Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Missouri University of Science and Technology

Discipline
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 511 - 540 of 6056

Full-Text Articles in Physical Sciences and Mathematics

Greedy Algorithms For Scheduling Package Delivery With Multiple Drones, Francesco Betti Sorbelli, Federico Corò, Sajal K. Das, Lorenzo Palazzetti, Cristina M. Pinotti Jan 2022

Greedy Algorithms For Scheduling Package Delivery With Multiple Drones, Francesco Betti Sorbelli, Federico Corò, Sajal K. Das, Lorenzo Palazzetti, Cristina M. Pinotti

Computer Science Faculty Research & Creative Works

Unmanned Aerial Vehicles (or drones) can be used for a myriad of civil applications, such as search and rescue, precision agriculture, or last-mile package delivery. Interestingly, the cooperation between drones and ground vehicles (trucks) can even enhance the quality of service. In this paper, we investigate the symbiosis among a truck and multiple drones in a last-mile package delivery scenario, introducing the Multiple Drone-Delivery Scheduling Problem (MDSP). From the main depot, a truck takes care of transporting a team of drones that will be used to deliver packages to customers. Each delivery is associated with a drone's energy cost, a …


Distributed Matrix Tiling Using A Hypergraph Labeling Formulation, Avah Banerjee, Maxwell Reeser, Guoli Ding Jan 2022

Distributed Matrix Tiling Using A Hypergraph Labeling Formulation, Avah Banerjee, Maxwell Reeser, Guoli Ding

Computer Science Faculty Research & Creative Works

Partitioning large matrices is an important problem in distributed linear algebra computing, used in ML among others. Briefly, our goal is to perform a sequence of matrix algebra operations in a distributed manner on these large matrices. However, not all partitioning schemes work well with different matrix algebra operations and their implementations (algorithms). This is a type of data tiling problem. In this paper we consider a data tiling problem using hypergraphs. We prove some hardness results and give a theoretical characterization of its complexity on random instances. Additionally, we develop a greedy algorithm and experimentally show its efficacy.


The Beverton-Hold Model On Isolated Time Scales, Martin Bohner, Jaqueline Mesquita, Sabrina Streipert Jan 2022

The Beverton-Hold Model On Isolated Time Scales, Martin Bohner, Jaqueline Mesquita, Sabrina Streipert

Mathematics and Statistics Faculty Research & Creative Works

In this work, we formulate the Beverton-Holt model on isolated time scales and extend existing results known in the discrete and quantum calculus cases. Applying a recently introduced definition of periodicity for arbitrary isolated time scales, we discuss the effects of periodicity onto a population modeled by a dynamic version of the Beverton-Holt equation. The first main theorem provides conditions for the existence of a unique !-periodic solution that is globally asymptotically stable, which addresses the first Cushing-Henson conjecture on isolated time scales. The second main theorem concerns the generalization of the second Cushing-Henson conjecture. It investigates the effects of …


Optimal Equivalence Testing In Exponential Families, Renren Zhao, Robert L. Paige Jan 2022

Optimal Equivalence Testing In Exponential Families, Renren Zhao, Robert L. Paige

Mathematics and Statistics Faculty Research & Creative Works

We develop uniformly most powerful unbiased (UMPU) two sample equivalence test for a difference of canonical parameters in exponential families. This development involves a non-unique reparameterization. We address this issue via a novel characterization of all possible reparameterizations of interest in terms of a matrix group. Furthermore, our procedure involves an intractable conditional distribution which we reproduce to a high degree of accuracy using saddle point approximations. The development of this saddle point-based procedure involves a non-unique reparameterization, but we show that our procedure is invariant under choice of reparameterization. Our real data example considers the mean-to-variance ratio for normally …


On The Hartogs Extension Theorem For Unbounded Domains In CN, Al Boggess, Roman Dwilewicz, Egmont Porten Jan 2022

On The Hartogs Extension Theorem For Unbounded Domains In CN, Al Boggess, Roman Dwilewicz, Egmont Porten

