Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

PDF

Old Dominion University

Series

Keyword
Publication Year
Publication

Articles 1 - 30 of 305

Full-Text Articles in Engineering

The Feasibility Of Motion Tracking Camera System For Magnetic Suspension Wind Tunnel Tests, Hisham M. Shehata, David Cox, Mark Schoenenberger, Colin Britcher, Eli Shellabarger, Timothy Schott, Brendan Mcgovern Jan 2024

The Feasibility Of Motion Tracking Camera System For Magnetic Suspension Wind Tunnel Tests, Hisham M. Shehata, David Cox, Mark Schoenenberger, Colin Britcher, Eli Shellabarger, Timothy Schott, Brendan Mcgovern

Mechanical & Aerospace Engineering Faculty Publications

The Entry Systems Modeling (ESM) Program at NASA has actively participated in the re-development of the Magnetic Suspension Balance System (MSBS) at the six-inch subsonic wind tunnel at NASA Langley Research Center. This initiative aims to enhance the MSBS system's capabilities, enabling the testing of stingless entry vehicle models at supersonic speeds. To achieve this, control algorithms are required to ensure magnetic levitation control and stability for models during free-oscillation dynamic responses. Currently, the system relies on electromagnetic position sensors to provide real-time 3 degrees of freedom control of a rigid body. While this approach has proven successful for subsonic …


Urban Flood Extent Segmentation And Evaluation From Real-World Surveillance Camera Images Using Deep Convolutional Neural Network, Yidi Wang, Yawen Shen, Behrouz Salahshour, Mecit Cetin, Khan Iftekharuddin, Navid Tahvildari, Guoping Huang, Devin K. Harris, Kwame Ampofo, Jonathan L. Goodall Jan 2024

Urban Flood Extent Segmentation And Evaluation From Real-World Surveillance Camera Images Using Deep Convolutional Neural Network, Yidi Wang, Yawen Shen, Behrouz Salahshour, Mecit Cetin, Khan Iftekharuddin, Navid Tahvildari, Guoping Huang, Devin K. Harris, Kwame Ampofo, Jonathan L. Goodall

Civil & Environmental Engineering Faculty Publications

This study explores the use of Deep Convolutional Neural Network (DCNN) for semantic segmentation of flood images. Imagery datasets of urban flooding were used to train two DCNN-based models, and camera images were used to test the application of the models with real-world data. Validation results show that both models extracted flood extent with a mean F1-score over 0.9. The factors that affected the performance included still water surface with specular reflection, wet road surface, and low illumination. In testing, reduced visibility during a storm and raindrops on surveillance cameras were major problems that affected the segmentation of flood extent. …


Designing High-Performance Identity-Based Quantum Signature Protocol With Strong Security, Sunil Prajapat, Pankaj Kumar, Sandeep Kumar, Ashok Kumar Das, Sachin Shetty, M. Shamim Hossain Jan 2024

Designing High-Performance Identity-Based Quantum Signature Protocol With Strong Security, Sunil Prajapat, Pankaj Kumar, Sandeep Kumar, Ashok Kumar Das, Sachin Shetty, M. Shamim Hossain

VMASC Publications

Due to the rapid advancement of quantum computers, there has been a furious race for quantum technologies in academia and industry. Quantum cryptography is an important tool for achieving security services during quantum communication. Designated verifier signature, a variant of quantum cryptography, is very useful in applications like the Internet of Things (IoT) and auctions. An identity-based quantum-designated verifier signature (QDVS) scheme is suggested in this work. Our protocol features security attributes like eavesdropping, non-repudiation, designated verification, and hiding sources attacks. Additionally, it is protected from attacks on forgery, inter-resending, and impersonation. The proposed scheme benefits from the traditional designated …


Ethical Decision-Making In Older Drivers During Critical Driving Situations: An Online Experiment, Amandeep Singh, Sarah Yahoodik, Yovela Murzello, Samuel Petkac, Yusuke Yamani, Siby Samuel Jan 2024

