Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

2022

Discipline
Institution
Keyword
Publication
Publication Type
File Type

Articles 16771 - 16800 of 18311

Full-Text Articles in Physical Sciences and Mathematics

Optimized Cancer Detection On Various Magnified Histopathological Colon Imagesbased On Dwt Features And Fcm Clustering, Tina Babu, Tripty Singh, Deepa Gupta, Shahin Hameed Jan 2022

Optimized Cancer Detection On Various Magnified Histopathological Colon Imagesbased On Dwt Features And Fcm Clustering, Tina Babu, Tripty Singh, Deepa Gupta, Shahin Hameed

Turkish Journal of Electrical Engineering and Computer Sciences

Due to the morphological characteristics and other biological aspects in histopathological images, the computerized diagnosis of colon cancer in histopathology images has gained popularity. The images acquired using the histopathology microscope may differ for greater visibility by magnifications. This causes a change in morphological traits leading to intra and inter-observer variability. An automatic colon cancer diagnosis system for various magnification is therefore crucial. This work proposes a magnification independent segmentation approach based on the connected component area and double density dual tree DWT (discrete wavelet transform) coefficients are derived from the segmented region. The derived features are reduced further shortened …


Temporal Bagging: A New Method For Time-Based Ensemble Learning, Göksu Tüysüzoğlu, Derya Bi̇rant, Volkan Kiranoğlu Jan 2022

Temporal Bagging: A New Method For Time-Based Ensemble Learning, Göksu Tüysüzoğlu, Derya Bi̇rant, Volkan Kiranoğlu

Turkish Journal of Electrical Engineering and Computer Sciences

One of the main problems associated with the bagging technique in ensemble learning is its random sample selection in which all samples are treated with the same chance of being selected. However, in time-varying dynamic systems, the samples in the training set have not equal importance, where the recent samples contain more useful and accurate information than the former ones. To overcome this problem, this paper proposes a new time-based ensemble learning method, called temporal bagging (T-Bagging). The significant advantage of our method is that it assigns larger weights to more recent samples with respect to older ones, so it …


The Online Ordering Behaviors Among Participants In The Oklahoma Women, Infants, And Children Program: A Cross-Sectional Analysis, Qi Zhang, Kayoung Park, Junzhou Zhang, Chuanyi Tang Jan 2022

The Online Ordering Behaviors Among Participants In The Oklahoma Women, Infants, And Children Program: A Cross-Sectional Analysis, Qi Zhang, Kayoung Park, Junzhou Zhang, Chuanyi Tang

Community & Environmental Health Faculty Publications

The Special Supplemental Nutrition Program for Women, Infants, and Children (WIC) is a nutrition assistance program in the United States (U.S.). Participants in the program redeem their prescribed food benefits in WIC-authorized grocery stores. Online ordering is an innovative method being pilot-tested in some stores to facilitate WIC participants' food benefit redemption, which has become especially important in the COVID-19 pandemic. The present research aimed to examine the online ordering (OO) behaviors among 726 WIC households who adopted WIC OO in a grocery chain, XYZ (anonymous) store, in Oklahoma (OK). These households represented approximately 5% of WIC households who redeemed …


Predictive Models In Software Engineering: Challenges And Opportunities, Yanming Yang, Xin Xia, David Lo, Tingting Bi, John C. Grundy, Xiaohu Yang Jan 2022

Predictive Models In Software Engineering: Challenges And Opportunities, Yanming Yang, Xin Xia, David Lo, Tingting Bi, John C. Grundy, Xiaohu Yang

Research Collection School Of Computing and Information Systems

Predictive models are one of the most important techniques that are widely applied in many areas of software engineering. There have been a large number of primary studies that apply predictive models and that present well-performed studies in various research domains, including software requirements, software design and development, testing and debugging, and software maintenance. This article is a first attempt to systematically organize knowledge in this area by surveying a body of 421 papers on predictive models published between 2009 and 2020. We describe the key models and approaches used, classify the different models, summarize the range of key application …


Orchestration Or Automation: Authentication Flaw Detection In Android Apps, Siqi Ma, Juanru Li, Surya Nepal, Diethelm Ostry, David Lo, Sanjay K. Jha, Robert H. Deng, Elisa Bertino Jan 2022

Orchestration Or Automation: Authentication Flaw Detection In Android Apps, Siqi Ma, Juanru Li, Surya Nepal, Diethelm Ostry, David Lo, Sanjay K. Jha, Robert H. Deng, Elisa Bertino