Mathematics and Statistics Faculty Research & Creative Works

Let Ω ⊂ Cn, n > 2, be a domain with smooth connected boundary. If Ω is relatively compact, the Hartogs–Bochner theorem ensures that every CR distribution on ∂Ω has a holomorphic extension to Ω. For unbounded domains this extension property may fail, for example if Ω contains a complex hypersurface. The main result in this paper tells that the extension property holds if and only if the envelope of holomorphy of Cn \ Ω is Cn. It seems that it is the first result in the literature which gives a geometric characterization of unbounded domains in Cn for which the …


Fundamental Structure Of General Stochastic Dynamical Systems: High-Dimension Case, Haoyu Wang, Xiaoliang Gan, Wenqing Hu, Ping Ao Jan 2022

Fundamental Structure Of General Stochastic Dynamical Systems: High-Dimension Case, Haoyu Wang, Xiaoliang Gan, Wenqing Hu, Ping Ao

Mathematics and Statistics Faculty Research & Creative Works

No one has proved that mathematically general stochastic dynamical systems have a special structure. Thus, we introduce a structure of a general stochastic dynamical system. According to scientific understanding, we assert that its deterministic part can be decomposed into three significant parts: the gradient of the potential function, friction matrix and Lorenz matrix. Our previous work proved this structure for the low-dimension case. In this paper, we prove this structure for the high-dimension case. Hence, this structure of general stochastic dynamical systems is fundamental.


Man-In-The-Middle Attacks On Mqtt Based Iot Networks, Henry C. Wong Jan 2022

Man-In-The-Middle Attacks On Mqtt Based Iot Networks, Henry C. Wong

Masters Theses

“The use of Internet-of-Things (IoT) devices has increased a considerable amount in recent years due to decreasing cost and increasing availability of transistors, semiconductor, and other components. Examples can be found in daily life through smart cities, consumer security cameras, agriculture sensors, and more. However, Cyber Security in these IoT devices are often an afterthought making these devices susceptible to easy attacks. This can be due to multiple factors. An IoT device is often in a smaller form factor and must be affordable to buy in large quantities; as a result, IoT devices have less resources than a typical computer. …


Proton Radius: A Puzzle Or A Solution!?, Ulrich D. Jentschura Jan 2022

Proton Radius: A Puzzle Or A Solution!?, Ulrich D. Jentschura

Physics Faculty Research & Creative Works

The proton radius puzzle is known as the discrepancy of the proton radius, obtained from muonic hydrogen spectroscopy (obtained as being roughly equal to 0.84 fm), and the proton radius obtained from (ordinary) hydrogen spectroscopy where a number of measurements involving highly excited states have traditionally favored a value of about 0.88 fm. Recently, a number of measurements of hydrogen transitions by the Munich (Garching) groups (notably, several hyperfine-resolved sublevels of the 2S-4P) and by the group at the University of Toronto (2S-2P 1/2) have led to transition frequency data consistent with the smaller proton radius of about 0.84 fm. …


Jointly-Learnt Networks For Future Action Anticipation Via Self-Knowledge Distillation And Cycle Consistency, Md Moniruzzaman, Zhaozheng Yin, Zhihai He, Ming-Chuan Leu, Ruwen Qin Jan 2022

Jointly-Learnt Networks For Future Action Anticipation Via Self-Knowledge Distillation And Cycle Consistency, Md Moniruzzaman, Zhaozheng Yin, Zhihai He, Ming-Chuan Leu, Ruwen Qin

Mechanical and Aerospace Engineering Faculty Research & Creative Works

Future action anticipation aims to infer future actions from the observation of a small set of past video frames. In this paper, we propose a novel Jointly learnt Action Anticipation Network (J-AAN) via Self-Knowledge Distillation (Self-KD) and cycle consistency for future action anticipation. In contrast to the current state-of-the-art methods which anticipate the future actions either directly or recursively, our proposed J-AAN anticipates the future actions jointly in both direct and recursive ways. However, when dealing with future action anticipation, one important challenge to address is the future's uncertainty since multiple action sequences may come from or be followed by …


Creation Of A Neural Network For The American Sign Language To Russian Translation App, John T. Simmons Jan 2022

Creation Of A Neural Network For The American Sign Language To Russian Translation App, John T. Simmons

Capstone Projects

  1. A large population of people utilize American Sign Language for their primary method of communication.
  2. No commercially available product is available for these people for when they need to communicate with speakers of a foreign language.
  3. We must investigate methods to make communication between these two parties easier and more accessible.
  4. By using a neural network to classify images of American Sign Language letters, we can build a service to make translation of American Sign Language into foreign languages possible.