Ethical Decision-Making In Older Drivers During Critical Driving Situations: An Online Experiment, Amandeep Singh, Sarah Yahoodik, Yovela Murzello, Samuel Petkac, Yusuke Yamani, Siby Samuel

Psychology Faculty Publications

The present study examined the impact of aging on ethical decision-making in simulated critical driving scenarios. 204 participants from North America, grouped into two age groups (18–30 years and 65 years and above), were asked to decide whether their simulated automated vehicle should stay in or change from the current lane in scenarios mimicking the Trolley Problem. Each participant viewed a video clip rendered by the driving simulator at Old Dominion University and pressed the space-bar if they decided to intervene in the control of the simulated automated vehicle in an online experiment. Bayesian hierarchical models were used to analyze …


Triphlapan: Predicting Hla Molecules Binding Peptides Based On Triple Coding Matrix And Transfer Learning, Meng Wang, Chuqi Lei, Jianxin Wang, Yaohang Li, Min Li Jan 2024

Triphlapan: Predicting Hla Molecules Binding Peptides Based On Triple Coding Matrix And Transfer Learning, Meng Wang, Chuqi Lei, Jianxin Wang, Yaohang Li, Min Li

Computer Science Faculty Publications

Human leukocyte antigen (HLA) recognizes foreign threats and triggers immune responses by presenting peptides to T cells. Computationally modeling the binding patterns between peptide and HLA is very important for the development of tumor vaccines. However, it is still a big challenge to accurately predict HLA molecules binding peptides. In this paper, we develop a new model TripHLApan for predicting HLA molecules binding peptides by integrating triple coding matrix, BiGRU + Attention models, and transfer learning strategy. We have found the main interaction site regions between HLA molecules and peptides, as well as the correlation between HLA encoding and binding …


A Survey On Few-Shot Class-Incremental Learning, Songsong Tian, Lusi Li, Weijun Li, Hang Ran, Xin Ning, Prayag Tiwari Jan 2024

A Survey On Few-Shot Class-Incremental Learning, Songsong Tian, Lusi Li, Weijun Li, Hang Ran, Xin Ning, Prayag Tiwari

Computer Science Faculty Publications

Large deep learning models are impressive, but they struggle when real-time data is not available. Few-shot class-incremental learning (FSCIL) poses a significant challenge for deep neural networks to learn new tasks from just a few labeled samples without forgetting the previously learned ones. This setup can easily leads to catastrophic forgetting and overfitting problems, severely affecting model performance. Studying FSCIL helps overcome deep learning model limitations on data volume and acquisition time, while improving practicality and adaptability of machine learning models. This paper provides a comprehensive survey on FSCIL. Unlike previous surveys, we aim to synthesize few-shot learning and incremental …


A Chinese Power Text Classification Algorithm Based On Deep Active Learning, Song Deng, Qianliang Li, Renjie Dai, Siming Wei, Di Wu, Yi He, Xindong Wu Jan 2024

A Chinese Power Text Classification Algorithm Based On Deep Active Learning, Song Deng, Qianliang Li, Renjie Dai, Siming Wei, Di Wu, Yi He, Xindong Wu

Computer Science Faculty Publications

The construction of knowledge graph is beneficial for grid production, electrical safety protection, fault diagnosis and traceability in an observable and controllable way. Highly-precision text classification algorithm is crucial to build a professional knowledge graph in power system. Unfortunately, there are a large number of poorly described and specialized texts in the power business system, and the amount of data containing valid labels in these texts is low. This will bring great challenges to improve the precision of text classification models. To offset the gap, we propose a classification algorithm for Chinese text in the power system based on deep …


Applications Of Ai/Ml In Maritime Cyber Supply Chains, Rafael Diaz, Ricardo Ungo, Katie Smith, Lida Haghnegahdar, Bikash Singh, Tran Phuong Jan 2024

