Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Electrical and Computer Engineering

Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 121 - 150 of 8896

Full-Text Articles in Physical Sciences and Mathematics

Grey Wolf Optimization Algorithm-Based Robust Neural Learning Control Of Passive Torque Simulators With Predetermined Performance, Seyyed Amirhossein Saadat, Mohammad Mehdi Fateh, Javad Keighobadi Feb 2024

Grey Wolf Optimization Algorithm-Based Robust Neural Learning Control Of Passive Torque Simulators With Predetermined Performance, Seyyed Amirhossein Saadat, Mohammad Mehdi Fateh, Javad Keighobadi

Turkish Journal of Electrical Engineering and Computer Sciences

In flight control systems, the actuators need to tolerate aerodynamic torques and continue their operations without interruption. To this end, using the simulators to test the actuators in conditions close to the real flight is efficient. On the other hand, achieving the guaranteed performance encounters some challenges and practical limitations such as unknown dynamics, external disturbances, and state constraints in reality. Thus, this article attempts to present a robust adaptive neural network learning controller equipped with a disturbance observer for passive torque simulators (PTS) with load torque constraints. The radial basis function networks (RBFNs) are employed to identify the unknown …


Fast Grid Search: A Grid Search-Inspired Algorithm For Optimizing Hyperparameters Of Support Vector Regression, Mustafa Açikkar Feb 2024

Fast Grid Search: A Grid Search-Inspired Algorithm For Optimizing Hyperparameters Of Support Vector Regression, Mustafa Açikkar

Turkish Journal of Electrical Engineering and Computer Sciences

This study presents a fast hyperparameter optimization algorithm based on the benefits and shortcomings of the standard grid search (GS) algorithm for support vector regression (SVR). This presented GS-inspired algorithm, called fast grid search (FGS), was tested on benchmark datasets, and the impact of FGS on prediction accuracy was primarily compared with the GS algorithm on which it is based. To validate the efficacy of the proposed algorithm and conduct a comprehensive comparison, two additional hyperparameter optimization techniques, namely particle swarm optimization and Bayesian optimization, were also employed in the development of models on the given datasets. The evaluation of …


Differentially Private Online Bayesian Estimation With Adaptive Truncation, Sinan Yildirim Feb 2024

Differentially Private Online Bayesian Estimation With Adaptive Truncation, Sinan Yildirim

Turkish Journal of Electrical Engineering and Computer Sciences

In this paper, a novel online and adaptive truncation method is proposed for differentially private Bayesian online estimation of a static parameter regarding a population. A local differential privacy setting is assumed where sensitive information from individuals is collected on an individual level and sequentially. The inferential aim is to estimate, on the fly, a static parameter regarding the population to which those individuals belong. We propose sequential Monte Carlo to perform online Bayesian estimation. When individuals provide sensitive information in response to a query, it is necessary to corrupt it with privacy-preserving noise to ensure the privacy of those …


Milp Modeling Of Matrix Multiplication: Cryptanalysis Of Klein And Prince, Murat Burhan İlter, Ali Aydın Selçuk Feb 2024

Milp Modeling Of Matrix Multiplication: Cryptanalysis Of Klein And Prince, Murat Burhan İlter, Ali Aydın Selçuk

Turkish Journal of Electrical Engineering and Computer Sciences

Mixed-integer linear programming (MILP) techniques are widely used in cryptanalysis, aiding in the discovery of optimal linear and differential characteristics. This paper delves into the analysis of block ciphers KLEIN and PRINCE using MILP, specifically calculating the best linear and differential characteristics for reduced-round versions. Both ciphers employ matrix multiplication in their diffusion layers, which we model using multiple XOR operations. To this end, we propose two novel MILP models for multiple XOR operations, which use fewer variables and constraints, proving to be more efficient than standard methods for XOR modeling. For differential cryptanalysis, we identify characteristics with a probability …


Error Performance Enhancement And Complexity Reduction In Ofdm Systems Via Coordinate Interleaving Under Practical Impairments, Mustafa Anıl Reşat, Armed Tusha, Seda Doğan Tusha, Serdar Özyurt, Hüseyin Arslan Feb 2024