Polybenzodiazine Aerogels: All-Nitrogen Analogues Of Polybenzoxazines Synthesis, Characterization, And High-Yield Conversion To Nanoporous Carbons, Vaibhav A. Edlabadkar, Saidulu Gorla, Rushi U. Soni, A. B.M.Shaheen Ud Doulah, Joseph Gloriod, Samuel Hackett, Nicholas Leventis, Chariklia Sotiriou-Leventis Jan 2022

Polybenzodiazine Aerogels: All-Nitrogen Analogues Of Polybenzoxazines Synthesis, Characterization, And High-Yield Conversion To Nanoporous Carbons, Vaibhav A. Edlabadkar, Saidulu Gorla, Rushi U. Soni, A. B.M.Shaheen Ud Doulah, Joseph Gloriod, Samuel Hackett, Nicholas Leventis, Chariklia Sotiriou-Leventis

Chemistry Faculty Research & Creative Works

Tetrahydroquinazoline (THQ) was designed as an all-nitrogen analogue of main-stream benzoxazine monomers. THQ solutions in DMF gelled at 100 °C via HCl-catalyzed ring-opening polymerization to polybenzodiazine (PBDAZ) wet gels, which were dried in an autoclave with supercritical fluid CO2 to aerogels. These as-prepared PBDAZ-100 aerogels undergo ring-fusion aromatization at 240 °C under O2. This oxidized form is referred to as PBDAZ-240. Chemical identification of PBDAZ-100 and PBDAZ-240 relied on consideration of all nine possible polymerization pathways, in combination with elemental analysis, infrared and solid-state 13C NMR spectroscopy, and 15N NMR spectroscopy of aerogels from the selectively 15N-enriched …


Extensive Thiol Profiling For Assessment Of Intracellular Redox Status In Cultured Cells By Hplc-Ms/Ms, Jiandong Wu, Anna Chernatynskaya, Annalise Pfaff, Huari Kou, Nan Cen, Nuran Ercal, Honglan Shi Jan 2022

Extensive Thiol Profiling For Assessment Of Intracellular Redox Status In Cultured Cells By Hplc-Ms/Ms, Jiandong Wu, Anna Chernatynskaya, Annalise Pfaff, Huari Kou, Nan Cen, Nuran Ercal, Honglan Shi

Computer Science Faculty Research & Creative Works

Oxidative stress may contribute to the pathology of many diseases, and endogenous thiols, especially glutathione (GSH) and its metabolites, play essential roles in the maintenance of normal redox status. Understanding how these metabolites change in response to oxidative insult can provide key insights into potential methods of prevention and treatment. Most existing methodologies focus only on the GSH/GSH disulfide (GSSG) redox couple, but GSH regulation is highly complex and depends on several pathways with multiple redox-active sulfur-containing species. In order to more fully characterize thiol redox status in response to oxidative insult, a high-performance liquid chromatography with tandem mass spectrometry …


Volunteer Selection In Collaborative Crowdsourcing With Adaptive Common Working Time Slots, Riya Samanta, Vaibhav Saxena, Soumya K. Ghosh, Sajal K. Das Jan 2022

Volunteer Selection In Collaborative Crowdsourcing With Adaptive Common Working Time Slots, Riya Samanta, Vaibhav Saxena, Soumya K. Ghosh, Sajal K. Das

Computer Science Faculty Research & Creative Works

Skill-based volunteering is an expanding branch of crowdsourcing where one may acquire sustainable services, solutions, and ideas from the crowd by connecting with them online. The optimal mapping between volunteers and tasks with collaboration becomes challenging for complex tasks demanding greater skills and cognitive ability. Unlike traditional crowdsourcing, volunteers like to work on their own schedule and locations. To address this problem, we propose a novel two-phase framework consisting of Initial Volunteer-Task Mapping (i-VTM) and Adaptive Common Slot Finding (a-CSF) algorithms. The i-VTM algorithm assigns volunteers to the tasks based on their skills and spatial proximity, whereas the a-CSF algorithm …


An Icn-Based Secure Task Cooperation Scheme In Challenging Wireless Edge Networks, Ningchun Liu, Shuai Gao, Teng Liang, Xindi Hou, Sajal K. Das Jan 2022