Applications Of Ai/Ml In Maritime Cyber Supply Chains, Rafael Diaz, Ricardo Ungo, Katie Smith, Lida Haghnegahdar, Bikash Singh, Tran Phuong

School of Cybersecurity Faculty Publications

Digital transformation is a new trend that describes enterprise efforts in transitioning manual and likely outdated processes and activities to digital formats dominated by the extensive use of Industry 4.0 elements, including the pervasive use of cyber-physical systems to increase efficiency, reduce waste, and increase responsiveness. A new domain that intersects supply chain management and cybersecurity emerges as many processes as possible of the enterprise require the convergence and synchronizing of resources and information flows in data-driven environments to support planning and execution activities. Protecting the information becomes imperative as big data flows must be parsed and translated into actions …


Anonymous Attribute-Based Broadcast Encryption With Hidden Multiple Access Structures, Tran Viet Xuan Phuong Jan 2024

Anonymous Attribute-Based Broadcast Encryption With Hidden Multiple Access Structures, Tran Viet Xuan Phuong

School of Cybersecurity Faculty Publications

Due to the high demands of data communication, the broadcasting system streams the data daily. This service not only sends out the message to the correct participant but also respects the security of the identity user. In addition, when delivered, all the information must be protected for the party who employs the broadcasting service. Currently, Attribute-Based Broadcast Encryption (ABBE) is useful to apply for the broadcasting service. (ABBE) is a combination of Attribute-Based Encryption (ABE) and Broadcast Encryption (BE), which allows a broadcaster (or encrypter) to broadcast an encrypted message, including a predefined user set and specified access policy to …


A New Cache Replacement Policy In Named Data Network Based On Fib Table Information, Mehran Hosseinzadeh, Neda Moghim, Samira Taheri, Nasrin Gholami Jan 2024

A New Cache Replacement Policy In Named Data Network Based On Fib Table Information, Mehran Hosseinzadeh, Neda Moghim, Samira Taheri, Nasrin Gholami

VMASC Publications

Named Data Network (NDN) is proposed for the Internet as an information-centric architecture. Content storing in the router’s cache plays a significant role in NDN. When a router’s cache becomes full, a cache replacement policy determines which content should be discarded for the new content storage. This paper proposes a new cache replacement policy called Discard of Fast Retrievable Content (DFRC). In DFRC, the retrieval time of the content is evaluated using the FIB table information, and the content with less retrieval time receives more discard priority. An impact weight is also used to involve both the grade of retrieval …


Effect Of Resin Bleed Out On Compaction Behavior Of The Fiber Tow Gap Region During Automated Fiber Placement Manufacturing, Von Clyde Jamora, Virginia Rauch, Sergii G. Kravchenko, Oleksandr G. Kravchenko Jan 2024

Effect Of Resin Bleed Out On Compaction Behavior Of The Fiber Tow Gap Region During Automated Fiber Placement Manufacturing, Von Clyde Jamora, Virginia Rauch, Sergii G. Kravchenko, Oleksandr G. Kravchenko

Mechanical & Aerospace Engineering Faculty Publications

Automated fiber placement is a state-of-the-art manufacturing method which allows for precise control over layup design. However, AFP results in irregular morphology due to fiber tow deposition induced features such as tow gaps and overlaps. Factors such as the squeeze flow and resin bleed out, combined with large non-linear deformation, lead to morphological variability. To understand these complex interacting phenomena, a coupled multiphysics finite element framework was developed to simulate the compaction behavior around fiber tow gap regions, which consists of coupled chemo-rheological and flow-compaction analysis. The compaction analysis incorporated a visco-hyperelastic constitutive model with anisotropic tensorial prepreg viscosity, which …


Development Of A Two-Finger Haptic Robotic Hand With Novel Stiffness Detection And Impedance Control, Vahid Mohammadi, Ramin Shahbad, Mojtaba Hosseini, Mohammad Hossein Gholampour, Saeed Shiry Ghidary, Farshid Najafi, Ahad Behboodi Jan 2024