Error Performance Enhancement And Complexity Reduction In Ofdm Systems Via Coordinate Interleaving Under Practical Impairments, Mustafa Anıl Reşat, Armed Tusha, Seda Doğan Tusha, Serdar Özyurt, Hüseyin Arslan

Turkish Journal of Electrical Engineering and Computer Sciences

In this work, subcarrier coordinate interleaving (CI) is implemented to orthogonal frequency division multiplexing (OFDM) systems with the aim of both enhancing the error performance and reducing the implementation complexity. To this end, the modulated symbols are independently chosen from a modified M-ary amplitude-shift keying signal constellation under a specific CI strategy. In addition to doubling the diversity level of the original OFDM scheme, the adopted CI approach also drastically reduces the inverse fast Fourier transform (IFFT) size at the transmit side by guaranteeing the first half of the input vector to be identical with the second half at the …


Machine Learning Approaches In Comparative Studies For Alzheimer’S Diagnosis Using 2d Mri Slices, Zhen Zhao, Joon Huang Chuah, Chee-Onn Chow, Kaijian Xia, Yee Kai Tee, Yan Chai Hum, Khin Wee Lai Feb 2024

Machine Learning Approaches In Comparative Studies For Alzheimer’S Diagnosis Using 2d Mri Slices, Zhen Zhao, Joon Huang Chuah, Chee-Onn Chow, Kaijian Xia, Yee Kai Tee, Yan Chai Hum, Khin Wee Lai

Turkish Journal of Electrical Engineering and Computer Sciences

Alzheimer’s disease (AD) is an illness that involves a gradual and irreversible degeneration of the brain. It is crucial to establish a precise diagnosis of AD early on in order to enable prompt therapies and prevent further deterioration. Researchers are currently focusing increasing attention on investigating the potential of machine learning techniques to simplify the automated diagnosis of AD using neuroimaging. The present study involved a comparison of models for the detection of AD through the utilization of 2D image slices obtained from magnetic resonance imaging brain scans. Five models, namely ResNet, ConvNeXt, CaiT, Swin Transformer, and CVT, were implemented …


Fractional Delay-Dependent Load Frequency Controller Design For A Single-Area Power System With Communication Delay, Erhan Yumuk Feb 2024

Fractional Delay-Dependent Load Frequency Controller Design For A Single-Area Power System With Communication Delay, Erhan Yumuk

Turkish Journal of Electrical Engineering and Computer Sciences

This paper proposes a fractional delay-dependent load frequency control design approach for a single-area power system with communication delay based on gain and phase margin specifications. In this approach, the closed-loop reference transfer function relies on the delayed Bode’s transfer function. The gain and phase margin specifications are established in order to optimize the reference model based on three time-domain performance indices. Here, a category of fractional-order model is employed to describe the single-area power system incorporating communication delay. The controller parameters are determined using the fractional-order system model and optimal closed-loop reference model. Then, a delay-dependent control mechanism is …


Motion Magnification-Inspired Feature Manipulation For Deepfake Detection, Aydamir Mirzayev, Hamdi Di̇bekli̇oğlu Feb 2024

Motion Magnification-Inspired Feature Manipulation For Deepfake Detection, Aydamir Mirzayev, Hamdi Di̇bekli̇oğlu

Turkish Journal of Electrical Engineering and Computer Sciences

Recent advances in deep learning, increased availability of large-scale datasets, and improvement of accelerated graphics processing units facilitated creation of an unprecedented amount of synthetically generated media content with impressive visual quality. Although such technology is used predominantly for entertainment, there is widespread practice of using deepfake technology for malevolent ends. This potential for malicious use necessitates the creation of detection methods capable of reliably distinguishing manipulated video content. In this work we aim to create a learning-based detection method for synthetically generated videos. To this end, we attempt to detect spatiotemporal inconsistencies by leveraging a learning-based magnification-inspired feature manipulation …


Automated Identification Of Vehicles In Very High-Resolution Uav Orthomosaics Using Yolov7 Deep Learning Model, Esra Yildirim, Umut Güneş Seferci̇k, Taşkın Kavzoğlu Feb 2024

Automated Identification Of Vehicles In Very High-Resolution Uav Orthomosaics Using Yolov7 Deep Learning Model, Esra Yildirim, Umut Güneş Seferci̇k, Taşkın Kavzoğlu