An Icn-Based Secure Task Cooperation Scheme In Challenging Wireless Edge Networks, Ningchun Liu, Shuai Gao, Teng Liang, Xindi Hou, Sajal K. Das

Computer Science Faculty Research & Creative Works

Task cooperation is an effective way to execute a complex task in challenging wireless edge networks. Existing TCP/IP-based solutions encounter the problem of low network resource utilization and the heavy dependency of infrastructure connections. Information-centric networking (ICN) is a promising architecture to address these issues. In existing ICN-based task cooperation schemes, the data reuse feature of ICN improves the utilization of network resources, which also brings potential security threats to the reused data. To guarantee the security of data reuse in task cooperation without affecting the data reuse feature, we propose an ICN-based secure task cooperation scheme. In our scheme, …


Delivery With Uavs: A Simulated Dataset Via Ats, Giulio Rigoni, Cristina M. Pinotti, Bhumika, Debasis Das, Sajal K. Das Jan 2022

Delivery With Uavs: A Simulated Dataset Via Ats, Giulio Rigoni, Cristina M. Pinotti, Bhumika, Debasis Das, Sajal K. Das

Computer Science Faculty Research & Creative Works

We consider a delivery food service operated by Unmanned Aerial Vehicles (UAVs). Due to the absence of a dataset on UAVs deliveries in the literature, and since it is not possible to perform real tests, we create a dataset using an open-Air Traffic Simulator (ATS). Precisely, we converted a set of food deliveries operated by wheeled vehicles, proposed in the literature [1], into a set of simulated UAVs deliveries. For each delivery, we ran a UAV flight from the source to the destination. The results showed that, as expected, the UAV's course is shorter than the vehicle trajectory on the …


Locality-Aware Qubit Routing For The Grid Architecture, Avah Banerjee, Xin Liang, R. Tohid Jan 2022

Locality-Aware Qubit Routing For The Grid Architecture, Avah Banerjee, Xin Liang, R. Tohid

Computer Science Faculty Research & Creative Works

Due to the short decohorence time of qubits available in the NISQ-era, it is essential to pack (minimize the size and or the depth of) a logical quantum circuit as efficiently as possible given a sparsely coupled physical architecture. In this work we introduce a locality-aware qubit routing algorithm based on a graph theoretic framework. Our algorithm is designed for the grid and certain 'grid-like' architectures. We experimentally show the competitiveness of algorithm by comparing it against the approximate token swapping algorithm, which is used as a primitive in many state-of-the-art quantum trans pilers. Our algorithm produces circuits of comparable …


Privacy-Preserving Data Falsification Detection In Smart Grids Using Elliptic Curve Cryptography And Homomorphic Encryption, Sanskruti Joshi, Ruixiao Li, Shameek Bhattacharjee, Sajal K. Das, Hayato Yamana Jan 2022

Privacy-Preserving Data Falsification Detection In Smart Grids Using Elliptic Curve Cryptography And Homomorphic Encryption, Sanskruti Joshi, Ruixiao Li, Shameek Bhattacharjee, Sajal K. Das, Hayato Yamana

Computer Science Faculty Research & Creative Works

In an advanced metering infrastructure (AMI), the electric utility collects power consumption data from smart meters to improve energy optimization and provides detailed information on power consumption to electric utility customers. However, AMI is vulnerable to data falsification attacks, which organized adversaries can launch. Such attacks can be detected by analyzing customers' fine-grained power consumption data; however, analyzing customers' private data violates the customers' privacy. Although homomorphic encryption-based schemes have been proposed to tackle the problem, the disadvantage is a long execution time. This paper proposes a new privacy-preserving data falsification detection scheme to shorten the execution time. We adopt …


Anomaly Based Incident Detection In Large Scale Smart Transportation Systems, Jaminur Islam, Jose Paolo Talusan, Shameek Bhattacharjee, Francis Tiausas, Sayyed Mohsen Vazirizade, Abhishek Dubey, Keiichi Yasumoto, Sajal K. Das Jan 2022

Anomaly Based Incident Detection In Large Scale Smart Transportation Systems, Jaminur Islam, Jose Paolo Talusan, Shameek Bhattacharjee, Francis Tiausas, Sayyed Mohsen Vazirizade, Abhishek Dubey, Keiichi Yasumoto, Sajal K. Das