Development Of A Two-Finger Haptic Robotic Hand With Novel Stiffness Detection And Impedance Control, Vahid Mohammadi, Ramin Shahbad, Mojtaba Hosseini, Mohammad Hossein Gholampour, Saeed Shiry Ghidary, Farshid Najafi, Ahad Behboodi

Mechanical & Aerospace Engineering Faculty Publications

Haptic hands and grippers, designed to enable skillful object manipulation, are pivotal for high-precision interaction with environments. These technologies are particularly vital in fields such as minimally invasive surgery, where they enhance surgical accuracy and tactile feedback: in the development of advanced prosthetic limbs, offering users improved functionality and a more natural sense of touch, and within industrial automation and manufacturing, they contribute to more efficient, safe, and flexible production processes. This paper presents the development of a two-finger robotic hand that employs simple yet precise strategies to manipulate objects without damaging or dropping them. Our innovative approach fused force-sensitive …


Physics-Informed Deep Learning With Kalman Filter Mixture For Traffic State Prediction, Niharika Deshpande, Hyoshin (John) Park Jan 2024

Physics-Informed Deep Learning With Kalman Filter Mixture For Traffic State Prediction, Niharika Deshpande, Hyoshin (John) Park

Engineering Management & Systems Engineering Faculty Publications

Accurate traffic forecasting is crucial for understanding and managing congestion for efficient transportation planning. However, conventional approaches often neglect epistemic uncertainty, which arises from incomplete knowledge across different spatiotemporal scales. This study addresses this challenge by introducing a novel methodology to establish dynamic spatiotemporal correlations that captures the unobserved heterogeneity in travel time through distinct peaks in probability density functions, guided by physics-based principles. We propose an innovative approach to modifying both prediction and correction steps of the Kalman Filter (KF) algorithm by leveraging established spatiotemporal correlations. Central to our approach is the development of a novel deep learning model …


Abmscore: A Heuristic Algorithm For Forming Strategic Coalitions In Agent-Based Simulation, Andrew J. Collins, Gayane Grigoryan Jan 2024

Abmscore: A Heuristic Algorithm For Forming Strategic Coalitions In Agent-Based Simulation, Andrew J. Collins, Gayane Grigoryan

Engineering Management & Systems Engineering Faculty Publications

Integrating human behavior into agent-based models has been challenging due to its diversity. An example is strategic coalition formation, which occurs when an individual decides to collaborate with others because it strategically benefits them, thereby increasing the expected utility of the situation. An algorithm called ABMSCORE was developed to help model strategic coalition formation in agent-based models. The ABMSCORE algorithm employs hedonic games from cooperative game theory and has been applied to various situations, including refugee egress and smallholder farming cooperatives. This paper discusses ABMSCORE, including its mechanism, requirements, limitations, and application. To demonstrate the potential of ABMSCORE, a new …


Using Feature Selection Enhancement To Evaluate Attack Detection In The Internet Of Things Environment, Khawlah Harahsheh, Rami Al-Naimat, Chung-Hao Chen Jan 2024

Using Feature Selection Enhancement To Evaluate Attack Detection In The Internet Of Things Environment, Khawlah Harahsheh, Rami Al-Naimat, Chung-Hao Chen

Electrical & Computer Engineering Faculty Publications

The rapid evolution of technology has given rise to a connected world where billions of devices interact seamlessly, forming what is known as the Internet of Things (IoT). While the IoT offers incredible convenience and efficiency, it presents a significant challenge to cybersecurity and is characterized by various power, capacity, and computational process limitations. Machine learning techniques, particularly those encompassing supervised classification techniques, offer a systematic approach to training models using labeled datasets. These techniques enable intrusion detection systems (IDSs) to discern patterns indicative of potential attacks amidst the vast amounts of IoT data. Our investigation delves into various aspects …


