Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- APIs (1)
- Alias (1)
- Architecture (1)
- Authentication (1)
- Biomedical imaging (1)
-
- Cache (1)
- Cancer (1)
- Cloud LAMP Stack (1)
- Compiler (1)
- Computer (1)
- Computer vision (1)
- Curricular Analytics (1)
- Cyber-physical exams (1)
- Cybersecurity (1)
- DNS (1)
- Deep learning (1)
- Delay Tolerant Network (1)
- Depth enhancement (1)
- Dynamic Spectrum Access (1)
- Electricity (1)
- Fault Tolerant (1)
- Graph Modeling (1)
- Human robot interaction (1)
- Image data collecting (1)
- In-place Carry Look-Ahead Adder (1)
- Influence spread (1)
- Information diffusion (1)
- Initial spreader selection (1)
- Interdependent networks (1)
- Internet (1)
- Publication
- Publication Type
Articles 1 - 13 of 13
Full-Text Articles in Engineering
Influence Spread In Two-Layer Interdependent Networks: Designed Single-Layer Or Random Two-Layer Initial Spreaders?, Hana Khamfroush, Nathaniel Hudson, Samuel Iloo, Mahshid R. Naeini
Influence Spread In Two-Layer Interdependent Networks: Designed Single-Layer Or Random Two-Layer Initial Spreaders?, Hana Khamfroush, Nathaniel Hudson, Samuel Iloo, Mahshid R. Naeini
Computer Science Faculty Publications
Influence spread in multi-layer interdependent networks (M-IDN) has been studied in the last few years; however, prior works mostly focused on the spread that is initiated in a single layer of an M-IDN. In real world scenarios, influence spread can happen concurrently among many or all components making up the topology of an M-IDN. This paper investigates the effectiveness of different influence spread strategies in M-IDNs by providing a comprehensive analysis of the time evolution of influence propagation given different initial spreader strategies. For this study we consider a two-layer interdependent network and a general probabilistic threshold influence spread model …
Anonymous And Efficient Message Authentication Scheme For Smart Grid, Libing Wu, Jing Wang, Sherali Zeadally, Debiao He
Anonymous And Efficient Message Authentication Scheme For Smart Grid, Libing Wu, Jing Wang, Sherali Zeadally, Debiao He
Information Science Faculty Publications
Smart grid has emerged as the next-generation electricity grid with power flow optimization and high power quality. Smart grid technologies have attracted the attention of industry and academia in the last few years. However, the tradeoff between security and efficiency remains a challenge in the practical deployment of the smart grid. Most recently, Li et al. proposed a lightweight message authentication scheme with user anonymity and claimed that their scheme is provably secure. But we found that their scheme fails to achieve mutual authentication and mitigate some typical attacks (e.g., impersonation attack, denial of service attack) in the smart grid …
A Generative Human-Robot Motion Retargeting Approach Using A Single Rgbd Sensor, Sen Wang, Xinxin Zuo, Runxiao Wang, Ruigang Yang
A Generative Human-Robot Motion Retargeting Approach Using A Single Rgbd Sensor, Sen Wang, Xinxin Zuo, Runxiao Wang, Ruigang Yang
Computer Science Faculty Publications
The goal of human-robot motion retargeting is to let a robot follow the movements performed by a human subject. Typically in previous approaches, the human poses are precomputed from a human pose tracking system, after which the explicit joint mapping strategies are specified to apply the estimated poses to a target robot. However, there is not any generic mapping strategy that we can use to map the human joint to robots with different kinds of configurations. In this paper, we present a novel motion retargeting approach that combines the human pose estimation and the motion retargeting procedure in a unified …
Is Dns Ready For Ubiquitous Internet Of Things?, Zhiwei Yan, Hongtao Li, Sherali Zeadally, Yu Zheng, Guanggang Geng
Is Dns Ready For Ubiquitous Internet Of Things?, Zhiwei Yan, Hongtao Li, Sherali Zeadally, Yu Zheng, Guanggang Geng
Information Science Faculty Publications
The vision of the Internet of Things (IoT) covers not only the well-regulated processes of specific applications in different areas but also includes ubiquitous connectivity of more generic objects (or things and devices) in the physical world and the related information in the virtual world. For example, a typical IoT application, such as a smart city, includes smarter urban transport networks, upgraded water supply, and waste-disposal facilities, along with more efficient ways to light and heat buildings. For smart city applications and others, we require unique naming of every object and a secure, scalable, and efficient name resolution which can …
Metadata-Based Image Collecting And Databasing For Sharing And Analysis, Xi Wu
Metadata-Based Image Collecting And Databasing For Sharing And Analysis, Xi Wu
Theses and Dissertations--Computer Science
Data collecting and preparing is generally considered a crucial process in data science projects. Especially for image data, adding semantic attributes when preparing image data provides much more insights for data scientists. In this project, we aim to implement a general-purpose central image data repository that allows image researchers to collect data with semantic properties as well as data query. One of our researchers has come up with the specific challenge of collecting images with weight data of infants in least developed countries with limited internet access. The rationale is to predict infant weights based on image data by applying …
Depth Enhancement And Surface Reconstruction With Rgb/D Sequence, Xinxin Zuo
Depth Enhancement And Surface Reconstruction With Rgb/D Sequence, Xinxin Zuo
Theses and Dissertations--Computer Science
Surface reconstruction and 3D modeling is a challenging task, which has been explored for decades by the computer vision, computer graphics, and machine learning communities. It is fundamental to many applications such as robot navigation, animation and scene understanding, industrial control and medical diagnosis. In this dissertation, I take advantage of the consumer depth sensors for surface reconstruction. Considering its limited performance on capturing detailed surface geometry, a depth enhancement approach is proposed in the first place to recovery small and rich geometric details with captured depth and color sequence. In addition to enhancing its spatial resolution, I present a …