Computer Science Faculty Research & Creative Works

Modern smart cities are focusing on smart transportation solutions to detect and mitigate the effects of various traffic incidents in the city. To materialize this, roadside units and ambient trans-portation sensors are being deployed to collect vehicular data that provides real-time traffic monitoring. In this paper, we first propose a real-time data-driven anomaly-based traffic incident detection framework for a city-scale smart transportation system. Specifically, we propose an incremental region growing approximation algorithm for optimal Spatio-temporal clustering of road segments and their data; such that road segments are strategically divided into highly correlated clusters. The highly correlated clusters enable identifying a …


More To Less (M2l): Enhanced Health Recognition In The Wild With Reduced Modality Of Wearable Sensors, Huiyuan Yang, Han Yu, Kusha Sridhar, Thomas Vaessen, Inez Myin-Germeys, Akane Sano Jan 2022

More To Less (M2l): Enhanced Health Recognition In The Wild With Reduced Modality Of Wearable Sensors, Huiyuan Yang, Han Yu, Kusha Sridhar, Thomas Vaessen, Inez Myin-Germeys, Akane Sano

Computer Science Faculty Research & Creative Works

Accurately recognizing health-related conditions from wearable data is crucial for improved healthcare outcomes. To improve the recognition accuracy, various approaches have focused on how to effectively fuse information from multiple sensors. Fusing multiple sensors is a common choice in many applications but may not always be feasible in real-world scenarios. For example, although combining bio signals from multiple sensors (i.e., a chest pad sensor and a wrist wearable sensor) has been proved effective for improved performance, wearing multiple devices might be impractical in the free-living context. To solve the challenges, we propose an effective more to less (M2L) learning framework …


Chimeranet: U-Net For Hair Detection In Dermoscopic Skin Lesion Images, Norsang Lama, Reda Kasmi, Jason R. Hagerty, R. Joe Stanley, Reagan Harris Young, Jessica Miinch, Januka Nepal, Anand Nambisan, William V. Stoecker Jan 2022

Chimeranet: U-Net For Hair Detection In Dermoscopic Skin Lesion Images, Norsang Lama, Reda Kasmi, Jason R. Hagerty, R. Joe Stanley, Reagan Harris Young, Jessica Miinch, Januka Nepal, Anand Nambisan, William V. Stoecker

Electrical and Computer Engineering Faculty Research & Creative Works

Hair and ruler mark structures in dermoscopic images are an obstacle preventing accurate image segmentation and detection of critical network features. Recognition and removal of hairs from images can be challenging, especially for hairs that are thin, overlapping, faded, or of similar color as skin or overlaid on a textured lesion. This paper proposes a novel deep learning (DL) technique to detect hair and ruler marks in skin lesion images. Our proposed ChimeraNet is an encoder-decoder architecture that employs pretrained EfficientNet in the encoder and squeeze-and-excitation residual (SERes) structures in the decoder. We applied this approach at multiple image sizes …


A Drone-Based Application For Scouting Halyomorpha Halys Bugs In Orchards With Multifunctional Nets, Francesco Betti Sorbelli, Federico Coro, Sajal K. Das, Emanuele Di Bella, Lara Maistrello, Lorenzo Palazzetti, Cristina M. Pinotti Jan 2022

A Drone-Based Application For Scouting Halyomorpha Halys Bugs In Orchards With Multifunctional Nets, Francesco Betti Sorbelli, Federico Coro, Sajal K. Das, Emanuele Di Bella, Lara Maistrello, Lorenzo Palazzetti, Cristina M. Pinotti

Computer Science Faculty Research & Creative Works

In this work, we consider the problem of using a drone to collect information within orchards in order to scout insect pests, i.e., the stink bug Halyomorpha halys. An orchard can be modeled as an aisle-graph, which is a regular and constrained data structure formed by consecutive aisles where trees are arranged in a straight line. For monitoring the presence of bugs, a drone flies close to the trees and takes videos and/or pictures that will be analyzed offline. As the drone's energy is limited, only a subset of locations in the orchard can be visited with a fully charged …


