Open Access. Powered by Scholars. Published by Universities.®
![Digital Commons Network](http://assets.bepress.com/20200205/img/dcn/DCsunburst.png)
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Computer Sciences (197)
- Theory and Algorithms (62)
- Engineering (46)
- Mathematics (35)
- Artificial Intelligence and Robotics (29)
-
- Databases and Information Systems (29)
- Life Sciences (21)
- Medicine and Health Sciences (21)
- Applied Mathematics (19)
- Statistics and Probability (19)
- Physics (18)
- Electrical and Computer Engineering (16)
- Numerical Analysis and Scientific Computing (16)
- Social and Behavioral Sciences (13)
- Software Engineering (12)
- Bioinformatics (10)
- Information Security (10)
- Biostatistics (9)
- Business (9)
- Computer Engineering (9)
- Graphics and Human Computer Interfaces (8)
- Law (8)
- OS and Networks (8)
- Operations Research, Systems Engineering and Industrial Engineering (8)
- Analysis (6)
- Genetics and Genomics (6)
- Numerical Analysis and Computation (6)
- Public Affairs, Public Policy and Public Administration (6)
- Algebra (5)
- Institution
-
- Singapore Management University (39)
- Old Dominion University (37)
- Syracuse University (19)
- Missouri University of Science and Technology (14)
- Portland State University (13)
-
- Dartmouth College (12)
- University of Nebraska - Lincoln (12)
- University of Kentucky (11)
- Claremont Colleges (7)
- Georgia State University (6)
- University of Wollongong (6)
- Technological University Dublin (4)
- University of Arkansas, Fayetteville (4)
- University of Pennsylvania Carey Law School (4)
- Air Force Institute of Technology (3)
- Brigham Young University (3)
- City University of New York (CUNY) (3)
- Loyola University Chicago (3)
- Marquette University (3)
- Smith College (3)
- University of Massachusetts Amherst (3)
- Butler University (2)
- Chapman University (2)
- Edith Cowan University (2)
- Florida International University (2)
- Himmelfarb Health Sciences Library, The George Washington University (2)
- Liberty University (2)
- Michigan Technological University (2)
- The Texas Medical Center Library (2)
- University of Nebraska at Omaha (2)
- Publication Year
- Publication
-
- Research Collection School Of Computing and Information Systems (38)
- Computer Science Faculty Publications (19)
- Electrical & Computer Engineering Faculty Publications (14)
- Dartmouth Scholarship (12)
- Electrical Engineering and Computer Science - Technical Reports (11)
-
- Faculty Publications (11)
- Mathematics and Statistics Faculty Publications and Presentations (8)
- All HMC Faculty Publications and Research (7)
- Computer Science Faculty Publications and Presentations (5)
- Department of Computer Science and Engineering: Dissertations, Theses, and Student Research (5)
- Faculty of Informatics - Papers (Archive) (5)
- Statistics Faculty Publications (5)
- All Faculty Scholarship (4)
- Mathematical Sciences Spring Lecture Series (4)
- Physics Faculty Research & Creative Works (4)
- Articles (3)
- Computer Science Department Faculty Publication Series (3)
- Computer Science Technical Reports (3)
- Computer Science: Faculty Publications (3)
- Computer Science: Faculty Publications and Other Works (3)
- Electrical Engineering and Computer Science - All Scholarship (3)
- Engineering Management & Systems Engineering Faculty Publications (3)
- Journal Articles (3)
- Mathematics, Statistics and Computer Science Faculty Research and Publications (3)
- Northeast Parallel Architecture Center (3)
- VMASC Publications (3)
- All Works (2)
- Biostatistics Faculty Publications (2)
- College of Engineering and Computer Science - Former Departments, Centers, Institutes and Projects (2)
- Computer Science Faculty Proceedings & Presentations (2)
Articles 1 - 30 of 264
Full-Text Articles in Physical Sciences and Mathematics
Asteroidal Sets And Dominating Targets In Graphs, Oleksiy Al-Saadi
Asteroidal Sets And Dominating Targets In Graphs, Oleksiy Al-Saadi
Department of Computer Science and Engineering: Dissertations, Theses, and Student Research
The focus of this PhD thesis is on various distance and domination properties in graphs. In particular, we prove strong results about the interactions between asteroidal sets and dominating targets. Our results add to or extend a plethora of results on these properties within the literature. We define the class of strict dominating pair graphs and show structural and algorithmic properties of this class. Notably, we prove that such graphs have diameter 3, 4, or contain an asteroidal quadruple. Then, we design an algorithm to to efficiently recognize chordal hereditary dominating pair graphs. We provide new results that describe the …
Algorithmic Approaches For Object Tracking And Facial Detection Using Drones, Kareem Shahatta, Peter Savarese, Gina Egitto, Jongwook Kim
