Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Atom-centered descriptors (1)
- Atomistic simulation (1)
- China (1)
- College seniors (1)
- Complemented BLP and Biba Model (1)
-
- Computer crime (1)
- Computer hacking (1)
- Dark core (1)
- Data coloring access control (1)
- Deep learning (1)
- Dynamic resource allocation (1)
- Dynamic scheduling (1)
- Encryption (1)
- Engineering design, contest (1)
- Engineering, studying and teaching (1)
- Heating systems (1)
- Human-computer interaction (1)
- Human-robot interaction (1)
- Intrusion detection (1)
- Law (1)
- Machine learning potential (1)
- Malware (1)
- Mandatory Access Control (MAC) (1)
- Many-core (1)
- Network security (1)
- Neural networks regression (1)
- Reinforcement learning (1)
- Resource management (1)
- Runtime (1)
- Science projects (1)
Articles 1 - 9 of 9
Full-Text Articles in Physical Sciences and Mathematics
Pyxtal_Ff: A Python Library For Automated Force Field Generation, Howard Yanxon, David Zagaceta, Binh Tang, David S. Matteson, Qiang Zhu
Pyxtal_Ff: A Python Library For Automated Force Field Generation, Howard Yanxon, David Zagaceta, Binh Tang, David S. Matteson, Qiang Zhu
Physics & Astronomy Faculty Research
We present PyXtal_FF—a package based on Python programming language—for developing machine learning potentials (MLPs). The aim of PyXtal_FF is to promote the application of atomistic simulations through providing several choices of atom-centered descriptors and machine learning regressions in one platform. Based on the given choice of descriptors (including the atom-centered symmetry functions, embedded atom density, SO4 bispectrum, and smooth SO3 power spectrum), PyXtal_FF can train MLPs with either generalized linear regression or neural network models, by simultaneously minimizing the errors of energy/forces/stress tensors in comparison with the data from ab-initio simulations. The trained MLP model from PyXtal_FF is interfaced with …
Rethinking The Weakness Of Stream Ciphers And Its Application To Encrypted Malware Detection, William Stone, Daeyoung Kim, Victor Youdom Kemmoe, Mingon Kang, Junggab Son
Rethinking The Weakness Of Stream Ciphers And Its Application To Encrypted Malware Detection, William Stone, Daeyoung Kim, Victor Youdom Kemmoe, Mingon Kang, Junggab Son
Computer Science Faculty Research
One critical vulnerability of stream ciphers is the reuse of an encryption key. Since most stream ciphers consist of only a key scheduling algorithm and an Exclusive OR (XOR) operation, an adversary may break the cipher by XORing two captured ciphertexts generated under the same key. Various cryptanalysis techniques based on this property have been introduced in order to recover plaintexts or encryption keys; in contrast, this research reinterprets the vulnerability as a method of detecting stream ciphers from the ciphertexts it generates. Patterns found in the values (characters) expressed across the bytes of a ciphertext make the ciphertext distinguishable …
Measuring The Perceived Social Intelligence Of Robots, Kimberly A. Barchard, Leiszle Lapping-Carr, R. Shane Westfall, Andrea Fink-Armold, Santosh Balajee Banisetty, David Feil-Seifer
Measuring The Perceived Social Intelligence Of Robots, Kimberly A. Barchard, Leiszle Lapping-Carr, R. Shane Westfall, Andrea Fink-Armold, Santosh Balajee Banisetty, David Feil-Seifer
Psychology Faculty Research
Robotic social intelligence is increasingly important. However, measures of human social intelligence omit basic skills, and robot-specific scales do not focus on social intelligence. We combined human robot interaction concepts of beliefs, desires, and intentions with psychology concepts of behaviors, cognitions, and emotions to create 20 Perceived Social Intelligence (PSI) Scales to comprehensively measure perceptions of robots with a wide range of embodiments and behaviors. Participants rated humanoid and non-humanoid robots interacting with people in five videos. Each scale had one factor and high internal consistency, indicating each measures a coherent construct. Scales capturing perceived social information processing skills (appearing …
Machine Learning Corrected Quantum Dynamics Calculations, A. Jasinski, J. Montaner, R. C. Forrey, B. H. Yang, P. C. Stancil, Naduvalath Balakrishnan, J. Dai, A. Vargas-Hernandez, R. V. Krems
Machine Learning Corrected Quantum Dynamics Calculations, A. Jasinski, J. Montaner, R. C. Forrey, B. H. Yang, P. C. Stancil, Naduvalath Balakrishnan, J. Dai, A. Vargas-Hernandez, R. V. Krems
Chemistry and Biochemistry Faculty Research