Research Collection School Of Computing and Information Systems

Passwords are pervasively used to authenticate users' identities in mobile apps. To secure passwords against attacks, protection is applied to the password authentication protocol (PAP). The implementation of the protection scheme becomes an important factor in protecting PAP against attacks. We focus on two basic protection in Android, i.e., SSL/TLS-based PAP and timestamp-based PAP. Previously, we proposed an automated tool, GLACIATE, to detect authentication flaws. We were curious whether orchestration (i.e., involving manual-effort) works better than automation. To answer this question, we propose an orchestrated approach, AUTHEXPLOIT and compare its effectiveness GLACIATE. We study requirements for correct implementation of PAP …


Correlating Automated And Human Evaluation Of Code Documentation Generation Quality, Xing Hu, Qiuyuan Chen, Haoye Wang, Xin Xia, David Lo, Thomas Zimmermann Jan 2022

Correlating Automated And Human Evaluation Of Code Documentation Generation Quality, Xing Hu, Qiuyuan Chen, Haoye Wang, Xin Xia, David Lo, Thomas Zimmermann

Research Collection School Of Computing and Information Systems

Automatic code documentation generation has been a crucial task in the field of software engineering. It not only relieves developers from writing code documentation but also helps them to understand programs better. Specifically, deep-learning-based techniques that leverage large-scale source code corpora have been widely used in code documentation generation. These works tend to use automatic metrics (such as BLEU, METEOR, ROUGE, CIDEr, and SPICE) to evaluate different models. These metrics compare generated documentation to reference texts by measuring the overlapping words. Unfortunately, there is no evidence demonstrating the correlation between these metrics and human judgment. We conduct experiments on two …


Toward Video-Conferencing Tools For Hands-On Activities In Online Teaching, Audrey Labrie, Terrance Mok, Anthony Tang, Michelle Lui, Lora Oehlberg, Lev Poretski Jan 2022

Toward Video-Conferencing Tools For Hands-On Activities In Online Teaching, Audrey Labrie, Terrance Mok, Anthony Tang, Michelle Lui, Lora Oehlberg, Lev Poretski

Research Collection School Of Computing and Information Systems

Many instructors in computing and HCI disciplines use hands-on activities for teaching and training new skills. Beyond simply teaching hands-on skills like sketching and programming, instructors also use these activities so students can acquire tacit skills. Yet, current video-conferencing technologies may not effectively support hands-on activities in online teaching contexts. To develop an understanding of the inadequacies of current video-conferencing technologies for hands-on activities, we conducted 15 interviews with university-level instructors who had quickly pivoted their use of hands-on activities to an online context during the early part of the COVID-19 pandemic. Based on our analysis, we uncovered four pedagogical …


Partnering For Value Perfection And Business Sustainability In The Cloud Services Brokerage Market, Richard Shang, Robert John Kauffman Jan 2022

Partnering For Value Perfection And Business Sustainability In The Cloud Services Brokerage Market, Richard Shang, Robert John Kauffman

Research Collection School Of Computing and Information Systems

The cloud computing and services market has advanced in the past ten years. They now include most IT services from fundamental computing to cutting-edge AI capabilities. With the widespread adoption of cloud services, clients are facing the fact that they are utilizing cloud resources at a sub-optimal level. Cloud services brokers (CSBs) grew from the market to fill the needs for cloud resource management and risk mitigation. Based on analysis of the cloud market and the case of cloud services brokerage and related activities in North America, we offer theoretical analysis for how value creation works, its impacts on the …


An Exploratory Study On The Repeatedly Shared External Links On Stack Overflow, Jiakun Liu, Haoxiang Zhang, Xin Xia, David Lo, Ying Zou, Ahmed E. Hassan, Shanping Li Jan 2022

An Exploratory Study On The Repeatedly Shared External Links On Stack Overflow, Jiakun Liu, Haoxiang Zhang, Xin Xia, David Lo, Ying Zou, Ahmed E. Hassan, Shanping Li

Research Collection School Of Computing and Information Systems

On Stack Overflow, users reuse 11,926,354 external links to share the resources hosted outside the Stack Overflow website. The external links connect to the existing programming-related knowledge and extend the crowdsourced knowledge on Stack Overflow. Some of the external links, so-called as repeated external links, can be shared for multiple times. We observe that 82.5% of the link sharing activities (i.e., sharing links in any question, answer, or comment) on Stack Overflow share external resources, and 57.0% of the occurrences of the external links are sharing the repeated external links. However, it is still unclear what types of external resources …