Turkish Journal of Electrical Engineering and Computer Sciences

The utilization of remote sensing products for vehicle detection through deep learning has gained immense popularity, especially due to the advancement of unmanned aerial vehicles (UAVs). UAVs offer millimeter-level spatial resolution at low flight altitudes, which surpasses traditional airborne platforms. Detecting vehicles from very high-resolution UAV data is crucial in numerous applications, including parking lot and highway management, traffic monitoring, search and rescue missions, and military operations. Obtaining UAV data at desired periods allows the detection and tracking of target objects even several times during a day. Despite challenges such as diverse vehicle characteristics, traffic congestion, and hardware limitations, the …


Longitudinal Attacks Against Iterative Data Collection With Local Differential Privacy, Mehmet Emre Gürsoy Feb 2024

Longitudinal Attacks Against Iterative Data Collection With Local Differential Privacy, Mehmet Emre Gürsoy

Turkish Journal of Electrical Engineering and Computer Sciences

Local differential privacy (LDP) has recently emerged as an accepted standard for privacy-preserving collection of users’ data from smartphones and IoT devices. In many practical scenarios, users’ data needs to be collected repeatedly across multiple iterations. In such cases, although each collection satisfies LDP individually by itself, a longitudinal collection of multiple responses from the same user degrades that user’s privacy. To demonstrate this claim, in this paper, we propose longitudinal attacks against iterative data collection with LDP. We formulate a general Bayesian adversary model, and then individually show the application of this adversary model on six popular LDP protocols: …


A Novel Extended Reaction Force/Torque Observer With Impedance Control, İlkay Turaç Özçeli̇k, Abdurrahman Eray Baran Feb 2024

A Novel Extended Reaction Force/Torque Observer With Impedance Control, İlkay Turaç Özçeli̇k, Abdurrahman Eray Baran

Turkish Journal of Electrical Engineering and Computer Sciences

This paper proposes a new extended version of the reaction force observer (RFOB) for high-precision motion control systems. The RFOB has been proven to be useful for many applications in the literature. However, because of the low-pass filter present inside of the RFOB, it has certain limitations. In this study, a new algorithm is proposed to compensate for filtering-based errors in the classical RFOB structure. The algorithm includes the differentiation of the observed force and scaling with a proper value. However, since the force has a noisy nature, differentiation also affects the signal’s stability and performance. To resolve this issue, …


The Top Ten Scientific Questions In Electrochemistry, Chinese Society Of Electrochemistry Jan 2024

The Top Ten Scientific Questions In Electrochemistry, Chinese Society Of Electrochemistry

Journal of Electrochemistry

  1. How to Detect or Simulate the Dynamic Structural Changes of Complex Electrochemical Interfaces under In-Situ/Operando Conditions at the Microscale, and Establish Their Relationships with Macroscopic Electrochemical Performance?
  2. How to Understand and Regulate the Nucleation and Growth of Metal Lithium at the Anode, and Develop Strategies for Suppressing Dendrite Formation?
  3. How to Obtain High-Performance Alkali-Metal-Ion Solid-State Electrolytes for Solid State Batteries?
  4. How to Develop Aqueous Battery Systems with High Energy Density and Multi-Electron Transfer Reaction?
  5. How to Rationally Design Efficient and Long-Lasting Low/Non-Platinum Electrocatalysts and Their Large-Scale Production?
  6. How to Construct High-Efficiency Three-Phase Interface and Gain Insights into Enhanced Charge/Mass Transportation …


Rational Design Of Heterostructured Nanomaterials For Accelerating Electrocatalytic Hydrogen Evolution Reaction Kinetics In Alkaline Media, Hai-Bin Ma, Xiao-Yan Zhou, Jia-Yi Li, Hong-Fei Cheng, Ji-Wei Ma Jan 2024

Rational Design Of Heterostructured Nanomaterials For Accelerating Electrocatalytic Hydrogen Evolution Reaction Kinetics In Alkaline Media, Hai-Bin Ma, Xiao-Yan Zhou, Jia-Yi Li, Hong-Fei Cheng, Ji-Wei Ma