Securing Federated Learning Against Overwhelming Collusive Attackers, Priyesh Ranjan, Ashish Gupta, Federico Corò, Sajal K. Das Jan 2022

Securing Federated Learning Against Overwhelming Collusive Attackers, Priyesh Ranjan, Ashish Gupta, Federico Corò, Sajal K. Das

Computer Science Faculty Research & Creative Works

In the era of a data-driven society with the ubiquity of Internet of Things (IoT) devices storing large amounts of data localized at different places, distributed learning has gained a lot of traction, however, assuming independent and identically distributed data (iid) across the devices. While relaxing this assumption that anyway does not hold in reality due to the heterogeneous nature of devices, federated learning (FL) has emerged as a privacy-preserving solution to train a collaborative model over non-iid data distributed across a massive number of devices. However, the appearance of malicious devices (attackers), who intend to corrupt the FL model, …


Federated Secure Data Sharing By Edge-Cloud Computing Model*, Arijit Karati, Sajal K. Das Jan 2022

Federated Secure Data Sharing By Edge-Cloud Computing Model*, Arijit Karati, Sajal K. Das

Computer Science Faculty Research & Creative Works

Data sharing by cloud computing enjoys benefits in management, access control, and scalability. However, it suffers from certain drawbacks, such as high latency of downloading data, non-unified data access control management, and no user data privacy. Edge computing provides the feasibility to overcome the drawbacks mentioned above. Therefore, providing a security framework for edge computing becomes a prime focus for researchers. This work introduces a new key-aggregate cryptosystem for edge-cloud-based data sharing integrating cloud storage services. The proposed protocol secures data and provides anonymous authentication across multiple cloud platforms, key management flexibility for user data privacy, and revocability. Performance assessment …


A Novel Echo State Network Autoencoder For Anomaly Detection In Industrial Iot Systems, Fabrizio De Vita, Giorgio Nocera, Dario Bruneo, Sajal K. Das Jan 2022

A Novel Echo State Network Autoencoder For Anomaly Detection In Industrial Iot Systems, Fabrizio De Vita, Giorgio Nocera, Dario Bruneo, Sajal K. Das

Computer Science Faculty Research & Creative Works

The Industrial Internet of Things (IIoT) technology had a very strong impact on the realization of smart frameworks for detecting anomalous behaviors that could be potentially dangerous to a system. In this regard, most of the existing solutions involve the use of Artificial Intelligence (AI) models running on Edge devices, such as Intelligent Cyber Physical Systems (ICPS) typically equipped with sensing and actuating capabilities. However, the hardware restrictions of these devices make the implementation of an effective anomaly detection algorithm quite challenging. Considering an industrial scenario, where signals in the form of multivariate time-series should be analyzed to perform a …


Noise Resilient Learning For Attack Detection In Smart Grid Pmu Infrastructure, Prithwiraj Roy, Shameek Bhattacharjee, Sahar Abedzadeh, Sajal K. Das Jan 2022

Noise Resilient Learning For Attack Detection In Smart Grid Pmu Infrastructure, Prithwiraj Roy, Shameek Bhattacharjee, Sahar Abedzadeh, Sajal K. Das

Computer Science Faculty Research & Creative Works

Falsified data from compromised Phasor Measurement Units (PMUs) in a smart grid induce Energy Management Systems (EMS) to have an inaccurate estimation of the state of the grid, disrupting various operations of the power grid. Moreover, the PMUs deployed at the distribution layer of a smart grid show dynamic fluctuations in their data streams, which make it extremely challenging to design effective learning frameworks for anomaly-based attack detection. In this paper, we propose a noise resilient learning framework for anomaly-based attack detection specifically for distribution layer PMU infrastructure, that show real time indicators of data falsifications attacks while offsetting the …


Cansafe: An Mtd Based Approach For Providing Resiliency Against Dos Attack Within In-Vehicle Networks, Ayan Roy, Sanjay Kumar Madria Jan 2022

Cansafe: An Mtd Based Approach For Providing Resiliency Against Dos Attack Within In-Vehicle Networks, Ayan Roy, Sanjay Kumar Madria