Sub-Band Backdoor Attack In Remote Sensing Imagery, Kazi Aminul Islam, Hongyi Wu, Chunsheng Xin, Rui Ning, Liuwan Zhu, Jiang Li Jan 2024

Sub-Band Backdoor Attack In Remote Sensing Imagery, Kazi Aminul Islam, Hongyi Wu, Chunsheng Xin, Rui Ning, Liuwan Zhu, Jiang Li

Electrical & Computer Engineering Faculty Publications

Remote sensing datasets usually have a wide range of spatial and spectral resolutions. They provide unique advantages in surveillance systems, and many government organizations use remote sensing multispectral imagery to monitor security-critical infrastructures or targets. Artificial Intelligence (AI) has advanced rapidly in recent years and has been widely applied to remote image analysis, achieving state-of-the-art (SOTA) performance. However, AI models are vulnerable and can be easily deceived or poisoned. A malicious user may poison an AI model by creating a stealthy backdoor. A backdoored AI model performs well on clean data but behaves abnormally when a planted trigger appears in …


Domain Adaptive Federated Learning For Multi-Institution Molecular Mutation Prediction And Bias Identification, W. Farzana, M. A. Witherow, I. Longoria, M. S. Sadique, A. Temtam, K. M. Iftekharuddin Jan 2024

Domain Adaptive Federated Learning For Multi-Institution Molecular Mutation Prediction And Bias Identification, W. Farzana, M. A. Witherow, I. Longoria, M. S. Sadique, A. Temtam, K. M. Iftekharuddin

Electrical & Computer Engineering Faculty Publications

Deep learning models have shown potential in medical image analysis tasks. However, training a generalized deep learning model requires huge amounts of patient data that is usually gathered from multiple institutions which may raise privacy concerns. Federated learning (FL) provides an alternative to sharing data across institutions. Nonetheless, FL is susceptible to a few challenges including inversion attacks on model weights, heterogenous data distributions, and bias. This study addresses heterogeneity and bias issues for multi-institution patient data by proposing domain adaptive FL modeling using several radiomics (volume, fractal, texture) features for O6-methylguanine-DNA methyltransferase (MGMT) classification across multiple institutions. The proposed …


Optimal Domain-Partitioning Algorithm For Real-Life Transportation Networks And Finite Element Meshes, Jimesh Bhagatji, Sharanabasaweshwara Asundi, Eric Thompson, Duc T. Nguyen Jun 2023

Optimal Domain-Partitioning Algorithm For Real-Life Transportation Networks And Finite Element Meshes, Jimesh Bhagatji, Sharanabasaweshwara Asundi, Eric Thompson, Duc T. Nguyen

Civil & Environmental Engineering Faculty Publications

For large-scale engineering problems, it has been generally accepted that domain-partitioning algorithms are highly desirable for general-purpose finite element analysis (FEA). This paper presents a heuristic numerical algorithm that can efficiently partition any transportation network (or any finite element mesh) into a specified number of subdomains (usually depending on the number of parallel processors available on a computer), which will result in “minimising the total number of system BOUNDARY nodes” (as a primary criterion) and achieve “balancing work loads” amongst the subdomains (as a secondary criterion). The proposed seven-step heuristic algorithm (with enhancement features) is based on engineering common sense …


Iot Health Devices: Exploring Security Risks In The Connected Landscape, Abasi-Amefon Obot Affia, Hilary Finch, Woosub Jung, Issah Abubakari Samori, Lucas Potter, Xavier-Lewis Palmer May 2023

Iot Health Devices: Exploring Security Risks In The Connected Landscape, Abasi-Amefon Obot Affia, Hilary Finch, Woosub Jung, Issah Abubakari Samori, Lucas Potter, Xavier-Lewis Palmer