Authenticated Data Redaction With Accountability And Transparency, Jinhua Ma, Xinyi Huang, Yi Mu, Robert H. Deng Jan 2022

Authenticated Data Redaction With Accountability And Transparency, Jinhua Ma, Xinyi Huang, Yi Mu, Robert H. Deng

Research Collection School Of Computing and Information Systems

A common practice in data redaction is removing sensitive information prior to data publication or release. In data-driven applications, one must be convinced that the redacted data is still trustworthy. Meanwhile, the data redactor must be held accountable for (malicious) redaction, which could change/hide the meaning of the original data. Motivated by these concerns, we present a novel solution for authenticated data redaction based on a new Redactable Signature Scheme with Implicit Accountability (RSS - IA). In the event of a dispute, not only the original data signer but also the redactor can generate an evidence tag to unequivocally identify …


Defining Smart Contract Defects On Ethereum, Jiachi Chen, Xin Xia, David Lo, John Grundy, Xiapu Luo, Ting Chen Jan 2022

Defining Smart Contract Defects On Ethereum, Jiachi Chen, Xin Xia, David Lo, John Grundy, Xiapu Luo, Ting Chen

Research Collection School Of Computing and Information Systems

Smart contracts are programs running on a blockchain. They are immutable to change, and hence can not be patched for bugs once deployed. Thus it is critical to ensure they are bug-free and well-designed before deployment. A Contract defect is an error, flaw or fault in a smart contract that causes it to produce an incorrect or unexpected result, or to behave in unintended ways. The detection of contract defects is a method to avoid potential bugs and improve the design of existing code. Since smart contracts contain numerous distinctive features, such as the gas system. decentralized, it is important …


Perceptions And Needs Of Artificial Intelligence In Health Care To Increase Adoption: Scoping Review, Han Shi Jocelyn Chew, Palakorn Achananuparp Jan 2022

Perceptions And Needs Of Artificial Intelligence In Health Care To Increase Adoption: Scoping Review, Han Shi Jocelyn Chew, Palakorn Achananuparp

Research Collection School Of Computing and Information Systems

Background: Artificial intelligence (AI) has the potential to improve the efficiency and effectiveness of health care service delivery. However, the perceptions and needs of such systems remain elusive, hindering efforts to promote AI adoption in health care. Objective: This study aims to provide an overview of the perceptions and needs of AI to increase its adoption in health care. Methods: A systematic scoping review was conducted according to the 5-stage framework by Arksey and O’Malley. Articles that described the perceptions and needs of AI in health care were searched across nine databases: ACM Library, CINAHL, Cochrane Central, Embase, IEEE Xplore, …


Enjoy Your Observability: An Industrial Survey Of Microservice Tracing And Analysis, Bowen Li, Xin Peng, Qilin Xiang, Hanzhang Wang, Tao Xie, Jun Sun, Xuanzhe Liu Jan 2022

Enjoy Your Observability: An Industrial Survey Of Microservice Tracing And Analysis, Bowen Li, Xin Peng, Qilin Xiang, Hanzhang Wang, Tao Xie, Jun Sun, Xuanzhe Liu

Research Collection School Of Computing and Information Systems

Microservice systems are often deployed in complex cloud-based environments and may involve a large number of service instances being dynamically created and destroyed. It is thus essential to ensure observability to understand these microservice systems’ behaviors and troubleshoot their problems. As an important means to achieve the observability, distributed tracing and analysis is known to be challenging. While many companies have started implementing distributed tracing and analysis for microservice systems, it is not clear whether existing approaches fulfill the required observability. In this article, we present our industrial survey on microservice tracing and analysis through interviewing developers and operation engineers …


A Quantum Interpretation Of Separating Conjunction For Local Reasoning Of Quantum Programs Based On Separation Logic, Xuan Bach Le, Shang-Wei Lin, Jun Sun, David Sanan Jan 2022

A Quantum Interpretation Of Separating Conjunction For Local Reasoning Of Quantum Programs Based On Separation Logic, Xuan Bach Le, Shang-Wei Lin, Jun Sun, David Sanan

Research Collection School Of Computing and Information Systems

It is well-known that quantum programs are not only complicated to design but also challenging to verify because the quantum states can have exponential size and require sophisticated mathematics to encode and manipulate. To tackle the state-space explosion problem for quantum reasoning, we propose a Hoare-style inference framework that supports local reasoning for quantum programs. By providing a quantum interpretation of the separating conjunction, we are able to infuse separation logic into our framework and apply local reasoning using a quantum frame rule that is similar to the classical frame rule. For evaluation, we apply our framework to verify various …