Journal of Electrochemistry

Owing to the merits of high energy density, as well as clean and sustainable properties, hydrogen has been deemed to be a prominent alternative energy to traditional fossil fuels. Electrocatalytic hydrogen evolution reaction (HER) has been considered to be mostly promising for achieving green hydrogen production, and has been widely studied in acidic and alkaline solutions. In particular, HER in alkaline media has high potential to achieve large-scale hydrogen production because of the increased durability of electrode materials. However, for the currently most prominent catalyst Pt, its HER kinetics in an alkaline solution is generally 2–3 orders lower than that …


Stability Of A Solid Oxide Cell Stack Under Direct Internal-Reforming Of Hydrogen-Blended Methane, Ya-Fei Tang, An-Qi Wu, Bei-Bei Han, Hua Liu, Shan-Jun Bao, Wang-Lin Lin, Ming Chen, Wan-Bing Guan, Subhash C. Singhal Jan 2024

Stability Of A Solid Oxide Cell Stack Under Direct Internal-Reforming Of Hydrogen-Blended Methane, Ya-Fei Tang, An-Qi Wu, Bei-Bei Han, Hua Liu, Shan-Jun Bao, Wang-Lin Lin, Ming Chen, Wan-Bing Guan, Subhash C. Singhal

Journal of Electrochemistry

In this work, the long-term stability and degradation mechanism of a direct internal-reforming solid oxide fuel cell stack (IR-SOFC stack) using hydrogen-blended methane steam reforming were investigated. An overall degradation rate of 2.3%·kh–1 was found after the stack was operated for 3000 hours, indicating a good long-term stability. However, the voltages of the two cells in the stack were increased at the rates of 3.38 mV·kh–1 and 3.78 mV·kh–1, while the area specific resistances of the three metal interconnects in the stack were increased to 0.276 Ω·cm2, 0.254 Ω·cm2 and 0.249 Ω·cm2 …


Market Analysis And Bidding Strategy Of Hybrid Renewable Energy Systems Considering Emissions, Fatma Elzahraa, Mohamed Elnemr, Samir Dawoud Jan 2024

Market Analysis And Bidding Strategy Of Hybrid Renewable Energy Systems Considering Emissions, Fatma Elzahraa, Mohamed Elnemr, Samir Dawoud

Journal of Engineering Research

The competition in the electricity markets makes it difficult to choose a suitable strategy for maximizing profit while reducing harmful emissions. To have an adequate energy price for consumers while minimizing the harmful emissions to the atmosphere and maximizing profits of all participants in the electricity market needs an aggressive bidding strategy. Developing these bidding strategies with the integration of renewable energy (RE) in the electricity market became important. This research studies various bidding strategies for maximizing profits in the deregulated energy market since participants are keen on developing bidding strategies considering emissions. These bidding strategies will consider the integration …


Photoluminescence Of Beryllium-Related Defects In Gallium Nitride, Mykhailo Vorobiov, Mykhailo Vorobiov Jan 2024

Photoluminescence Of Beryllium-Related Defects In Gallium Nitride, Mykhailo Vorobiov, Mykhailo Vorobiov

Theses and Dissertations

This study explores the potential of beryllium (Be) as an alternative dopant to magnesium (Mg) for achieving higher hole concentrations in gallium nitride (GaN). Despite Mg prominence as an acceptor in optoelectronic and high-power devices, its deep acceptor level at 0.22 eV above the valence band limits its effectiveness. By examining Be, this research aims to pave the way to overcoming these limitations and extend the findings to aluminum nitride and aluminum gallium nitride (AlGaN) alloy. Key contributions of this work include. i)Identification of three Be-related luminescence bands in GaN through photoluminescence spectroscopy, improving the understanding needed for further material …


Adaptive Resilient Control For A Class Of Nonlinear Distributed Parameter Systems With Actuator Faults, Hasan Ferdowsi, Jia Cai, Sarangapani Jagannathan Jan 2024

Adaptive Resilient Control For A Class Of Nonlinear Distributed Parameter Systems With Actuator Faults, Hasan Ferdowsi, Jia Cai, Sarangapani Jagannathan

Electrical and Computer Engineering Faculty Research & Creative Works

This paper presents a new model-based fault resilient control scheme for a class of nonlinear distributed parameter systems (DPS) represented by parabolic partial differential equations (PDE) in the presence of actuator faults. A Luenberger-like observer on the basis of nonlinear PDE representation of DPS is developed with boundary measurements. A detection residual is generated by taking the difference between the measured output of the DPS and the estimated one given by the observer. Once a fault is detected, an unknown actuator fault parameter vector together with a known basis function is utilized to adaptively estimate the fault dynamics. A novel …