School of Cybersecurity Faculty Publications

The concept of the Internet of Things (IoT) spans decades, and the same can be said for its inclusion in healthcare. The IoT is an attractive target in medicine; it offers considerable potential in expanding care. However, the application of the IoT in healthcare is fraught with an array of challenges, and also, through it, numerous vulnerabilities that translate to wider attack surfaces and deeper degrees of damage possible to both consumers and their confidence within health systems, as a result of patient-specific data being available to access. Further, when IoT health devices (IoTHDs) are developed, a diverse range of …


Artificial Intelligence-Enabled Exploratory Cyber-Physical Safety Analyzer Framework For Civilian Urban Air Mobility, Md. Shirajum Munir, Sumit Howlader Dipro, Kamrul Hasan, Tariqul Islam, Sachin Shetty Jan 2023

Artificial Intelligence-Enabled Exploratory Cyber-Physical Safety Analyzer Framework For Civilian Urban Air Mobility, Md. Shirajum Munir, Sumit Howlader Dipro, Kamrul Hasan, Tariqul Islam, Sachin Shetty

VMASC Publications

Urban air mobility (UAM) has become a potential candidate for civilization for serving smart citizens, such as through delivery, surveillance, and air taxis. However, safety concerns have grown since commercial UAM uses a publicly available communication infrastructure that enhances the risk of jamming and spoofing attacks to steal or crash crafts in UAM. To protect commercial UAM from cyberattacks and theft, this work proposes an artificial intelligence (AI)-enabled exploratory cyber-physical safety analyzer framework. The proposed framework devises supervised learning-based AI schemes such as decision tree, random forests, logistic regression, K-nearest neighbors (KNN), and long short-term memory (LSTM) for predicting and …


Teaching Data Acquisition Through The Arduino-Driven Home Weather Station Project, Sheryl Dutton, Kurt Galderisi, Murat Kuzlu, Otilia Popescu, Vukica Jovanovic Jan 2023

Teaching Data Acquisition Through The Arduino-Driven Home Weather Station Project, Sheryl Dutton, Kurt Galderisi, Murat Kuzlu, Otilia Popescu, Vukica Jovanovic

Engineering Technology Faculty Publications

The main objective of this paper is to present one possible way to engage undergraduate students in designing a system that uses the Internet of Things (IoT) strategy for data acquisition and management. The MATLAB home weather station project presented here was developed by a team of students for the senior design course in the Electrical Engineering Technology undergraduate program at Old Dominion University (ODU). The main purpose of this project was for undergraduate students to learn how to create a localized, compact, and precise weather station. Utilizing various sensors, both homemade and sourced online, this weather station is capable …


Patch-Wise Training With Convolutional Neural Networks To Synthetically Upscale Cfd Simulations, John P. Romano, Alec C. Brodeur, Oktay Baysal Jan 2023

Patch-Wise Training With Convolutional Neural Networks To Synthetically Upscale Cfd Simulations, John P. Romano, Alec C. Brodeur, Oktay Baysal

Mechanical & Aerospace Engineering Faculty Publications

This paper expands the authors’ prior work[1], which focuses on developing a convolutional neural network (CNN) model capable of mapping time-averaged, unsteady Reynold’s-averaged Navier-Stokes (URANS) simulations to higher resolution results informed by time-averaged detached eddy simulations (DES). The authors present improvements over the prior CNN autoencoder model that result from hyperparameter optimization, increased data set augmentation through the adoption of a patch-wise training approach, and the predictions of primitive variables rather than vorticity magnitude. The training of the CNN model developed in this study uses the same URANS and DES simulations of a transonic flow around several NACA 4-digit airfoils …


Convolutional-Neural-Network-Based Des-Level Aerodynamic Flow Field Generation From Urans Data, John P. Romano, Oktay Baysal, Alec C. Brodeur Jan 2023

Convolutional-Neural-Network-Based Des-Level Aerodynamic Flow Field Generation From Urans Data, John P. Romano, Oktay Baysal, Alec C. Brodeur

