Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Publication Year
- Publication
- Publication Type
Articles 1 - 10 of 10
Full-Text Articles in Engineering
A Survey Of Using Machine Learning In Iot Security And The Challenges Faced By Researchers, Khawlah M. Harahsheh, Chung-Hao Chen
A Survey Of Using Machine Learning In Iot Security And The Challenges Faced By Researchers, Khawlah M. Harahsheh, Chung-Hao Chen
Electrical & Computer Engineering Faculty Publications
The Internet of Things (IoT) has become more popular in the last 15 years as it has significantly improved and gained control in multiple fields. We are nowadays surrounded by billions of IoT devices that directly integrate with our lives, some of them are at the center of our homes, and others control sensitive data such as military fields, healthcare, and datacenters, among others. This popularity makes factories and companies compete to produce and develop many types of those devices without caring about how secure they are. On the other hand, IoT is considered a good insecure environment for cyber …
Single Image Reflection Removal Beyond Linearity, Qiang Wen, Yinjie Tan, Jing Qin, Wenxi Liu, Guoqiang Han, Shengfeng He
Single Image Reflection Removal Beyond Linearity, Qiang Wen, Yinjie Tan, Jing Qin, Wenxi Liu, Guoqiang Han, Shengfeng He
Research Collection School Of Computing and Information Systems
Due to the lack of paired data, the training of image reflection removal relies heavily on synthesizing reflection images. However, existing methods model reflection as a linear combination model, which cannot fully simulate the real-world scenarios. In this paper, we inject non-linearity into reflection removal from two aspects. First, instead of synthesizing reflection with a fixed combination factor or kernel, we propose to synthesize reflection images by predicting a non-linear alpha blending mask. This enables a free combination of different blurry kernels, leading to a controllable and diverse reflection synthesis. Second, we design a cascaded network for reflection removal with …
Hardware Design Theory (Using Raspberry Pi), Anthony Kelly, Thomas Blum Dr.
Hardware Design Theory (Using Raspberry Pi), Anthony Kelly, Thomas Blum Dr.
Undergraduate Research
The concept for this research proposal is focused on achieving three main objectives:
1) To understand the logic and design behind the Raspberry Pi (RbP) mini-computer model, including: all hardware components and their functions, the capabilities [and limits] of the RbP, and the circuit engineering for these components.
2) To be able to, using the Python high-level language, duplicate, manipulate, and create RbP projects ranging from basic user-input and response systems to the theories behind more intricate and complicated observatory sensors.
3) Simultaneously, in order to combine a mutual shared interest of History and to blend in work done within …
Prosense, Johnny Favazza Ii, Casey Glasgow, Matt Epperson
Prosense, Johnny Favazza Ii, Casey Glasgow, Matt Epperson
Computer Engineering
This project aims to gather advanced data sets from MEMS sensors and GPS and deliver it to the user, who can capitalize on the data. The once negligible half-degree difference of your board barreling down a wave can be recorded from a gyro and exploited for the perfect turn. The exact speed dreaded by longboarders where speed wobbles turn into a road rash can be analysed and consequently avoided. Ascertaining the summit of your flight using combined GPS sensors from the ski ramp allows for the correct timing of tricks. When it comes to pursuing excellence in professional sports, amateur …
Effective Entity Resolution Methodology For Improving Data Quality And Reliability Of Service-Oriented Applications, Ewa Musial
Legacy Theses & Dissertations (2009 - 2024)
This dissertation proposes new paradigms for improving the testing, reliability of service-oriented applications as well as the quality of data. Since it is difficult to track information flowing through the multiple tiers of an application, testing service-oriented systems can be very challenging. We present a methodology for testing service-oriented applications that takes into account all the components, including services, external services, and data components. The results of our experiments demonstrate that this approach greatly improves the effectiveness of testing service-oriented applications.
Equivalence Checking For High-Assurance Behavioral Synthesis, Kecheng Hao
Equivalence Checking For High-Assurance Behavioral Synthesis, Kecheng Hao
Dissertations and Theses
The rapidly increasing complexities of hardware designs are forcing design methodologies and tools to move to the Electronic System Level (ESL), a higher abstraction level with better productivity than the state-of-the-art Register Transfer Level (RTL). Behavioral synthesis, which automatically synthesizes ESL behavioral specifications to RTL implementations, plays a central role in this transition. However, since behavioral synthesis is a complex and error-prone translation process, the lack of designers' confidence in its correctness becomes a major barrier to its wide adoption. Therefore, techniques for establishing equivalence between an ESL specification and its synthesized RTL implementation are critical to bring behavioral synthesis …
Fusion Of Visual And Thermal Images Using Genetic Algorithms, Sertan Erkanli, Jiang Li, Ender Oguslu, Shangce Gao (Ed.)
Fusion Of Visual And Thermal Images Using Genetic Algorithms, Sertan Erkanli, Jiang Li, Ender Oguslu, Shangce Gao (Ed.)
Electrical & Computer Engineering Faculty Publications
No abstract provided.
Executable Architecture Research At Old Dominion University, Andreas Tolk, Johnny J. Garcia, Edwin A. Shuman
Executable Architecture Research At Old Dominion University, Andreas Tolk, Johnny J. Garcia, Edwin A. Shuman
Computational Modeling & Simulation Engineering Faculty Publications
Executable Architectures allow the evaluation of system architectures not only regarding their static, but also their dynamic behavior. However, the systems engineering community do not agree on a common formal specification of executable architectures. To close this gap and identify necessary elements of an executable architecture, a modeling language, and a modeling formalism is topic of ongoing PhD research. In addition, systems are generally defined and applied in an operational context to provide capabilities and enable missions. To maximize the benefits of executable architectures, a second PhD effort introduces the idea of creating an executable context in addition to the …
Artificial Intelligence: Soon To Be The World’S Greatest Intelligence, Or Just A Wild Dream?, Edward R. Kollett
Artificial Intelligence: Soon To Be The World’S Greatest Intelligence, Or Just A Wild Dream?, Edward R. Kollett
Academic Symposium of Undergraduate Scholarship
The purpose of the paper was to examine the field of artificial intelligence. In particular, the paper focused on what has been accomplished towards the goal of making a machine that can think like a human, and the hardships that researchers in the field has faced. It also touched upon the potential outcomes of success. Why is this paper important? As computers become more powerful, the common conception is that they are becoming more intelligent. As computers become more integrated with society and more connected with each other, people again believe they are becoming smarter. Therefore, it is important that …
Ua1b2/1/5 Oral History, Paula Trafton, Charles Anderson
Ua1b2/1/5 Oral History, Paula Trafton, Charles Anderson
WKU Archives Records
Interview conducted by Paula Trafton with Charles Anderson, retired Vice President for Information Technology.