Algorithmic Approaches For Object Tracking And Facial Detection Using Drones, Kareem Shahatta, Peter Savarese, Gina Egitto, Jongwook Kim
Computer Science Student Work
Drones are unmanned aerial vehicles that have a variety of uses in many fields such as package delivery and search operations. Tello is a small, programmable drone designed for educational purposes. We developed algorithms using DJI Tello Py, an open-source Application Programming Interface, to command the movements of Tello for tracking a target object (i.e., human). Our algorithms utilize digital image processing techniques on Tello's live video stream to optimize the number of movements Tello needs to reach its target. Our poster presentation will explain our approaches to implement object-tracking and facial detection for Tello, discuss lessons we learned, and …
Algorithmic Design And Computational Modeling Using Dynamic Spectrum Allocation Techniques To Optimize Bandwidth Management In Wireless Communication Systems, Ankit Walishetti
Algorithmic Design And Computational Modeling Using Dynamic Spectrum Allocation Techniques To Optimize Bandwidth Management In Wireless Communication Systems, Ankit Walishetti
Distinguished Student Work
This study aims to address the pressing need for efficient spectrum management methodologies in wireless communication systems by developing innovative sorting and allocation algorithms. Leveraging Dynamic Spectrum Allocation (DSA) techniques, this research devises strategies to optimize the utilization of bandwidth within existing spectrum space, ultimately reducing the need for network infrastructure expansion.
Ensuring thorough coverage of DSA techniques, 5 distinct transmitter sorting algorithms were programmed and tested across 8 performance metrics designed to measure specific capabilities. For consistency, a single bandwidth allocation program was designed to ‘pack’ transmitters starting from the left endpoint of the spectrum space. Progressively varying the …
The Impact Of Artificial Intelligence And Machine Learning On Organizations Cybersecurity, Mustafa Abdulhussein
The Impact Of Artificial Intelligence And Machine Learning On Organizations Cybersecurity, Mustafa Abdulhussein
Doctoral Dissertations and Projects
As internet technology proliferate in volume and complexity, the ever-evolving landscape of malicious cyberattacks presents unprecedented security risks in cyberspace. Cybersecurity challenges have been further exacerbated by the continuous growth in the prevalence and sophistication of cyber-attacks. These threats have the capacity to disrupt business operations, erase critical data, and inflict reputational damage, constituting an existential threat to businesses, critical services, and infrastructure. The escalating threat is further compounded by the malicious use of artificial intelligence (AI) and machine learning (ML), which have increasingly become tools in the cybercriminal arsenal. In this dynamic landscape, the emergence of offensive AI introduces …
A Formalism For Extracting Track Functions From Jet Measurements, Kyle Lee, Ian Moult, Felix Ringer, Wouter J. Waalewijn
A Formalism For Extracting Track Functions From Jet Measurements, Kyle Lee, Ian Moult, Felix Ringer, Wouter J. Waalewijn
Physics Faculty Publications
The continued success of the jet substructure program will require widespread use of tracking information to enable increasingly precise measurements of a broader class of observables. The recent reformulation of jet substructure in terms of energy correlators has simplified the incorporation of universal non-perturbative matrix elements, so called “track functions”, in jet substructure calculations. These advances make it timely to understand how these universal non-perturbative functions can be extracted from hadron collider data, which is complicated by the use jet algorithms. In this paper we introduce a new class of jet functions, which we call (semi-inclusive) track jet functions, which …
Persistent Relative Homology For Topological Data Analysis, Christian J. Lentz
Persistent Relative Homology For Topological Data Analysis, Christian J. Lentz
Mathematics, Statistics, and Computer Science Honors Projects
A central problem in data-driven scientific inquiry is how to interpret structure in noisy, high-dimensional data. Topological data analysis (TDA) provides a solution via the language of persistent homology, which encodes features of interest as holes within a filtration of the data. The recently presented U-Match Decomposition places the standard persistence computation in a flexible form, allowing for straight-forward extensions of the algorithm to variations of persistent homology. We describe U-Match Decomposition in the context of persistent homology, and extend it to an algorithm for persistent relative homology, providing proofs for the correctness and stability of the presented algorithm.