Quantum scattering calculations for all but low-dimensional systems at low energies must rely on approximations. All approximations introduce errors. The impact of these errors is often difficult to assess because they depend on the Hamiltonian parameters and the particular observable under study. Here, we illustrate a general, system- and approximation-independent, approach to improve the accuracy of quantum dynamics approximations. The method is based on a Bayesian machine learning (BML) algorithm that is trained by a small number of exact results and a large number of approximate calculations, resulting in ML models that can generalize exact quantum results to different dynamical …
College Of Engineering Senior Design Competition Spring 2020, University Of Nevada, Las Vegas
College Of Engineering Senior Design Competition Spring 2020, University Of Nevada, Las Vegas
Fred and Harriet Cox Senior Design Competition Projects
Part of every UNLV engineering student’s academic experience, the senior design project stimulates engineering innovation and entrepreneurship. Each student in their senior year chooses, plans, designs, and prototypes a product in this required element of the curriculum. A capstone to the student’s educational career, the senior design project encourages the student to use everything learned in the engineering program to create a practical, real world solution to an engineering challenge. The senior design competition helps focus the senior students in increasing the quality and potential for commercial application for their design projects. Judges from local industry evaluate the projects on …
The Equifax Hack Revisited And Repurposed, Hal Berghel
The Equifax Hack Revisited And Repurposed, Hal Berghel
Civil and Environmental Engineering and Construction Faculty Research
Reports on the recent indictments against Chinese hackers regarding Equifax.
Wind Power Forecasting Methods Based On Deep Learning: A Survey, Xing Deng, Haijian Shao, Chunlong Hu, Dengbiao Jiang, Yingtao Jiang
Wind Power Forecasting Methods Based On Deep Learning: A Survey, Xing Deng, Haijian Shao, Chunlong Hu, Dengbiao Jiang, Yingtao Jiang
Electrical & Computer Engineering Faculty Research
Accurate wind power forecasting in wind farm can effectively reduce the enormous impact on grid operation safety when high permeability intermittent power supply is connected to the power grid. Aiming to provide reference strategies for relevant researchers as well as practical applications, this paper attempts to provide the literature investigation and methods analysis of deep learning, enforcement learning and transfer learning in wind speed and wind power forecasting modeling. Usually, wind speed and wind power forecasting around a wind farm requires the calculation of the next moment of the definite state, which is usually achieved based on the state of …
Dynamic Allocation/Reallocation Of Dark Cores In Many-Core Systems For Improved System Performance, Xingxing Huang, Xiaohang Wang, Yingtao Jiang, Amit Kumar Singh, Mei Yang
Dynamic Allocation/Reallocation Of Dark Cores In Many-Core Systems For Improved System Performance, Xingxing Huang, Xiaohang Wang, Yingtao Jiang, Amit Kumar Singh, Mei Yang
Electrical & Computer Engineering Faculty Research
A significant number of processing cores in any many-core systems nowadays and likely in the future have to be switched off or forced to be idle to become dark cores, in light of ever increasing power density and chip temperature. Although these dark cores cannot make direct contributions to the chip's throughput, they can still be allocated to applications currently running in the system for the sole purpose of heat dissipation enabled by the temperature gradient between the active and dark cores. However, allocating dark cores to applications tends to add extra waiting time to applications yet to be launched, …
A Design Of Mac Model Based On The Separation Of Duties And Data Coloring: Dsdc-Mac, Soon-Book Lee, Yoo-Hwan Kim, Jin-Woo Kim, Chee-Yang Song
A Design Of Mac Model Based On The Separation Of Duties And Data Coloring: Dsdc-Mac, Soon-Book Lee, Yoo-Hwan Kim, Jin-Woo Kim, Chee-Yang Song
Computer Science Faculty Research
Among the access control methods for database security, there is Mandatory Access Control (MAC) model in which the security level is set to both the subject and the object to enhance the security control. Legacy MAC models have focused only on one thing, either confidentiality or integrity. Thus, it can cause collisions between security policies in supporting confidentiality and integrity simultaneously. In addition, they do not provide a granular security class policy of subjects and objects in terms of subjects' roles or tasks. In this paper, we present the security policy of Bell_LaPadula Model (BLP) model and Biba model as …