Mechanical & Aerospace Engineering Faculty Publications

The present paper culminates several investigations into the use of convolutional neural networks (CNNs) as a post-processing step to improve the accuracy of unsteady Reynolds-averaged Navier–Stokes (URANS) simulations for subsonic flows over airfoils at low angles of attack. Time-averaged detached eddy simulation (DES)-generated flow fields serve as the target data for creating and training CNN models. CNN post-processing generates flow-field data comparable to DES resolution, but after using only URANS-level resources and properly training CNN models. This document outlines the underlying theory and progress toward the goal of improving URANS simulations by looking at flow predictions for a class of …


Hashes Are Not Suitable To Verify Fixity Of The Public Archived Web, Mohamed Aturban, Martin Klein, Herbert Van De Sompel, Sawood Alam, Michael L. Nelson, Michele C. Weigle Jan 2023

Hashes Are Not Suitable To Verify Fixity Of The Public Archived Web, Mohamed Aturban, Martin Klein, Herbert Van De Sompel, Sawood Alam, Michael L. Nelson, Michele C. Weigle

Computer Science Faculty Publications

Web archives, such as the Internet Archive, preserve the web and allow access to prior states of web pages. We implicitly trust their versions of archived pages, but as their role moves from preserving curios of the past to facilitating present day adjudication, we are concerned with verifying the fixity of archived web pages, or mementos, to ensure they have always remained unaltered. A widely used technique in digital preservation to verify the fixity of an archived resource is to periodically compute a cryptographic hash value on a resource and then compare it with a previous hash value. If the …


Mitigating Anomalous Electricity Consumption In Smart Cities Using An Ai-Based Stacked-Generalization Technique, Arshid Ali, Laiq Khan, Nadeem Javaid, Safdar Hussain Bouk, Abdulaziz Aldegheishem, Nabil Alrahjeh Jan 2023

Mitigating Anomalous Electricity Consumption In Smart Cities Using An Ai-Based Stacked-Generalization Technique, Arshid Ali, Laiq Khan, Nadeem Javaid, Safdar Hussain Bouk, Abdulaziz Aldegheishem, Nabil Alrahjeh

Computer Science Faculty Publications

Energy management and efficient asset utilization play an important role in the economic development of a country. The electricity produced at the power station faces two types of losses from the generation point to the end user. These losses are technical losses (TL) and non-technical losses (NTL). TLs occurs due to the use of inefficient equipment. While NTLs occur due to the anomalous consumption of electricity by the customers, which happens in many ways; energy theft being one of them. Energy theft majorly happens to cut down on the electricity bills. These losses in the smart grid (SG) are the …


Optimization Of Ported Cfd Kernels On Intel Data Center Gpu Max 1550 Using Oneapi Esimd, Mohammad Zubair, Aaron Walden, Gabriel Nastac, Eric Nielsen, Christoph Bauinger, Xiao Zhu Jan 2023

Optimization Of Ported Cfd Kernels On Intel Data Center Gpu Max 1550 Using Oneapi Esimd, Mohammad Zubair, Aaron Walden, Gabriel Nastac, Eric Nielsen, Christoph Bauinger, Xiao Zhu

Computer Science Faculty Publications

We describe our experience porting FUN3D’s CUDA-optimized kernels to Intel oneAPI SYCL.We faced several challenges, including foremost the suboptimal performance of the oneAPI code on Intel’s new data center GPU. Suboptimal performance of the oneAPI code was due primarily to high register spills, memory latency, and poor vectorization. We addressed these issues by implementing the kernels using Intel oneAPI’s Explicit SIMD SYCL extension (ESIMD) API. The ESIMD API enables the writing of explicitly vectorized kernel code, gives more precise control over register usage and prefetching, and better handles thread divergence compared to SYCL. The ESIMD code outperforms the optimized SYCL …


A Structure-Aware Generative Adversarial Network For Bilingual Lexicon Induction, Bocheng Han, Qian Tao, Lusi Li, Zhihao Xiong Jan 2023