Machine Learning As A Tool For Early Detection: A Focus On Late-Stage Colorectal Cancer Across Socioeconomic Spectrums, Hadiza Galadima, Rexford Anson-Dwamena, Ashley Johnson, Ghalib Bello, Georges Adunlin, James Blando
Machine Learning As A Tool For Early Detection: A Focus On Late-Stage Colorectal Cancer Across Socioeconomic Spectrums, Hadiza Galadima, Rexford Anson-Dwamena, Ashley Johnson, Ghalib Bello, Georges Adunlin, James Blando
Community & Environmental Health Faculty Publications
Purpose: To assess the efficacy of various machine learning (ML) algorithms in predicting late-stage colorectal cancer (CRC) diagnoses against the backdrop of socio-economic and regional healthcare disparities. Methods: An innovative theoretical framework was developed to integrate individual- and census tract-level social determinants of health (SDOH) with sociodemographic factors. A comparative analysis of the ML models was conducted using key performance metrics such as AUC-ROC to evaluate their predictive accuracy. Spatio-temporal analysis was used to identify disparities in late-stage CRC diagnosis probabilities. Results: Gradient boosting emerged as the superior model, with the top predictors for late-stage CRC diagnosis being anatomic site, …
Using Feature Selection Enhancement To Evaluate Attack Detection In The Internet Of Things Environment, Khawlah Harahsheh, Rami Al-Naimat, Chung-Hao Chen
Using Feature Selection Enhancement To Evaluate Attack Detection In The Internet Of Things Environment, Khawlah Harahsheh, Rami Al-Naimat, Chung-Hao Chen
Electrical & Computer Engineering Faculty Publications
The rapid evolution of technology has given rise to a connected world where billions of devices interact seamlessly, forming what is known as the Internet of Things (IoT). While the IoT offers incredible convenience and efficiency, it presents a significant challenge to cybersecurity and is characterized by various power, capacity, and computational process limitations. Machine learning techniques, particularly those encompassing supervised classification techniques, offer a systematic approach to training models using labeled datasets. These techniques enable intrusion detection systems (IDSs) to discern patterns indicative of potential attacks amidst the vast amounts of IoT data. Our investigation delves into various aspects …
Hiking Trail Generation In Infinite Landscapes, Matthew Jensen
Hiking Trail Generation In Infinite Landscapes, Matthew Jensen
MS in Computer Science Project Reports
This project procedurally generates an infinite wilderness populated with deterministic hiking trails. Our approach recognizes that hiking trails depend on contextual information beyond the location of the path itself. To address this, we implemented a layered procedural system that orchestrates the generation process. This helps ensure the availability of contextual data at each stage. The first layer handles terrain generation, establishing the foundational landscape upon which trails will traverse. Subsequent layers handle point of interest identification and selection, trail network optimization through proximity graphs, and efficient pathfinding across the terrain. A notable feature of our approach is the deterministic nature …
An Open Guide To Data Structures And Algorithms, Paul W. Bible, Lucas Moser
An Open Guide To Data Structures And Algorithms, Paul W. Bible, Lucas Moser
Computer Science Faculty publications
This textbook serves as a gentle introduction for undergraduates to theoretical concepts in data structures and algorithms in computer science while providing coverage of practical implementation (coding) issues. The field of computer science (CS) supports a multitude of essential technologies in science, engineering, and communication as a social medium. The varied and interconnected nature of computer technology permeates countless career paths making CS a popular and growing major program. Mastery of the science behind computer science relies on an understanding of the theory of algorithms and data structures. These concepts underlie the fundamental tradeoffs that dictate performance in terms of …
How I Read An Article That Uses Machine Learning Methods, Aziz Nazha, Olivier Elemento, Shannon Mcweeney, Moses Miles, Torsten Haferlach
How I Read An Article That Uses Machine Learning Methods, Aziz Nazha, Olivier Elemento, Shannon Mcweeney, Moses Miles, Torsten Haferlach
Kimmel Cancer Center Faculty Papers
No abstract provided.