Meta-Icvi: Ensemble Validity Metrics For Concise Labeling Of Correct, Under- Or Over-Partitioning In Streaming Clustering, Niklas M. Melton, Sasha A. Petrenko, Donald C. Wunsch Jan 2024

Meta-Icvi: Ensemble Validity Metrics For Concise Labeling Of Correct, Under- Or Over-Partitioning In Streaming Clustering, Niklas M. Melton, Sasha A. Petrenko, Donald C. Wunsch

Electrical and Computer Engineering Faculty Research & Creative Works

Understanding the performance and validity of clustering algorithms is both challenging and crucial, particularly when clustering must be done online. Until recently, most validation methods have relied on batch calculation and have required considerable human expertise in their interpretation. Improving real-time performance and interpretability of cluster validation, therefore, continues to be an important theme in unsupervised learning. Building upon previous work on incremental cluster validity indices (iCVIs), this paper introduces the Meta- iCVI as a tool for explainable and concise labeling of partition quality in online clustering. Leveraging a time-series classifier and data-fusion techniques, the Meta- iCVI combines the outputs …


Optimal Trajectory Tracking For Uncertain Linear Discrete-Time Systems Using Time-Varying Q-Learning, Maxwell Geiger, Vignesh Narayanan, Sarangapani Jagannathan Jan 2024

Optimal Trajectory Tracking For Uncertain Linear Discrete-Time Systems Using Time-Varying Q-Learning, Maxwell Geiger, Vignesh Narayanan, Sarangapani Jagannathan

Electrical and Computer Engineering Faculty Research & Creative Works

This Article Introduces a Novel Optimal Trajectory Tracking Control Scheme Designed for Uncertain Linear Discrete-Time (DT) Systems. in Contrast to Traditional Tracking Control Methods, Our Approach Removes the Requirement for the Reference Trajectory to Align with the Generator Dynamics of an Autonomous Dynamical System. Moreover, It Does Not Demand the Complete Desired Trajectory to Be Known in Advance, Whether through the Generator Model or Any Other Means. Instead, Our Approach Can Dynamically Incorporate Segments (Finite Horizons) of Reference Trajectories and Autonomously Learn an Optimal Control Policy to Track Them in Real Time. to Achieve This, We Address the Tracking Problem …


Machine Learning Based Three-Limb Core-Type Transformer Core Aspect Ratios Identification, Ananta Bijoy Bhadra Jan 2024

Machine Learning Based Three-Limb Core-Type Transformer Core Aspect Ratios Identification, Ananta Bijoy Bhadra

Electronic Theses and Dissertations

Power transformers are considered one of the key elements of electric grids. Transient studies include transformer transient analysis which is required for the continuous power supply. However, to perform the transient analysis, the details of the internal structure of the transformer are required which are unobtainable and considered as confidential information. Therefore, the application of topological-based transformer models is limited although the models can accurately represent the transformers. To address this concern, a novel approach utilizing Machine Learning (ML) to identify the core aspect ratios of the three-limb core-type transformer is introduced. The proposed approach, using only the voltage and …


Structured Invariant Subspace And Decomposition Of Systems With Time Delays And Uncertainties, Huan Phan-Van, Keqin Gu Jan 2024

Structured Invariant Subspace And Decomposition Of Systems With Time Delays And Uncertainties, Huan Phan-Van, Keqin Gu

SIUE Faculty Research, Scholarship, and Creative Activity

This article discusses invariant subspaces of a matrix with a given partition structure. The existence of a nontrivial structured invariant subspace is equivalent to the possibility of decomposing the associated system with multiple feedback blocks such that the feedback operators are subject to a given constraint. The formulation is especially useful in the stability analysis of time-delay systems using the Lyapunov-Krasovskii functional approach where computational efficiency is essential in order to achieve accuracy for large scale systems. The set of all structured invariant subspaces are obtained (thus all possible decompositions are obtained as a result) for the coupled differential-difference equations …


