-centered descriptors and machine learning regressions in one platform. Based on the given choice of descriptors (including the atom-centered symmetry functions, embedded atom density, SO4 bispectrum, and smooth SO3 power spectrum), PyXtal_FF can train MLPs with either generalized linear regression or neural network models, by simultaneously minimizing the errors of energy/forces/stress tensors in comparison with the data from ab-initio simulations. The trained MLP model from PyXtal_FF is interfaced with …


Rethinking The Weakness Of Stream Ciphers And Its Application To Encrypted Malware Detection, William Stone, Daeyoung Kim, Victor Youdom Kemmoe, Mingon Kang, Junggab Son Oct 2020

Rethinking The Weakness Of Stream Ciphers And Its Application To Encrypted Malware Detection, William Stone, Daeyoung Kim, Victor Youdom Kemmoe, Mingon Kang, Junggab Son

Computer Science Faculty Research

One critical vulnerability of stream ciphers is the reuse of an encryption key. Since most stream ciphers consist of only a key scheduling algorithm and an Exclusive OR (XOR) operation, an adversary may break the cipher by XORing two captured ciphertexts generated under the same key. Various cryptanalysis techniques based on this property have been introduced in order to recover plaintexts or encryption keys; in contrast, this research reinterprets the vulnerability as a method of detecting stream ciphers from the ciphertexts it generates. Patterns found in the values (characters) expressed across the bytes of a ciphertext make the ciphertext distinguishable …


Measuring The Perceived Social Intelligence Of Robots, Kimberly A. Barchard, Leiszle Lapping-Carr, R. Shane Westfall, Andrea Fink-Armold, Santosh Balajee Banisetty, David Feil-Seifer Sep 2020

Measuring The Perceived Social Intelligence Of Robots, Kimberly A. Barchard, Leiszle Lapping-Carr, R. Shane Westfall, Andrea Fink-Armold, Santosh Balajee Banisetty, David Feil-Seifer

Psychology Faculty Research

Robotic social intelligence is increasingly important. However, measures of human social intelligence omit basic skills, and robot-specific scales do not focus on social intelligence. We combined human robot interaction concepts of beliefs, desires, and intentions with psychology concepts of behaviors, cognitions, and emotions to create 20 Perceived Social Intelligence (PSI) Scales to comprehensively measure perceptions of robots with a wide range of embodiments and behaviors. Participants rated humanoid and non-humanoid robots interacting with people in five videos. Each scale had one factor and high internal consistency, indicating each measures a coherent construct. Scales capturing perceived social information processing skills (appearing …


Machine Learning Corrected Quantum Dynamics Calculations, A. Jasinski, J. Montaner, R. C. Forrey, B. H. Yang, P. C. Stancil, Naduvalath Balakrishnan, J. Dai, A. Vargas-Hernandez, R. V. Krems Aug 2020

Machine Learning Corrected Quantum Dynamics Calculations, A. Jasinski, J. Montaner, R. C. Forrey, B. H. Yang, P. C. Stancil, Naduvalath Balakrishnan, J. Dai, A. Vargas-Hernandez, R. V. Krems

Chemistry and Biochemistry Faculty Research

Quantum scattering calculations for all but low-dimensional systems at low energies must rely on approximations. All approximations introduce errors. The impact of these errors is often difficult to assess because they depend on the Hamiltonian parameters and the particular observable under study. Here, we illustrate a general, system- and approximation-independent, approach to improve the accuracy of quantum dynamics approximations. The method is based on a Bayesian machine learning (BML) algorithm that is trained by a small number of exact results and a large number of approximate calculations, resulting in ML models that can generalize exact quantum results to different dynamical …


College Of Engineering Senior Design Competition Spring 2020, University Of Nevada, Las Vegas May 2020

College Of Engineering Senior Design Competition Spring 2020, University Of Nevada, Las Vegas

Fred and Harriet Cox Senior Design Competition Projects

Part of every UNLV engineering student’s academic experience, the senior design project stimulates engineering innovation and entrepreneurship. Each student in their senior year chooses, plans, designs, and prototypes a product in this required element of the curriculum. A capstone to the student’s educational career, the senior design project encourages the student to use everything learned in the engineering program to create a practical, real world solution to an engineering challenge. The senior design competition helps focus the senior students in increasing the quality and potential for commercial application for their design projects. Judges from local industry evaluate the projects on …


The Equifax Hack Revisited And Repurposed, Hal Berghel May 2020

The Equifax Hack Revisited And Repurposed, Hal Berghel

Civil and Environmental Engineering and Construction Faculty Research

Reports on the recent indictments against Chinese hackers regarding Equifax.


