Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 17 of 17

Full-Text Articles in Engineering

Resource Efficient Design Of Quantum Circuits For Quantum Algorithms, Himanshu Thapliyal Oct 2017

Resource Efficient Design Of Quantum Circuits For Quantum Algorithms, Himanshu Thapliyal

Commonwealth Computational Summit

No abstract provided.


Using Explainability For Constrained Matrix Factorization, Behnoush Abdollahi, Olfa Nasraoui Oct 2017

Using Explainability For Constrained Matrix Factorization, Behnoush Abdollahi, Olfa Nasraoui

Commonwealth Computational Summit

Explainable Model

  • Black Box (opaque) predictors such as Deep learning and Matrix Factorization are accurate,
  • ... but lack interpretability and ability to give explanations.
  • White Box models such as rules and decision trees are interpretable (explainable),
  • ... but lack accuracy.


Multiple Attributes Decision Fusion For Wireless Sensor Networks Based On Intuitionistic Fuzzy Set, Zhenjiang Zhang, Ziqi Hao, Sherali Zeadally, Jing Zhang, Bowen Han, Han-Chieh Chao Jul 2017

Multiple Attributes Decision Fusion For Wireless Sensor Networks Based On Intuitionistic Fuzzy Set, Zhenjiang Zhang, Ziqi Hao, Sherali Zeadally, Jing Zhang, Bowen Han, Han-Chieh Chao

Information Science Faculty Publications

Decision fusion is an important issue in wireless sensor networks (WSN), and intuitionistic fuzzy set (IFS) is a novel method for dealing with uncertain data. We propose a multi-attribute decision fusion model based on IFS, which includes two aspects: data distribution-based IFS construction algorithm (DDBIFCA) and the category similarity weight-based TOPSIS intuitionistic fuzzy decision algorithm (CSWBT-IFS). The DDBIFCA is an IFS construction algorithm that transforms the original attribute values into intuitionistic fuzzy measures, and the CSWBT-IFS is an intuitionistic fuzzy aggregation algorithm improved by the traditional TOPSIS algorithm, which combines intuitionistic fuzzy values of different attributes and obtains a final …


Lightweight Data Aggregation Scheme Against Internal Attackers In Smart Grid Using Elliptic Curve Cryptography, Debiao He, Sherali Zeadally, Huaqun Wang, Qin Liu May 2017

Lightweight Data Aggregation Scheme Against Internal Attackers In Smart Grid Using Elliptic Curve Cryptography, Debiao He, Sherali Zeadally, Huaqun Wang, Qin Liu

Information Science Faculty Publications

Recent advances of Internet and microelectronics technologies have led to the concept of smart grid which has been a widespread concern for industry, governments, and academia. The openness of communications in the smart grid environment makes the system vulnerable to different types of attacks. The implementation of secure communication and the protection of consumers’ privacy have become challenging issues. The data aggregation scheme is an important technique for preserving consumers’ privacy because it can stop the leakage of a specific consumer’s data. To satisfy the security requirements of practical applications, a lot of data aggregation schemes were presented over the …


Expression And Reception: An Analytic Method For Assessing Message Production And Consumption In Cmc, Kang Namkoong, Dhavan V. Shah, Bryan Mclaughlin, Ming-Yuan Chih, Tae Joon Moon, Shawnika Hull, David H. Gustafson Apr 2017

Expression And Reception: An Analytic Method For Assessing Message Production And Consumption In Cmc, Kang Namkoong, Dhavan V. Shah, Bryan Mclaughlin, Ming-Yuan Chih, Tae Joon Moon, Shawnika Hull, David H. Gustafson

Community & Leadership Development Faculty Publications

This article presents an innovative methodology to study computer-mediated communication (CMC), which allows analysis of the multi-layered effects of online expression and reception. The methodology is demonstrated by combining the following three data sets collected from a widely tested eHealth system, the Comprehensive Health Enhancement Support System (CHESS): (1) a flexible and precise computer-aided content analysis; (2) a record of individual message posting and reading; and (3) longitudinal survey data. Further, this article discusses how the resulting data can be applied to online social network analysis and demonstrates how to construct two distinct types of online social networks—open and targeted …


A Fast And Efficient Python Library For Interfacing With The Biological Magnetic Resonance Data Bank, Andrey Smelter, Morgan Astra, Hunter N. B. Moseley Mar 2017

A Fast And Efficient Python Library For Interfacing With The Biological Magnetic Resonance Data Bank, Andrey Smelter, Morgan Astra, Hunter N. B. Moseley

Center for Environmental and Systems Biochemistry Faculty Publications

Background: The Biological Magnetic Resonance Data Bank (BMRB) is a public repository of Nuclear Magnetic Resonance (NMR) spectroscopic data of biological macromolecules. It is an important resource for many researchers using NMR to study structural, biophysical, and biochemical properties of biological macromolecules. It is primarily maintained and accessed in a flat file ASCII format known as NMR-STAR. While the format is human readable, the size of most BMRB entries makes computer readability and explicit representation a practical requirement for almost any rigorous systematic analysis.