Exponential Fusion Of Interpolated Frames Network (Efif-Net): Advancing Multi-Frame Image Super-Resolution With Convolutional Neural Networks, Hamed Elwarfalli, Dylan Flaute, Russell C. Hardie Jan 2024

Exponential Fusion Of Interpolated Frames Network (Efif-Net): Advancing Multi-Frame Image Super-Resolution With Convolutional Neural Networks, Hamed Elwarfalli, Dylan Flaute, Russell C. Hardie

Electrical and Computer Engineering Faculty Publications

Convolutional neural networks (CNNs) have become instrumental in advancing multi-frame image super-resolution (SR), a technique that merges multiple low-resolution images of the same scene into a high-resolution image. In this paper, a novel deep learning multi-frame SR algorithm is introduced. The proposed CNN model, named Exponential Fusion of Interpolated Frames Network (EFIF-Net), seamlessly integrates fusion and restoration within an end-to-end network. Key features of the new EFIF-Net include a custom exponentially weighted fusion (EWF) layer for image fusion and a modification of the Residual Channel Attention Network for restoration to deblur the fused image. Input frames are registered with subpixel …


Analysis Of Ultra-Wideband Voltage Pulse Propagation On Dispersive Absorptive Transmission Lines, Katherine Aho Jan 2024

Analysis Of Ultra-Wideband Voltage Pulse Propagation On Dispersive Absorptive Transmission Lines, Katherine Aho

Graduate College Dissertations and Theses

Electromagnetic transient waves are pulsed events that occur when there is an abruptchange in the typical steady-state conditions on a transmission line. Digital pulses on integrated circuits and a lightning strike on overhead power lines are some examples of transient voltage pulses. Although transients occur within a very short time duration, they can propagate over long distances; much farther than a slowly-varying envelope signal can propagate. Lingering effects of transients can be damaging to electrical equipment if they are not properly mitigated. Despite the negative effects of transients, certain designed transient pulses may be used to an advantage in remote …


Detection Of Tooth Position By Yolov4 And Various Dental Problems Based On Cnn With Bitewing Radiograph, Kuo Chen Li, Yi-Cheng Mao, Mu-Feng Lin, Yi-Qian Li, Chiung-An Chen, Tsung-Yi Chen, Patricia Angela R. Abu Jan 2024

Detection Of Tooth Position By Yolov4 And Various Dental Problems Based On Cnn With Bitewing Radiograph, Kuo Chen Li, Yi-Cheng Mao, Mu-Feng Lin, Yi-Qian Li, Chiung-An Chen, Tsung-Yi Chen, Patricia Angela R. Abu

Department of Information Systems & Computer Science Faculty Publications

Periodontitis is a high prevalence dental disease caused by bacterial infection of the bone that surrounds the tooth. Early detection and precision treatment can prevent more severe symptoms such as tooth loss. Traditionally, periodontal disease is identified and labeled manually by dental professionals. The task requires expertise and extensive experience, and it is highly repetitive and time-consuming. The aim of this study is to explore the application of AI in the field of dental medicine. With the inherent learning capabilities, AI exhibits remarkable proficiency in processing extensive datasets and effectively managing repetitive tasks. This is particularly advantageous in professions demanding …


Sparse Representation Learning For Temporal Networks, Maxwell Mcneil Jan 2024

Sparse Representation Learning For Temporal Networks, Maxwell Mcneil

Electronic Theses & Dissertations (2024 - present)

Temporal networks arise in many domains including activity of social network users, sensor network readings over time, and time course gene expression within the interaction network of a model organism. Data of this type contains a wealth of prior information such as the connectivity among nodes (e.g., a friendship graph), and prior knowledge of expected temporal patterns (e.g., periodicity). Modeling these temporal and network patterns jointly is essential for state-of-the-art performance in temporal network data analysis and mining. Sparse dictionary encoding is one modeling approach for such underlying patterns. However, most classical approaches consider only one dimension of the data …


The Integration Of Neuromorphic Computing In Autonomous Robotic Systems, Md Abu Bakr Siddique Jan 2024

The Integration Of Neuromorphic Computing In Autonomous Robotic Systems, Md Abu Bakr Siddique