Wind Power Forecasting Methods Based On Deep Learning: A Survey, Xing Deng, Haijian Shao, Chunlong Hu, Dengbiao Jiang, Yingtao Jiang Jan 2020

Wind Power Forecasting Methods Based On Deep Learning: A Survey, Xing Deng, Haijian Shao, Chunlong Hu, Dengbiao Jiang, Yingtao Jiang

Electrical & Computer Engineering Faculty Research

Accurate wind power forecasting in wind farm can effectively reduce the enormous impact on grid operation safety when high permeability intermittent power supply is connected to the power grid. Aiming to provide reference strategies for relevant researchers as well as practical applications, this paper attempts to provide the literature investigation and methods analysis of deep learning, enforcement learning and transfer learning in wind speed and wind power forecasting modeling. Usually, wind speed and wind power forecasting around a wind farm requires the calculation of the next moment of the definite state, which is usually achieved based on the state of …


Dynamic Allocation/Reallocation Of Dark Cores In Many-Core Systems For Improved System Performance, Xingxing Huang, Xiaohang Wang, Yingtao Jiang, Amit Kumar Singh, Mei Yang Jan 2020

Dynamic Allocation/Reallocation Of Dark Cores In Many-Core Systems For Improved System Performance, Xingxing Huang, Xiaohang Wang, Yingtao Jiang, Amit Kumar Singh, Mei Yang

Electrical & Computer Engineering Faculty Research

A significant number of processing cores in any many-core systems nowadays and likely in the future have to be switched off or forced to be idle to become dark cores, in light of ever increasing power density and chip temperature. Although these dark cores cannot make direct contributions to the chip's throughput, they can still be allocated to applications currently running in the system for the sole purpose of heat dissipation enabled by the temperature gradient between the active and dark cores. However, allocating dark cores to applications tends to add extra waiting time to applications yet to be launched, …


A Design Of Mac Model Based On The Separation Of Duties And Data Coloring: Dsdc-Mac, Soon-Book Lee, Yoo-Hwan Kim, Jin-Woo Kim, Chee-Yang Song Jan 2020

A Design Of Mac Model Based On The Separation Of Duties And Data Coloring: Dsdc-Mac, Soon-Book Lee, Yoo-Hwan Kim, Jin-Woo Kim, Chee-Yang Song

Computer Science Faculty Research

Among the access control methods for database security, there is Mandatory Access Control (MAC) model in which the security level is set to both the subject and the object to enhance the security control. Legacy MAC models have focused only on one thing, either confidentiality or integrity. Thus, it can cause collisions between security policies in supporting confidentiality and integrity simultaneously. In addition, they do not provide a granular security class policy of subjects and objects in terms of subjects' roles or tasks. In this paper, we present the security policy of Bell_LaPadula Model (BLP) model and Biba model as …


College Of Engineering Senior Design Competition Fall 2019, University Of Nevada, Las Vegas Dec 2019

College Of Engineering Senior Design Competition Fall 2019, University Of Nevada, Las Vegas

Fred and Harriet Cox Senior Design Competition Projects

Part of every UNLV engineering student’s academic experience, the senior design project stimulates engineering innovation and entrepreneurship. Each student in their senior year chooses, plans, designs, and prototypes a product in this required element of the curriculum. A capstone to the student’s educational career, the senior design project encourages the student to use everything learned in the engineering program to create a practical, real world solution to an engineering challenge. The senior design competition helps focus the senior students in increasing the quality and potential for commercial application for their design projects. Judges from local industry evaluate the projects on …


3d-Printing And Machine Learning Control Of Soft Ionic Polymer-Metal Composite Actuators, James D. Carrico, Tucker Hermans, Kwang J. Kim, Kam K. Leang Nov 2019

3d-Printing And Machine Learning Control Of Soft Ionic Polymer-Metal Composite Actuators, James D. Carrico, Tucker Hermans, Kwang J. Kim, Kam K. Leang

Mechanical Engineering Faculty Research

This paper presents a new manufacturing and control paradigm for developing soft ionic polymer-metal composite (IPMC) actuators for soft robotics applications. First, an additive manufacturing method that exploits the fused-filament (3D printing) process is described to overcome challenges with existing methods of creating custom-shaped IPMC actuators. By working with ionomeric precursor material, the 3D-printing process enables the creation of 3D monolithic IPMC devices where ultimately integrated sensors and actuators can be achieved. Second, Bayesian optimization is used as a learning-based control approach to help mitigate complex time-varying dynamic effects in 3D-printed actuators. This approach overcomes the challenges with existing methods …


Design And Modeling Of A New Biomimetic Soft Robotic Jellyfish Using Ipmc-Based Electroactive Polymers, Zakai J. Olsen, Kwang J. Kim Nov 2019

Design And Modeling Of A New Biomimetic Soft Robotic Jellyfish Using Ipmc-Based Electroactive Polymers, Zakai J. Olsen, Kwang J. Kim