Results:To aid in the use of this public resource, we have developed a package called …


Lightweight Three-Factor Authentication And Key Agreement Protocol For Internet-Integrated Wireless Sensor Networks, Qi Jiang, Sherali Zeadally, Jianfeng Ma, Debiao He Mar 2017

Lightweight Three-Factor Authentication And Key Agreement Protocol For Internet-Integrated Wireless Sensor Networks, Qi Jiang, Sherali Zeadally, Jianfeng Ma, Debiao He

Information Science Faculty Publications

Wireless sensor networks (WSNs) will be integrated into the future Internet as one of the components of the Internet of Things, and will become globally addressable by any entity connected to the Internet. Despite the great potential of this integration, it also brings new threats, such as the exposure of sensor nodes to attacks originating from the Internet. In this context, lightweight authentication and key agreement protocols must be in place to enable end-to-end secure communication. Recently, Amin et al. proposed a three-factor mutual authentication protocol for WSNs. However, we identified several flaws in their protocol. We found that their …


Efficient Revocable Id-Based Signature With Cloud Revocation Server, Xiaoying Jia, Debiao He, Sherali Zeadally, Li Li Mar 2017

Efficient Revocable Id-Based Signature With Cloud Revocation Server, Xiaoying Jia, Debiao He, Sherali Zeadally, Li Li

Information Science Faculty Publications

Over the last few years, identity-based cryptosystem (IBC) has attracted widespread attention because it avoids the high overheads associated with public key certificate management. However, an unsolved but critical issue about IBC is how to revoke a misbehaving user. There are some revocable identity-based encryption schemes that have been proposed recently, but little work on the revocation problem of identity-based signature has been undertaken so far. One approach for revocation in identity-based settings is to update users' private keys periodically, which is usually done by the key generation center (KGC). But with this approach, the load on the KGC will …


Isbord: Internet Searching Based On Resource Description, Zhiwei Yan, Sherali Zeadally, Guanggang Geng Mar 2017

Isbord: Internet Searching Based On Resource Description, Zhiwei Yan, Sherali Zeadally, Guanggang Geng

Information Science Faculty Publications

Based on the Information-Centric Networking (ICN) concept and the mature model of the current TCP/IP-based Internet, we propose content searching based on universal and scalable resource description, namely ISBORD (Internet Searching based on Resource Description). This novel concept aims to improve the efficiency of content searching and simplifies the end-user functionality to support the evolution of the content-centric Internet.


Iot Development For Healthy Independent Living, Shalom Greene Jan 2017

Iot Development For Healthy Independent Living, Shalom Greene

Theses and Dissertations--Electrical and Computer Engineering

The rise of internet connected devices has enabled the home with a vast amount of enhancements to make life more convenient. These internet connected devices can be used to form a community of devices known as the internet of things (IoT). There is great value in IoT devices to promote healthy independent living for older adults.

Fall-related injuries has been one of the leading causes of death in older adults. For example, every year more than a third of people over 65 in the U.S. experience a fall, of which up to 30 percent result in moderate to severe injury. …


Contributions To Edge Computing, Vernon K. Bumgardner Jan 2017

Contributions To Edge Computing, Vernon K. Bumgardner

Theses and Dissertations--Computer Science

Efforts related to Internet of Things (IoT), Cyber-Physical Systems (CPS), Machine to Machine (M2M) technologies, Industrial Internet, and Smart Cities aim to improve society through the coordination of distributed devices and analysis of resulting data. By the year 2020 there will be an estimated 50 billion network connected devices globally and 43 trillion gigabytes of electronic data. Current practices of moving data directly from end-devices to remote and potentially distant cloud computing services will not be sufficient to manage future device and data growth.