Approximate K-Nn Graph Construction: A Generic Online Approach, Wan-Lei Zhao, Hui Wang, Chong-Wah Ngo Jan 2022

Approximate K-Nn Graph Construction: A Generic Online Approach, Wan-Lei Zhao, Hui Wang, Chong-Wah Ngo

Research Collection School Of Computing and Information Systems

Nearest neighbor search and k-nearest neighbor graph construction are two fundamental issues that arise from many disciplines such as multimedia information retrieval, data-mining, and machine learning. They become more and more imminent given the big data emerge in various fields in recent years. In this paper, a simple but effective solution both for approximate k-nearest neighbor search and approximate k-nearest neighbor graph construction is presented. These two issues are addressed jointly in our solution. On one hand, the approximate k-nearest neighbor graph construction is treated as a search task. Each sample along with its k-nearest neighbors is joined into the …


Learning From Web Recipe-Image Pairs For Food Recognition: Problem, Baselines And Performance, Bin Zhu, Chong-Wah Ngo, Wing-Kwong Chan Jan 2022

Learning From Web Recipe-Image Pairs For Food Recognition: Problem, Baselines And Performance, Bin Zhu, Chong-Wah Ngo, Wing-Kwong Chan

Research Collection School Of Computing and Information Systems

Cross-modal recipe retrieval has recently been explored for food recognition and understanding. Text-rich recipe provides not only visual content information (e.g., ingredients, dish presentation) but also procedure of food preparation (cutting and cooking styles). The paired data is leveraged to train deep models to retrieve recipes for food images. Most recipes on the Web include sample pictures as the references. The paired multimedia data is not noise-free, due to errors such as pairing of images containing partially prepared dishes with recipes. The content of recipes and food images are not always consistent due to free-style writing and preparation of food …


Lightweight And Expressive Fine-Grained Access Control For Healthcare Internet-Of-Things, Shengmin Xu, Yingjiu Li, Robert H. Deng, Yinghui Zhang, Xiangyang Luo, Ximeng Liu Jan 2022

Lightweight And Expressive Fine-Grained Access Control For Healthcare Internet-Of-Things, Shengmin Xu, Yingjiu Li, Robert H. Deng, Yinghui Zhang, Xiangyang Luo, Ximeng Liu

Research Collection School Of Computing and Information Systems

Healthcare Internet-of-Things (IoT) is an emerging paradigm that enables embedded devices to monitor patients vital signals and allows these data to be aggregated and outsourced to the cloud. The cloud enables authorized users to store and share data to enjoy on-demand services. Nevertheless, it also causes many security concerns because of the untrusted network environment, dishonest cloud service providers and resource-limited devices. To preserve patients' privacy, existing solutions usually apply cryptographic tools to offer access controls. However, fine-grained access control among authorized users is still a challenge, especially for lightweight and resource-limited end-devices. In this paper, we propose a novel …


A Blockchain-Based Self-Tallying Voting Protocol In Decentralized Iot, Yannan Li, Willy Susilo, Guomin Yang, Yong Yu, Dongxi Liu, Xiaojiang Du, Mohsen Guizani Jan 2022

A Blockchain-Based Self-Tallying Voting Protocol In Decentralized Iot, Yannan Li, Willy Susilo, Guomin Yang, Yong Yu, Dongxi Liu, Xiaojiang Du, Mohsen Guizani

Research Collection School Of Computing and Information Systems

The Internet of Things (IoT) is experiencing explosive growth and has gained extensive attention from academia and industry in recent years. However, most of the existing IoT infrastructures are centralized, which may cause the issues of unscalability and single-point-of-failure. Consequently, decentralized IoT has been proposed by taking advantage of the emerging technology called blockchain. Voting systems are widely adopted in IoT, for example a leader election in wireless sensor networks. Self-tallying voting systems are alternatives to unsuitable, traditional centralized voting systems in decentralized IoT. Unfortunately, self-tallying voting systems inherently suffer from fairness issues, such as adaptive and abortive issues caused …


Delta Debugging Microservice Systems With Parallel Optimization, Xiang Zhou, Xin Peng, Tao Xie, Jun Sun, Chao Ji, Wenha Li, Dan Ding Jan 2022

Delta Debugging Microservice Systems With Parallel Optimization, Xiang Zhou, Xin Peng, Tao Xie, Jun Sun, Chao Ji, Wenha Li, Dan Ding