Artificial Intelligence Cad Tools In Trauma Imaging: A Scoping Review From The American Society Of Emergency Radiology (Aser) Ai/Ml Expert Panel., David Dreizin, Pedro V Staziaki, Garvit D Khatri, Nicholas M Beckmann, Zhaoyong Feng, Yuanyuan Liang, Zachary S Delproposto, Maximiliano Klug, J Stephen Spann, Nathan Sarkar, Yunting Fu
Artificial Intelligence Cad Tools In Trauma Imaging: A Scoping Review From The American Society Of Emergency Radiology (Aser) Ai/Ml Expert Panel., David Dreizin, Pedro V Staziaki, Garvit D Khatri, Nicholas M Beckmann, Zhaoyong Feng, Yuanyuan Liang, Zachary S Delproposto, Maximiliano Klug, J Stephen Spann, Nathan Sarkar, Yunting Fu
Journal Articles
BACKGROUND: AI/ML CAD tools can potentially improve outcomes in the high-stakes, high-volume model of trauma radiology. No prior scoping review has been undertaken to comprehensively assess tools in this subspecialty.
PURPOSE: To map the evolution and current state of trauma radiology CAD tools along key dimensions of technology readiness.
METHODS: Following a search of databases, abstract screening, and full-text document review, CAD tool maturity was charted using elements of data curation, performance validation, outcomes research, explainability, user acceptance, and funding patterns. Descriptive statistics were used to illustrate key trends.
RESULTS: A total of 4052 records were screened, and 233 full-text …
Regulating Machine Learning: The Challenge Of Heterogeneity, Cary Coglianese
Regulating Machine Learning: The Challenge Of Heterogeneity, Cary Coglianese
All Faculty Scholarship
Machine learning, or artificial intelligence, refers to a vast array of different algorithms that are being put to highly varied uses, including in transportation, medicine, social media, marketing, and many other settings. Not only do machine-learning algorithms vary widely across their types and uses, but they are evolving constantly. Even the same algorithm can perform quite differently over time as it is fed new data. Due to the staggering heterogeneity of these algorithms, multiple regulatory agencies will be needed to regulate the use of machine learning, each within their own discrete area of specialization. Even these specialized expert agencies, though, …
Artificial Intelligence-Enabled Exploratory Cyber-Physical Safety Analyzer Framework For Civilian Urban Air Mobility, Md. Shirajum Munir, Sumit Howlader Dipro, Kamrul Hasan, Tariqul Islam, Sachin Shetty
Artificial Intelligence-Enabled Exploratory Cyber-Physical Safety Analyzer Framework For Civilian Urban Air Mobility, Md. Shirajum Munir, Sumit Howlader Dipro, Kamrul Hasan, Tariqul Islam, Sachin Shetty
VMASC Publications
Urban air mobility (UAM) has become a potential candidate for civilization for serving smart citizens, such as through delivery, surveillance, and air taxis. However, safety concerns have grown since commercial UAM uses a publicly available communication infrastructure that enhances the risk of jamming and spoofing attacks to steal or crash crafts in UAM. To protect commercial UAM from cyberattacks and theft, this work proposes an artificial intelligence (AI)-enabled exploratory cyber-physical safety analyzer framework. The proposed framework devises supervised learning-based AI schemes such as decision tree, random forests, logistic regression, K-nearest neighbors (KNN), and long short-term memory (LSTM) for predicting and …
Patch-Wise Training With Convolutional Neural Networks To Synthetically Upscale Cfd Simulations, John P. Romano, Alec C. Brodeur, Oktay Baysal
Patch-Wise Training With Convolutional Neural Networks To Synthetically Upscale Cfd Simulations, John P. Romano, Alec C. Brodeur, Oktay Baysal
Mechanical & Aerospace Engineering Faculty Publications
This paper expands the authors’ prior work[1], which focuses on developing a convolutional neural network (CNN) model capable of mapping time-averaged, unsteady Reynold’s-averaged Navier-Stokes (URANS) simulations to higher resolution results informed by time-averaged detached eddy simulations (DES). The authors present improvements over the prior CNN autoencoder model that result from hyperparameter optimization, increased data set augmentation through the adoption of a patch-wise training approach, and the predictions of primitive variables rather than vorticity magnitude. The training of the CNN model developed in this study uses the same URANS and DES simulations of a transonic flow around several NACA 4-digit airfoils …
Unttangling Irregular Actin Cytoskeleton Architectures In Tomograms Of The Cell With Struwwel Tracer, Salim Sazzed, Peter Scheible, Jing He, Willy Wriggers
Unttangling Irregular Actin Cytoskeleton Architectures In Tomograms Of The Cell With Struwwel Tracer, Salim Sazzed, Peter Scheible, Jing He, Willy Wriggers
Computer Science Faculty Publications