Edge Computing is the migration of computational functionality to sources of data generation. The importance of …


3d Body Tracking Using Deep Learning, Qingguo Xu Jan 2017

3d Body Tracking Using Deep Learning, Qingguo Xu

Theses and Dissertations--Computer Science

This thesis introduces a 3D body tracking system based on neutral networks and 3D geometry, which can robustly estimate body poses and accurate body joints. This system takes RGB-D data as input. Body poses and joints are firstly extracted from color image using deep learning approach. The estimated joints and skeletons are further translated to 3D space by using camera calibration information. This system is running at the rate of 3 4 frames per second. It can be used to any RGB-D sensors, such as Kinect, Intel RealSense [14] or any customized system with color depth calibrated. Comparing to the …


Autonomous Quadrotor Collision Avoidance And Destination Seeking In A Gps-Denied Environment, Thomas C. Kirven Jan 2017

Autonomous Quadrotor Collision Avoidance And Destination Seeking In A Gps-Denied Environment, Thomas C. Kirven

Theses and Dissertations--Mechanical Engineering

This thesis presents a real-time autonomous guidance and control method for a quadrotor in a GPS-denied environment. The quadrotor autonomously seeks a destination while it avoids obstacles whose shape and position are initially unknown. We implement the obstacle avoidance and destination seeking methods using off-the-shelf sensors, including a vision-sensing camera. The vision-sensing camera detects the positions of points on the surface of obstacles. We use this obstacle position data and a potential-field method to generate velocity commands. We present a backstepping controller that uses the velocity commands to generate the quadrotor's control inputs. In indoor experiments, we demonstrate that the …


Hierarchical Implementation Of Aggregate Functions, Pablo Quevedo Jan 2017

Hierarchical Implementation Of Aggregate Functions, Pablo Quevedo

Theses and Dissertations--Electrical and Computer Engineering

Most systems in HPC make use of hierarchical designs that allow multiple levels of parallelism to be exploited by programmers. The use of multiple multi-core/multi-processor computers to form a computer cluster supports both fine-grain and large-grain parallel computation. Aggregate function communications provide an easy to use and efficient set of mechanisms for communicating and coordinating between processing elements, but the model originally targeted only fine grain parallel hardware. This work shows that a hierarchical implementation of aggregate functions is a viable alternative to MPI (the standard Message Passing Interface library) for programming clusters that provide both fine grain and large …


Using Natural Language Processing And Machine Learning Techniques To Characterize Configuration Bug Reports: A Study, Wei Wen Jan 2017

Using Natural Language Processing And Machine Learning Techniques To Characterize Configuration Bug Reports: A Study, Wei Wen

Theses and Dissertations--Computer Science

In this study, a tool is developed that achieves two purposes: (1) given bug reports, it identifies configuration bug reports from non-configuration bug reports; (2) once a bug report is identified to be a configuration bug report, the tool finds out what specific configuration option the bug report is associated.

This study starts with a review of related works that used machine learning tools to solve software bug and bug report related issues. It then discusses the natural language processing and machine learning techniques. Afterwards, the development process of the proposed tool is described in detail, including the motivation, the …


Modeling Faceted Browsing With Category Theory For Reuse And Interoperability, Daniel R. Harris Jan 2017

Modeling Faceted Browsing With Category Theory For Reuse And Interoperability, Daniel R. Harris

Theses and Dissertations--Computer Science

Faceted browsing (also called faceted search or faceted navigation) is an exploratory search model where facets assist in the interactive navigation of search results. Facets are attributes that have been assigned to describe resources being explored; a faceted taxonomy is a collection of facets provided by the interface and is often organized as sets, hierarchies, or graphs. Faceted browsing has become ubiquitous with modern digital libraries and online search engines, yet the process is still difficult to abstractly model in a manner that supports the development of interoperable and reusable interfaces. We propose category theory as a theoretical foundation for …


Novel Resource Efficient Circuit Designs For Rebooting Computing, Sai Subramanya Varun Thogarcheti Jan 2017

Novel Resource Efficient Circuit Designs For Rebooting Computing, Sai Subramanya Varun Thogarcheti

Theses and Dissertations--Electrical and Computer Engineering

CMOS based computing is reaching its limits. To take computation beyond Moores law (the number of transistors and hence processing power on a chip doubles every 18 months to 3 years) requires research explorations in (i) new materials, devices, and processes, (ii) new architectures and algorithms, (iii) new paradigm of logic bit representation. The focus is on fundamental new ways to compute under the umbrella of rebooting computing such as spintronics, quantum computing, adiabatic and reversible computing. Therefore, this thesis highlights explicitly Quantum computing and Adiabatic logic, two new computing paradigms that come under the umbrella of rebooting computing. Quantum …