Research Collection School Of Computing and Information Systems

Microservice systems are complicated due to their runtime environments and service communications. Debugging a failure involves the deployment and manipulation of microservice systems on a containerized environment and faces unique challenges due to the high complexity and dynamism of microservices. To address these challenges, we propose a debugging approach for microservice systems based on the delta debugging algorithm, which is to minimize failure-inducing deltas of circumstances (e.g., deployment, environmental configurations). Our approach includes novel techniques for defining, deploying/manipulating, and executing deltas during delta debugging. In particular, to construct a (failing) circumstance space for delta debugging to minimize, our approach defines …


Cross-Modal Food Retrieval: Learning A Joint Embedding Of Food Images And Recipes With Semantic Consistency And Attention Mechanism, Hao Wang, Doyen Sahoo, Chenghao Liu, Ke Shu, Palakorn Achananuparp, Ee-Peng Lim, Steven C. H. Hoi Jan 2022

Cross-Modal Food Retrieval: Learning A Joint Embedding Of Food Images And Recipes With Semantic Consistency And Attention Mechanism, Hao Wang, Doyen Sahoo, Chenghao Liu, Ke Shu, Palakorn Achananuparp, Ee-Peng Lim, Steven C. H. Hoi

Research Collection School Of Computing and Information Systems

Food retrieval is an important task to perform analysis of food-related information, where we are interested in retrieving relevant information about the queried food item such as ingredients, cooking instructions, etc. In this paper, we investigate cross-modal retrieval between food images and cooking recipes. The goal is to learn an embedding of images and recipes in a common feature space, such that the corresponding image-recipe embeddings lie close to one another. Two major challenges in addressing this problem are 1) large intra-variance and small inter-variance across cross-modal food data; and 2) difficulties in obtaining discriminative recipe representations. To address these …


"More Than Deep Learning": Post-Processing For Api Sequence Recommendation, Chi Chen, Xin Peng, Bihuan Chen, Jun Sun, Zhenchang Xing, Xin Wang, Wenyun Zhao Jan 2022

"More Than Deep Learning": Post-Processing For Api Sequence Recommendation, Chi Chen, Xin Peng, Bihuan Chen, Jun Sun, Zhenchang Xing, Xin Wang, Wenyun Zhao

Research Collection School Of Computing and Information Systems

In the daily development process, developers often need assistance in finding a sequence of APIs to accomplish their development tasks. Existing deep learning models, which have recently been developed for recommending one single API, can be adapted by using encoder-decoder models together with beam search to generate API sequence recommendations. However, the generated API sequence recommendations heavily rely on the probabilities of API suggestions at each decoding step, which do not take into account other domain-specific factors (e.g., whether an API suggestion satisfies the program syntax and how diverse the API sequence recommendations are). Moreover, it is difficult for developers …


Lessons Learnt Conducting Capture The Flag Cybersecurity Competition During Covid-19, Kee Hock Tan, Eng Lieh Ouh Jan 2022

Lessons Learnt Conducting Capture The Flag Cybersecurity Competition During Covid-19, Kee Hock Tan, Eng Lieh Ouh

Research Collection School Of Computing and Information Systems

This innovative practice full paper describes our experiences conducting cybersecurity capture the flag (CTF) competition for cybersecurity enthusiast participants (inclusive of both tertiary students and working professionals) local and abroad during the COVID-19 pandemic. Learning and appreciation of cybersecurity concepts for our participants with little to no technical background can be challenging. Gamification methods such as capture the flag competition style is a popular form of cybersecurity education to help participants overcome this challenge and identify talents. Participants get to apply theoretical concepts in a controlled environment, solve hands-on tasks in an informal, game-like setting and gain hands-on active learning …


A Billion-Dollar Flight Ticket: The Race For Recreational Space Exploration And Experiences, Emma Rekate Jan 2022

A Billion-Dollar Flight Ticket: The Race For Recreational Space Exploration And Experiences, Emma Rekate

The Synapse: Intercollegiate science magazine

No abstract provided.


The Synapse 31 Jan 2022

The Synapse 31

The Synapse: Intercollegiate science magazine

No abstract provided.


Human-Animal Communication: Insights Into Interspecies Interactions, My Trinh Jan 2022

Human-Animal Communication: Insights Into Interspecies Interactions, My Trinh

The Synapse: Intercollegiate science magazine

No abstract provided.