A Structure-Aware Generative Adversarial Network For Bilingual Lexicon Induction, Bocheng Han, Qian Tao, Lusi Li, Zhihao Xiong

Computer Science Faculty Publications

Bilingual lexicon induction (BLI) is the task of inducing word translations with a learned mapping function that aligns monolingual word embedding spaces in two different languages. However, most previous methods treat word embeddings as isolated entities and fail to jointly consider both the intra-space and inter-space topological relations between words. This limitation makes it challenging to align words from embedding spaces with distinct topological structures, especially when the assumption of isomorphism may not hold. To this end, we propose a novel approach called the Structure-Aware Generative Adversarial Network (SA-GAN) model to explicitly capture multiple topological structure information to achieve accurate …


Understanding And Assessing Demographic (In)Equity Resulting From Extreme Heat Exposure Due To Lack Of Tree Canopies In Norfolk, Va Using Agent-Based Modeling, Virginia Zamponi, Kevin O'Brien, Erik Jensen, Brandon Feldhaus, Russell Moore, Christopher J. Lynch, Ross Gore Jan 2023

Understanding And Assessing Demographic (In)Equity Resulting From Extreme Heat Exposure Due To Lack Of Tree Canopies In Norfolk, Va Using Agent-Based Modeling, Virginia Zamponi, Kevin O'Brien, Erik Jensen, Brandon Feldhaus, Russell Moore, Christopher J. Lynch, Ross Gore

VMASC Publications

Prolonged exposure to extreme heat can result in illness and death. In urban areas of dense concentrations of pavement, buildings, and other surfaces that absorb and retain heat, extreme heat conditions can arise regularly and create harmful environmental exposures for residents daily during certain parts of the year. Tree canopies provide shade and help to cool the environment, making mature trees with large canopies a simple and effective way to reduce urban heat. We develop a demographically representative 1 (agent): 1 (person) agent-based model to understand the extent to which different demographics of residents in Norfolk, VA are equitably shaded …


The Effect Of The Width Of The Incident Pulse To The Dielectric Transition Layer In The Scattering Of An Electromagnetic Pulse — A Qubit Lattice Algorithm Simulation, George Vahala, Linda Vahala, Abhay K. Ram, Min Soe Jan 2023

The Effect Of The Width Of The Incident Pulse To The Dielectric Transition Layer In The Scattering Of An Electromagnetic Pulse — A Qubit Lattice Algorithm Simulation, George Vahala, Linda Vahala, Abhay K. Ram, Min Soe

Electrical & Computer Engineering Faculty Publications

The effect of the thickness of the dielectric boundary layer that connects a material of refractive index n1 to another of index n2is considered for the propagation of an electromagnetic pulse. A qubit lattice algorithm (QLA), which consists of a specially chosen non-commuting sequence of collision and streaming operators acting on a basis set of qubits, is theoretically determined that recovers the Maxwell equations to second-order in a small parameter ϵ. For very thin boundary layer the scattering properties of the pulse mimics that found from the Fresnel jump conditions for a plane wave - except that …


Social-Engineering, Bio-Economies, And Nation-State Ontological Security: A Commentary, Brandon Griffin, Keitavius Alexander, Xavier-Lewis Palmer, Lucas Potter Jan 2023

Social-Engineering, Bio-Economies, And Nation-State Ontological Security: A Commentary, Brandon Griffin, Keitavius Alexander, Xavier-Lewis Palmer, Lucas Potter

Electrical & Computer Engineering Faculty Publications

Biocybersecurity is an evolving discipline that aims to identify the gaps and risks associated with the convergence of Biology (the science of life and living organisms) and cybersecurity (the science, study, and theory of cyberspace and cybernetics) to protect the bioeconomy. The biological industries’ increased reliance on digitization, automation, and computing power has resulted in benefits for the scientific community, it has simultaneously multiplied the risk factors associated with industrial espionage and the protection of data both commercial and proprietary. The sensitive and potentially destructive power of this data and its access inherently poses a risk to the national and …