Computer Science Faculty Research & Creative Works

Trending towards autonomous transportation systems, modern vehicles are equipped with hundreds of sensors and actuators that increase the intelligence of the vehicles with a higher level of autonomy, as well as facilitate increased communication with entities outside the in-vehicle network. However, increase in a contact point with the outside world has exposed the controller area network (CAN) of a vehicle to remote security vulnerabilities. In particular, an attacker can inject fake high priority messages within the CAN through the contact points, while preventing legitimate messages from controlling the CAN (Denial-of-Service (DoS) attack). In this paper, we propose a Moving Target …


Distributed Decision Making For V2v Charge Sharing In Intelligent Transportation Systems, Punyasha Chatterjee, Pratham Majumder, Arpita Debnath, Sajal K. Das Jan 2022

Distributed Decision Making For V2v Charge Sharing In Intelligent Transportation Systems, Punyasha Chatterjee, Pratham Majumder, Arpita Debnath, Sajal K. Das

Computer Science Faculty Research & Creative Works

Electric vehicles (EVs) have emerged in the intelligent transportation system (ITS) to meet the increasing environmental concerns. To facilitate on-demand requirement of EV charging, vehicle-to-vehicle (V2V) charge transfer can be employed. However, most of the existing approaches to V2V charge sharing are centralized or semi-centralized, incurring huge message overhead, long waiting time, and infrastructural cost. In this paper, we propose novel distributed heuristic algorithms for V2V charge sharing based on the multi-criteria decision-making policy. The problem is mapped to an alias classical problem (i.e., optimum matching in weighted bipartite graphs), where the goal is to maximize the matching cardinality while …


Rssafe: Personalized Driver Behavior Prediction For Safe Driving, Bhumika, Debasis Das, Sajal K. Das Jan 2022

Rssafe: Personalized Driver Behavior Prediction For Safe Driving, Bhumika, Debasis Das, Sajal K. Das

Computer Science Faculty Research & Creative Works

While the increased demand for taxi services like Uber, Lyft, Hailo, Ola, Grab, Cabify etc. provides livelihood to many drivers, the desire to raise income forces the drivers to work very hard without rest. However, continuous journeys not only affect their health, but also lead to abnormal driving behavior such as rash driving, swerving, sideslipping, sudden brakes, or weaving, leading to accidents in the worst cases. Motivated by the severity of rising accidents and health issues among drivers, this paper proposes a recommendation system, called RsSafe, for the safety of drivers. Aiming to improve the driving quality and the driver's …


Toward Feature-Preserving Vector Field Compression, Xin Liang, Sheng Di, Franck Cappello, Mukund Raj, Chunhui Liu, Kenji Ono, Zizhong Chen, Tom Peterka, Hanqi Guo Jan 2022

Toward Feature-Preserving Vector Field Compression, Xin Liang, Sheng Di, Franck Cappello, Mukund Raj, Chunhui Liu, Kenji Ono, Zizhong Chen, Tom Peterka, Hanqi Guo

Computer Science Faculty Research & Creative Works

The objective of this work is to develop error-bounded lossy compression methods to preserve topological features in 2D and 3D vector fields. Specifically, we explore the preservation of critical points in piecewise linear and bilinear vector fields. We define the preservation of critical points as, without any false positive, false negative, or false type in the decompressed data, (1) keeping each critical point in its original cell and (2) retaining the type of each critical point (e.g., saddle and attracting node). The key to our method is to adapt a vertex-wise error bound for each grid point and to compress …


Improving Age Of Information With Interference Problem In Long-Range Wide Area Networks, Preti Kumari, Hari Prabhat Gupta, Tanima Dutta, Sajal K. Das Jan 2022

Improving Age Of Information With Interference Problem In Long-Range Wide Area Networks, Preti Kumari, Hari Prabhat Gupta, Tanima Dutta, Sajal K. Das

Computer Science Faculty Research & Creative Works

Low Power Wide Area Networks (LPWAN) offer a promising wireless communications technology for Internet of Things (IoT) applications. Among various existing LPWAN technologies, Long-Range WAN (LoRaWAN) consumes minimal power and provides virtual channels for communication through spreading factors. However, LoRaWAN suffers from the interference problem among nodes connected to a gateway that uses the same spreading factor. Such interference increases data communication time, thus reducing data freshness and suitability of LoRaWAN for delay-sensitive applications. To minimize the interference problem, an optimal allocation of the spreading factor is requisite for determining the time duration of data transmission. This paper proposes a …