A Diverse Band-Aware Dynamic Spectrum Access Architecture For Connectivity In Rural Communities, Vijay K. Shah
A Diverse Band-Aware Dynamic Spectrum Access Architecture For Connectivity In Rural Communities, Vijay K. Shah
Theses and Dissertations--Computer Science
Ubiquitous connectivity plays an important role in improving the quality of life in terms of economic development, health and well being, social justice and equity, as well as in providing new educational opportunities. However, rural communities which account for 46% of the world's population lacks access to proper connectivity to avail such societal benefits, creating a huge "digital divide" between the urban and rural areas. A primary reason is that the Information and Communication Technologies (ICT) providers have less incentives to invest in rural areas due to lack of promising revenue returns. Existing research and industrial attempts in providing connectivity …
Novel Applications Of Machine Learning In Bioinformatics, Yi Zhang
Novel Applications Of Machine Learning In Bioinformatics, Yi Zhang
Theses and Dissertations--Computer Science
Technological advances in next-generation sequencing and biomedical imaging have led to a rapid increase in biomedical data dimension and acquisition rate, which is challenging the conventional data analysis strategies. Modern machine learning techniques promise to leverage large data sets for finding hidden patterns within them, and for making accurate predictions. This dissertation aims to design novel machine learning-based models to transform biomedical big data into valuable biological insights. The research presented in this dissertation focuses on three bioinformatics domains: splice junction classification, gene regulatory network reconstruction, and lesion detection in mammograms.
A critical step in defining gene structures and mRNA …
Procure-To-Pay Software In The Digital Age: An Exploration And Analysis Of Efficiency Gains And Cybersecurity Risks In Modern Procurement Systems, Drew Lane
MPA/MPP/MPFM Capstone Projects
Procure-to-Pay (P2P) softwares are an integral part of the payment and procurement processing functions at large-scale governmental institutions. These softwares house all of the financial functions related to procurement, accounts payable, and often human resources, helping to facilitate and automate the process from initiation of a payment or purchase, to the actual disbursal of funds. Often, these softwares contain budgeting and financial reporting tools as part of the offering. As such an integral part of the financial process, these softwares obviously come at an immense cost from a set of reputable vendors. In the case of government, these vendors mainly …
Automated Network Security With Exceptions Using Sdn, Sergio A. Rivera Polanco
Automated Network Security With Exceptions Using Sdn, Sergio A. Rivera Polanco
Theses and Dissertations--Computer Science
Campus networks have recently experienced a proliferation of devices ranging from personal use devices (e.g. smartphones, laptops, tablets), to special-purpose network equipment (e.g. firewalls, network address translation boxes, network caches, load balancers, virtual private network servers, and authentication servers), as well as special-purpose systems (badge readers, IP phones, cameras, location trackers, etc.). To establish directives and regulations regarding the ways in which these heterogeneous systems are allowed to interact with each other and the network infrastructure, organizations typically appoint policy writing committees (PWCs) to create acceptable use policy (AUP) documents describing the rules and behavioral guidelines that all campus network …
Curricular Optimization: Solving For The Optimal Student Success Pathway, William G. Thompson-Arjona
Curricular Optimization: Solving For The Optimal Student Success Pathway, William G. Thompson-Arjona
Theses and Dissertations--Electrical and Computer Engineering
Considering the significant investment of higher education made by students and their families, graduating in a timely manner is of the utmost importance. Delay attributed to drop out or the retaking of a course adds cost and negatively affects a student’s academic progression. Considering this, it becomes paramount for institutions to focus on student success in relation to term scheduling.
Often overlooked, complexity of a course schedule may be one of the most important factors in whether or not a student successfully completes his or her degree. More often than not students entering an institution as a first time full …
T-Count Optimization Of Quantum Carry Look-Ahead Adder, Vladislav Ivanovich Khalus
T-Count Optimization Of Quantum Carry Look-Ahead Adder, Vladislav Ivanovich Khalus
Theses and Dissertations--Electrical and Computer Engineering
With the emergence of quantum physics and computer science in the 20th century, a new era was born which can solve very difficult problems in a much faster rate or problems that classical computing just can't solve. In the 21st century, quantum computing needs to be used to solve tough problems in engineering, business, medical, and other fields that required results not today but yesterday. To make this dream come true, engineers in the semiconductor industry need to make the quantum circuits a reality.
To realize quantum circuits and make them scalable, they need to be fault tolerant, …
A Compiler Target Model For Line Associative Registers, Paul S. Eberhart
A Compiler Target Model For Line Associative Registers, Paul S. Eberhart
Theses and Dissertations--Electrical and Computer Engineering
LARs (Line Associative Registers) are very wide tagged registers, used for both register-wide SWAR (SIMD Within a Register )operations and scalar operations on arbitrary fields. LARs include a large data field, type tags, source addresses, and a dirty bit, which allow them to not only replace both caches and registers in the conventional memory hierarchy, but improve on both their functions. This thesis details a LAR-based architecture, and describes the design of a compiler which can generate code for a LAR-based design. In particular, type conversion, alignment, and register allocation are discussed in detail.