Water, Water Everywhere, But Not A Drop To Drink: A Brief Look At The Water Crisis In Flint, Michigan, Jewels Watts Jan 2022

Water, Water Everywhere, But Not A Drop To Drink: A Brief Look At The Water Crisis In Flint, Michigan, Jewels Watts

The Synapse: Intercollegiate science magazine

No abstract provided.


Evaluating Essential Processes And Forecast Requirements For Meteotsunami-Induced Coastal Flooding, Chenfu Huang, Eric Anderson, Yi Liu, Gangfeng Ma, Greg Mann, Pengfei Xue Jan 2022

Evaluating Essential Processes And Forecast Requirements For Meteotsunami-Induced Coastal Flooding, Chenfu Huang, Eric Anderson, Yi Liu, Gangfeng Ma, Greg Mann, Pengfei Xue

Civil & Environmental Engineering Faculty Publications

Meteotsunamis pose a unique threat to coastal communities and often lead to damage of coastal infrastructure, deluge of nearby property, and loss of life and injury. The Great Lakes are a known hot-spot of meteotsunami activity and serve as an important region for investigation of essential hydrodynamic processes and model forecast requirements in meteotsunami-induced coastal flooding. For this work, we developed an advanced hydrodynamic model and evaluate key model attributes and dynamic processes, including: (1) coastal model grid resolution and wetting and drying process in low-lying zones, (2) coastal infrastructure, including breakwaters and associated submerging and overtopping processes, (3) annual/seasonal …


Editorial: Coastal Flooding: Modeling, Monitoring, And Protection Systems, Valentina Prigiobbe, Clint Dawson, Yao Hu, Hatim O. Sharif, Navid Tahvildari Jan 2022

Editorial: Coastal Flooding: Modeling, Monitoring, And Protection Systems, Valentina Prigiobbe, Clint Dawson, Yao Hu, Hatim O. Sharif, Navid Tahvildari

Civil & Environmental Engineering Faculty Publications

Coastal flooding has received significant attention in recent years due to future sea-level rise (SLR) projections and intensification of precipitation, which will exacerbate frequent flooding, coastal erosion, and eventually create permanently inundated low-elevation land. Coastal governments will be forced to implement measures to manage risk on the population and infrastructure and build protection systems to mitigate or adapt to the negative impacts of flooding. Research in this area is required to establish holistic frameworks for timely and accurate flooding forecast and design of protection systems.


Deeppose: Detecting Gps Spoofing Attack Via Deep Recurrent Neural Network, Peng Jiang, Hongyi Wu, Chunsheng Xin Jan 2022

Deeppose: Detecting Gps Spoofing Attack Via Deep Recurrent Neural Network, Peng Jiang, Hongyi Wu, Chunsheng Xin

Electrical & Computer Engineering Faculty Publications

The Global Positioning System (GPS) has become a foundation for most location-based services and navigation systems, such as autonomous vehicles, drones, ships, and wearable devices. However, it is a challenge to verify if the reported geographic locations are valid due to various GPS spoofing tools. Pervasive tools, such as Fake GPS, Lockito, and software-defined radio, enable ordinary users to hijack and report fake GPS coordinates and cheat the monitoring server without being detected. Furthermore, it is also a challenge to get accurate sensor readings on mobile devices because of the high noise level introduced by commercial motion sensors. To this …


Deep Learning Based Superconducting Radio-Frequency Cavity Fault Classification At Jefferson Laboratory, Lasitha Vidyaratne, Adam Carpenter, Tom Powers, Chris Tennant, Khan M. Iftekharuddin, Md. Monibor Rahman, Anna S. Shabalina Jan 2022

Deep Learning Based Superconducting Radio-Frequency Cavity Fault Classification At Jefferson Laboratory, Lasitha Vidyaratne, Adam Carpenter, Tom Powers, Chris Tennant, Khan M. Iftekharuddin, Md. Monibor Rahman, Anna S. Shabalina

Electrical & Computer Engineering Faculty Publications

This work investigates the efficacy of deep learning (DL) for classifying C100 superconducting radio-frequency (SRF) cavity faults in the Continuous Electron Beam Accelerator Facility (CEBAF) at Jefferson Lab. CEBAF is a large, high-power continuous wave recirculating linac that utilizes 418 SRF cavities to accelerate electrons up to 12 GeV. Recent upgrades to CEBAF include installation of 11 new cryomodules (88 cavities) equipped with a low-level RF system that records RF time-series data from each cavity at the onset of an RF failure. Typically, subject matter experts (SME) analyze this data to determine the fault type and identify the cavity of …