In this work, we established, validated, and optimized a novel computational framework for tracing arbitrarily oriented actin filaments in cryo-electron tomography maps. Our approach was designed for highly complex intracellular architectures in which a long-range cytoskeleton network extends throughout the cell bodies and protrusions. The irregular organization of the actin network, as well as cryo-electron-tomography-specific noise, missing wedge artifacts, and map dimensions call for a specialized implementation that is both robust and efficient. Our proposed solution, Struwwel Tracer, accumulates densities along paths of a specific length in various directions, starting from locally determined seed points. The highest-density paths originating …
Joint Congestion And Contention Avoidance In A Scalable Qos-Aware Opportunistic Routing In Wireless Ad-Hoc Networks, Ali Parsa, Neda Moghim, Sasan Haghani
Joint Congestion And Contention Avoidance In A Scalable Qos-Aware Opportunistic Routing In Wireless Ad-Hoc Networks, Ali Parsa, Neda Moghim, Sasan Haghani
VMASC Publications
Opportunistic routing (OR) can greatly increase transmission reliability and network throughput in wireless ad-hoc networks by taking advantage of the broadcast nature of the wireless medium. However, network congestion is a barrier in the way of OR's performance improvement, and network congestion control is a challenge in OR algorithms, because only the pure physical channel conditions of the links are considered in forwarding decisions. This paper proposes a new method to control network congestion in OR, considering three types of parameters, namely, the backlogged traffic, the traffic flows' Quality of Service (QoS) level, and the channel occupancy rate. Simulation results …
Detecting Deceptive Dark-Pattern Web Advertisements For Blind Screen-Reader Users, Satwick Ram Kodandaram, Mohan Sunkara, Sampath Jayarathna, Vikas Ashok
Detecting Deceptive Dark-Pattern Web Advertisements For Blind Screen-Reader Users, Satwick Ram Kodandaram, Mohan Sunkara, Sampath Jayarathna, Vikas Ashok
Computer Science Faculty Publications
Advertisements have become commonplace on modern websites. While ads are typically designed for visual consumption, it is unclear how they affect blind users who interact with the ads using a screen reader. Existing research studies on non-visual web interaction predominantly focus on general web browsing; the specific impact of extraneous ad content on blind users' experience remains largely unexplored. To fill this gap, we conducted an interview study with 18 blind participants; we found that blind users are often deceived by ads that contextually blend in with the surrounding web page content. While ad blockers can address this problem via …
A Hybrid Deep Learning Approach For Crude Oil Price Prediction, Hind Aldabagh, Xianrong Zheng, Ravi Mukkamala
A Hybrid Deep Learning Approach For Crude Oil Price Prediction, Hind Aldabagh, Xianrong Zheng, Ravi Mukkamala
Computer Science Faculty Publications
Crude oil is one of the world’s most important commodities. Its price can affect the global economy, as well as the economies of importing and exporting countries. As a result, forecasting the price of crude oil is essential for investors. However, crude oil price tends to fluctuate considerably during significant world events, such as the COVID-19 pandemic and geopolitical conflicts. In this paper, we propose a deep learning model for forecasting the crude oil price of one-step and multi-step ahead. The model extracts important features that impact crude oil prices and uses them to predict future prices. The prediction model …
Machine-Learning-Based Vulnerability Detection And Classification In Internet Of Things Device Security, Sarah Bin Hulayyil, Shancang Li, Li Da Xu
Machine-Learning-Based Vulnerability Detection And Classification In Internet Of Things Device Security, Sarah Bin Hulayyil, Shancang Li, Li Da Xu
Information Technology & Decision Sciences Faculty Publications
Detecting cyber security vulnerabilities in the Internet of Things (IoT) devices before they are exploited is increasingly challenging and is one of the key technologies to protect IoT devices from cyber attacks. This work conducts a comprehensive survey to investigate the methods and tools used in vulnerability detection in IoT environments utilizing machine learning techniques on various datasets, i.e., IoT23. During this study, the common potential vulnerabilities of IoT architectures are analyzed on each layer and the machine learning workflow is described for detecting IoT vulnerabilities. A vulnerability detection and mitigation framework was proposed for machine learning-based vulnerability detection in …
Adaptive Resolution Loss: An Efficient And Effective Loss For Time Series Self-Supervised Learning Framework, Kevin Garcia, Juan Manuel Perez, Yifeng Gao
Adaptive Resolution Loss: An Efficient And Effective Loss For Time Series Self-Supervised Learning Framework, Kevin Garcia, Juan Manuel Perez, Yifeng Gao