Mechanical Engineering Faculty Research

Smart materials and soft robotics have been seen to be particularly well-suited for developing biomimetic devices and are active fields of research. In this study, the design and modeling of a new biomimetic soft robot is described. Initial work was made in the modeling of a biomimetic robot based on the locomotion and kinematics of jellyfish. Modifications were made to the governing equations for jellyfish locomotion that accounted for geometric differences between biology and the robotic design. In particular, the capability of the model to account for the mass and geometry of the robot design has been added for better …


Hadoop Performance Analysis Model With Deep Data Locality, Sungchul Lee, Ju-Yeon Jo, Yoohwan Kim Jun 2019

Hadoop Performance Analysis Model With Deep Data Locality, Sungchul Lee, Ju-Yeon Jo, Yoohwan Kim

Computer Science Faculty Research

Background: Hadoop has become the base framework on the big data system via the simple concept that moving computation is cheaper than moving data. Hadoop increases a data locality in the Hadoop Distributed File System (HDFS) to improve the performance of the system. The network traffic among nodes in the big data system is reduced by increasing a data-local on the machine. Traditional research increased the data-local on one of the MapReduce stages to increase the Hadoop performance. However, there is currently no mathematical performance model for the data locality on the Hadoop. Methods: This study made the Hadoop performance …


College Of Engineering Senior Design Competition Spring 2019, University Of Nevada, Las Vegas May 2019

College Of Engineering Senior Design Competition Spring 2019, University Of Nevada, Las Vegas

Fred and Harriet Cox Senior Design Competition Projects

Part of every UNLV engineering student’s academic experience, the senior design project stimulates engineering innovation and entrepreneurship. Each student in their senior year chooses, plans, designs, and prototypes a product in this required element of the curriculum. A capstone to the student’s educational career, the senior design project encourages the student to use everything learned in the engineering program to create a practical, real world solution to an engineering challenge. The senior design competition helps focus the senior students in increasing the quality and potential for commercial application for their design projects. Judges from local industry evaluate the projects on …


Energy Efficiency And Renewable Energy Management With Multi-State Power-Down Systems, James Andro-Vasko, Wolfgang W. Bein, Hiro Ito Jan 2019

Energy Efficiency And Renewable Energy Management With Multi-State Power-Down Systems, James Andro-Vasko, Wolfgang W. Bein, Hiro Ito

Computer Science Faculty Research

A power-down system has an on-state, an off-state, and a finite or infinite number of intermediate states. In the off-state, the system uses no energy and in the on-state energy it is used fully. Intermediate states consume only some fraction of energy but switching back to the on-state comes at a cost. Previous work has mainly focused on asymptotic results for systems with a large number of states. In contrast, the authors study problems with a few states as well as systems with one continuous state. Such systems play a role in energy-efficiency for information technology but are especially important …


Self-Stabilizing Token Distribution With Constant-Space For Trees, Yuichi Sudo, Ajoy K. Datta, Lawrence L. Larmore, Toshimitsu Masuzawa Dec 2018

Self-Stabilizing Token Distribution With Constant-Space For Trees, Yuichi Sudo, Ajoy K. Datta, Lawrence L. Larmore, Toshimitsu Masuzawa

Computer Science Faculty Research

Self-stabilizing and silent distributed algorithms for token distribution in rooted tree networks are given. Initially, each process of a graph holds at most l tokens. Our goal is to distribute the tokens in the whole network so that every process holds exactly k tokens. In the initial configuration, the total number of tokens in the network may not be equal to nk where n is the number of processes in the network. The root process is given the ability to create a new token or remove a token from the network. We aim to minimize the convergence time, the number …


Loosely-Stabilizing Leader Election With Polylogarithmic Convergence Time, Yuichi Sudo, Fukuhito Ooshita, Hirotsugu Kukugawa, Toshimitsu Masuzawa, Ajoy K. Datta, Lawrence L. Larmore Dec 2018

Loosely-Stabilizing Leader Election With Polylogarithmic Convergence Time, Yuichi Sudo, Fukuhito Ooshita, Hirotsugu Kukugawa, Toshimitsu Masuzawa, Ajoy K. Datta, Lawrence L. Larmore

Computer Science Faculty Research

A loosely-stabilizing leader election protocol with polylogarithmic convergence time in the population protocol model is presented in this paper. In the population protocol model, which is a common abstract model of mobile sensor networks, it is known to be impossible to design a self-stabilizing leader election protocol. Thus, in our prior work, we introduced the concept of loose-stabilization, which is weaker than self-stabilization but has similar advantage as self-stabilization in practice. Following this work, several loosely-stabilizing leader election protocols are presented. The loosely-stabilizing leader election guarantees that, starting from an arbitrary configuration, the system reaches a safe configuration with a …