Dissertations, Master's Theses and Master's Reports

Deep Neural Networks (DNNs) have come a long way in many cognitive tasks by training on large, labeled datasets. However, this method has problems in places with limited data and energy, like when planetary robots are used or when edge computing is used [1]. In contrast to this data-heavy approach, animals demonstrate an innate ability to learn by communicating with their environment and forming associative memories among events and entities, a process known as associative learning [2-4]. For instance, rats in a T-maze learn to associate different stimuli with outcomes through exploration without needing labeled data [5]. This learning paradigm …


Nonuniform Sampling-Based Breast Cancer Classification, Santiago Posso Jan 2024

Nonuniform Sampling-Based Breast Cancer Classification, Santiago Posso

Theses and Dissertations--Electrical and Computer Engineering

The emergence of deep learning models and their success in visual object recognition have fueled the medical imaging community's interest in integrating these algorithms to improve medical diagnosis. However, natural images, which have been the main focus of deep learning models and mammograms, exhibit fundamental differences. First, breast tissue abnormalities are often smaller than salient objects in natural images. Second, breast images have significantly higher resolutions but are generally heavily downsampled to fit these images to deep learning models. Models that handle high-resolution mammograms require many exams and complex architectures. Additionally, spatially resizing mammograms leads to losing discriminative details essential …


Designing High-Performance Identity-Based Quantum Signature Protocol With Strong Security, Sunil Prajapat, Pankaj Kumar, Sandeep Kumar, Ashok Kumar Das, Sachin Shetty, M. Shamim Hossain Jan 2024

Designing High-Performance Identity-Based Quantum Signature Protocol With Strong Security, Sunil Prajapat, Pankaj Kumar, Sandeep Kumar, Ashok Kumar Das, Sachin Shetty, M. Shamim Hossain

VMASC Publications

Due to the rapid advancement of quantum computers, there has been a furious race for quantum technologies in academia and industry. Quantum cryptography is an important tool for achieving security services during quantum communication. Designated verifier signature, a variant of quantum cryptography, is very useful in applications like the Internet of Things (IoT) and auctions. An identity-based quantum-designated verifier signature (QDVS) scheme is suggested in this work. Our protocol features security attributes like eavesdropping, non-repudiation, designated verification, and hiding sources attacks. Additionally, it is protected from attacks on forgery, inter-resending, and impersonation. The proposed scheme benefits from the traditional designated …


A Survey On Few-Shot Class-Incremental Learning, Songsong Tian, Lusi Li, Weijun Li, Hang Ran, Xin Ning, Prayag Tiwari Jan 2024

A Survey On Few-Shot Class-Incremental Learning, Songsong Tian, Lusi Li, Weijun Li, Hang Ran, Xin Ning, Prayag Tiwari

Computer Science Faculty Publications

Large deep learning models are impressive, but they struggle when real-time data is not available. Few-shot class-incremental learning (FSCIL) poses a significant challenge for deep neural networks to learn new tasks from just a few labeled samples without forgetting the previously learned ones. This setup can easily leads to catastrophic forgetting and overfitting problems, severely affecting model performance. Studying FSCIL helps overcome deep learning model limitations on data volume and acquisition time, while improving practicality and adaptability of machine learning models. This paper provides a comprehensive survey on FSCIL. Unlike previous surveys, we aim to synthesize few-shot learning and incremental …


Sub-Band Backdoor Attack In Remote Sensing Imagery, Kazi Aminul Islam, Hongyi Wu, Chunsheng Xin, Rui Ning, Liuwan Zhu, Jiang Li Jan 2024

Sub-Band Backdoor Attack In Remote Sensing Imagery, Kazi Aminul Islam, Hongyi Wu, Chunsheng Xin, Rui Ning, Liuwan Zhu, Jiang Li

Electrical & Computer Engineering Faculty Publications

Remote sensing datasets usually have a wide range of spatial and spectral resolutions. They provide unique advantages in surveillance systems, and many government organizations use remote sensing multispectral imagery to monitor security-critical infrastructures or targets. Artificial Intelligence (AI) has advanced rapidly in recent years and has been widely applied to remote image analysis, achieving state-of-the-art (SOTA) performance. However, AI models are vulnerable and can be easily deceived or poisoned. A malicious user may poison an AI model by creating a stealthy backdoor. A backdoored AI model performs well on clean data but behaves abnormally when a planted trigger appears in …