Computer Science Faculty Publications and Presentations
Time series data is a crucial form of information that has vast opportunities. With the widespread use of sensor networks, largescale time series data has become ubiquitous. One of the most prominent problems in time series data mining is representation learning. Recently, with the introduction of self-supervised learning frameworks (SSL), numerous amounts of research have focused on designing an effective SSL for time series data. One of the current state-of-the-art SSL frameworks in time series is called TS2Vec. TS2Vec specially designs a hierarchical contrastive learning framework that uses loss-based training, which performs outstandingly against benchmark testing. However, the computational cost …
Relation Preserving Triplet Mining For Stabilising The Triplet Loss In Re-Identification Systems, Adhiraj Ghosh, Kuruparan Shanmugalingam, Wen-Yan Lin
Relation Preserving Triplet Mining For Stabilising The Triplet Loss In Re-Identification Systems, Adhiraj Ghosh, Kuruparan Shanmugalingam, Wen-Yan Lin
Research Collection School Of Computing and Information Systems
Object appearances change dramatically with pose variations. This creates a challenge for embedding schemes that seek to map instances with the same object ID to locations that are as close as possible. This issue becomes significantly heightened in complex computer vision tasks such as re-identification(reID). In this paper, we suggest that these dramatic appearance changes are indications that an object ID is composed of multiple natural groups, and it is counterproductive to forcefully map instances from different groups to a common location. This leads us to introduce Relation Preserving Triplet Mining (RPTM), a feature matching guided triplet mining scheme, that …
Machine Learning Algorithms Improve Modis Gpp Estimates In United States Croplands, D. Menefee, T. O. Lee, K. C. Flynn, J. Chen, M. Abraha, J. Baker, A. Suyker
Machine Learning Algorithms Improve Modis Gpp Estimates In United States Croplands, D. Menefee, T. O. Lee, K. C. Flynn, J. Chen, M. Abraha, J. Baker, A. Suyker
School of Natural Resources: Faculty Publications
No abstract provided.
Toward Real-Time, Robust Wearable Sensor Fall Detection Using Deep Learning Methods: A Feasibility Study, Haben Yhdego, Christopher Paolini, Michel Audette
Toward Real-Time, Robust Wearable Sensor Fall Detection Using Deep Learning Methods: A Feasibility Study, Haben Yhdego, Christopher Paolini, Michel Audette
Electrical & Computer Engineering Faculty Publications
Real-time fall detection using a wearable sensor remains a challenging problem due to high gait variability. Furthermore, finding the type of sensor to use and the optimal location of the sensors are also essential factors for real-time fall-detection systems. This work presents real-time fall-detection methods using deep learning models. Early detection of falls, followed by pneumatic protection, is one of the most effective means of ensuring the safety of the elderly. First, we developed and compared different data-segmentation techniques for sliding windows. Next, we implemented various techniques to balance the datasets because collecting fall datasets in the real-time setting has …
A Survey Of Using Machine Learning In Iot Security And The Challenges Faced By Researchers, Khawlah M. Harahsheh, Chung-Hao Chen
A Survey Of Using Machine Learning In Iot Security And The Challenges Faced By Researchers, Khawlah M. Harahsheh, Chung-Hao Chen
Electrical & Computer Engineering Faculty Publications
The Internet of Things (IoT) has become more popular in the last 15 years as it has significantly improved and gained control in multiple fields. We are nowadays surrounded by billions of IoT devices that directly integrate with our lives, some of them are at the center of our homes, and others control sensitive data such as military fields, healthcare, and datacenters, among others. This popularity makes factories and companies compete to produce and develop many types of those devices without caring about how secure they are. On the other hand, IoT is considered a good insecure environment for cyber …
Algorithms For Compression Of Electrocardiogram Signals, Yuliyan Velchev
Algorithms For Compression Of Electrocardiogram Signals, Yuliyan Velchev
Books
The study is dedicated to modern methods and algorithms for compression of electrocardiogram (ECG) signals. In its original part, two lossy compression algorithms based on a combination of linear transforms are proposed. These algorithms are with relatively low computational complexity, making them applicable for implementation in low power designs such as mobile devices or embedded systems. Since the algorithms do not provide perfect signal reconstruction, they would find application in ECG monitoring systems rather than those intended for precision medical diagnosis.
This monograph consists of abstract, preface, five chapters and conclusion. The chapters are as follows: Chapter 1 — Introduction …
A Novel Qkd Approach To Enhance Iiot Privacy And Computational Knacks, Kranthi Kumar Singamaneni, Gaurav Dhiman, Sapna Juneja, Ghulam Muhammad, Salman A Alqahtani, John Zaki
A Novel Qkd Approach To Enhance Iiot Privacy And Computational Knacks, Kranthi Kumar Singamaneni, Gaurav Dhiman, Sapna Juneja, Ghulam Muhammad, Salman A Alqahtani, John Zaki
Journal Articles
The industry-based internet of things (IIoT) describes how IIoT devices enhance and extend their capabilities for production amenities, security, and efficacy. IIoT establishes an enterprise-to-enterprise setup that means industries have several factories and manufacturing units that are dependent on other sectors for their services and products. In this context, individual industries need to share their information with other external sectors in a shared environment which may not be secure. The capability to examine and inspect such large-scale information and perform analytical protection over the large volumes of personal and organizational information demands authentication and confidentiality so that the total data …
Control Implemented On Quantum Computers: Effects Of Noise, Nondeterminism, And Entanglement, Kip Nieman, Keshav Kasturi Rangan, Helen Durand
Control Implemented On Quantum Computers: Effects Of Noise, Nondeterminism, And Entanglement, Kip Nieman, Keshav Kasturi Rangan, Helen Durand
Chemical Engineering and Materials Science Faculty Research Publications
Quantum computing has advanced in recent years to the point that there are now some quantum computers and quantum simulators available to the public for use. In addition, quantum computing is beginning to receive attention within the process systems engineering community for directions such as machine learning and optimization. A logical next step for its evaluation within process systems engineering is for control, specifically for computing control actions to be applied to process systems. In this work, we provide some initial studies regarding the implementation of control on quantum computers, including the implementation of a single-input/single-output proportional control law on …
Post-Quantum Secure Identity-Based Encryption Scheme Using Random Integer Lattices For Iot-Enabled Ai Applications, Dharminder Dharminder, Ashok Kumar Das, Sourav Saha, Basudeb Bera, Athanasios V. Vasilakos
Post-Quantum Secure Identity-Based Encryption Scheme Using Random Integer Lattices For Iot-Enabled Ai Applications, Dharminder Dharminder, Ashok Kumar Das, Sourav Saha, Basudeb Bera, Athanasios V. Vasilakos
VMASC Publications
Identity-based encryption is an important cryptographic system that is employed to ensure confidentiality of a message in communication. This article presents a provably secure identity based encryption based on post quantum security assumption. The security of the proposed encryption is based on the hard problem, namely Learning with Errors on integer lattices. This construction is anonymous and produces pseudo random ciphers. Both public-key size and ciphertext-size have been reduced in the proposed encryption as compared to those for other relevant schemes without compromising the security. Next, we incorporate the constructed identity based encryption (IBE) for Internet of Things (IoT) applications, …
The Locus Algorithm: A Novel Technique For Identifying Optimised Pointings For Differential Photometry, Oisin Creaner, Kevin Nolan Mr, E. Hickey, N. Smith
The Locus Algorithm: A Novel Technique For Identifying Optimised Pointings For Differential Photometry, Oisin Creaner, Kevin Nolan Mr, E. Hickey, N. Smith
Articles
Studies of the photometric variability of astronomical sources from ground-based telescopes must overcome atmospheric extinction effects. Differential photometry by reference to an ensemble of reference stars which closely match the target in terms of magnitude and colour can mitigate these effects. This Paper describes the design, implementation, and operation of a novel algorithm – The Locus Algorithm – which enables optimised differential photometry. The Algorithm is intended to identify, for a given target and observational parameters, the Field of View (FoV) which includes the target and the maximum number of reference stars similar to the target. A collection of objects …