Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Earth Sciences (6472)
- Geology (5124)
- Computer Sciences (3534)
- Environmental Sciences (2943)
- Engineering (2373)
-
- Life Sciences (2202)
- Chemistry (1631)
- Mathematics (1438)
- Physics (1330)
- Oceanography and Atmospheric Sciences and Meteorology (999)
- Social and Behavioral Sciences (964)
- Artificial Intelligence and Robotics (951)
- Sustainability (905)
- Natural Resources and Conservation (800)
- Medicine and Health Sciences (771)
- Computer Engineering (703)
- Environmental Monitoring (655)
- Environmental Indicators and Impact Assessment (653)
- Oil, Gas, and Energy (631)
- Statistics and Probability (582)
- Mining Engineering (537)
- Marine Biology (507)
- Plant Sciences (499)
- Mechanical Engineering (480)
- Soil Science (474)
- Natural Resources Management and Policy (454)
- Electrical and Computer Engineering (449)
- Education (445)
- Ecology and Evolutionary Biology (427)
- Institution
-
- Western Michigan University (4768)
- University of Kentucky (739)
- TÜBİTAK (620)
- University of Nebraska - Lincoln (618)
- Singapore Management University (527)
-
- Western Washington University (400)
- Old Dominion University (384)
- William & Mary (288)
- China Simulation Federation (281)
- China Coal Technology and Engineering Group (CCTEG) (252)
- University of Texas Rio Grande Valley (234)
- Montana Tech Library (233)
- Chulalongkorn University (224)
- Utah State University (223)
- Missouri University of Science and Technology (220)
- University of Texas at El Paso (209)
- City University of New York (CUNY) (206)
- Portland State University (185)
- University of South Carolina (181)
- Western University (181)
- University of Tennessee, Knoxville (174)
- Kennesaw State University (172)
- University of South Florida (157)
- University of Arkansas, Fayetteville (150)
- Virginia Commonwealth University (138)
- Louisiana State University (134)
- MBZUAI (134)
- Technological University Dublin (132)
- Air Force Institute of Technology (131)
- Boise State University (129)
- Keyword
-
- Gas (249)
- And Energy; Structural Materials; Sustainability (248)
- Energy Systems; Environmental Indicators and Impact Assessment; Environmental Monitoring; Mining Engineering; Oil (248)
- Machine learning (243)
- Deep learning (167)
-
- Coastal Hydrodynamics and Sediment Dynamics (CHSD) (133)
- Sediment transport (133)
- CTD (131)
- Technical Reports (129)
- UTEP Computer Science Department (129)
- Machine Learning (122)
- Climate change (121)
- LISST (120)
- COVID-19 (115)
- Artificial intelligence (99)
- Sustainability (94)
- Temperature (85)
- Mathematics (83)
- Deep Learning (73)
- Conductivity (69)
- ADV (66)
- X-ray images (66)
- Grain size distribution (65)
- Gust erodibility (65)
- Gust microcosm (65)
- Organic content (65)
- Percent moisture (65)
- Sediment erosion (65)
- Sediment structure (65)
- X-radiograph (65)
- Publication
-
- Thin Sections (3589)
- Legacy Color Lithology Strip Logs (1152)
- Theses and Dissertations (501)
- Research Collection School Of Computing and Information Systems (476)
- IGC Proceedings (1993-2023) (359)
-
- Journal of System Simulation (281)
- Salish Sea Ecosystem Conference (278)
- Coal Geology & Exploration (252)
- World of Coal Ash Proceedings (248)
- Electronic Theses and Dissertations (243)
- Turkish Journal of Mathematics (228)
- Silver Bow Creek/Butte Area Superfund Site (227)
- Chulalongkorn University Theses and Dissertations (Chula ETD) (224)
- Faculty Publications (205)
- Turkish Journal of Chemistry (172)
- Turkish Journal of Electrical Engineering and Computer Sciences (166)
- Data (150)
- Departmental Technical Reports (CS) (129)
- School of Natural Resources: Faculty Publications (129)
- Journal of Marine Science and Technology (125)
- All Works (124)
- USF Tampa Graduate Theses and Dissertations (112)
- Honors Theses (106)
- Doctoral Dissertations (101)
- Electronic Thesis and Dissertation Repository (98)
- Articles (96)
- Publications and Research (96)
- Biology and Medicine Through Mathematics Conference (92)
- Journal of Electrochemistry (91)
- C-Day Computing Showcase (90)
- Publication Type
Articles 16771 - 16800 of 18311
Full-Text Articles in Physical Sciences and Mathematics
Optimized Cancer Detection On Various Magnified Histopathological Colon Imagesbased On Dwt Features And Fcm Clustering, Tina Babu, Tripty Singh, Deepa Gupta, Shahin Hameed
Optimized Cancer Detection On Various Magnified Histopathological Colon Imagesbased On Dwt Features And Fcm Clustering, Tina Babu, Tripty Singh, Deepa Gupta, Shahin Hameed
Turkish Journal of Electrical Engineering and Computer Sciences
Due to the morphological characteristics and other biological aspects in histopathological images, the computerized diagnosis of colon cancer in histopathology images has gained popularity. The images acquired using the histopathology microscope may differ for greater visibility by magnifications. This causes a change in morphological traits leading to intra and inter-observer variability. An automatic colon cancer diagnosis system for various magnification is therefore crucial. This work proposes a magnification independent segmentation approach based on the connected component area and double density dual tree DWT (discrete wavelet transform) coefficients are derived from the segmented region. The derived features are reduced further shortened …
Temporal Bagging: A New Method For Time-Based Ensemble Learning, Göksu Tüysüzoğlu, Derya Bi̇rant, Volkan Kiranoğlu
Temporal Bagging: A New Method For Time-Based Ensemble Learning, Göksu Tüysüzoğlu, Derya Bi̇rant, Volkan Kiranoğlu
Turkish Journal of Electrical Engineering and Computer Sciences
One of the main problems associated with the bagging technique in ensemble learning is its random sample selection in which all samples are treated with the same chance of being selected. However, in time-varying dynamic systems, the samples in the training set have not equal importance, where the recent samples contain more useful and accurate information than the former ones. To overcome this problem, this paper proposes a new time-based ensemble learning method, called temporal bagging (T-Bagging). The significant advantage of our method is that it assigns larger weights to more recent samples with respect to older ones, so it …
The Online Ordering Behaviors Among Participants In The Oklahoma Women, Infants, And Children Program: A Cross-Sectional Analysis, Qi Zhang, Kayoung Park, Junzhou Zhang, Chuanyi Tang
The Online Ordering Behaviors Among Participants In The Oklahoma Women, Infants, And Children Program: A Cross-Sectional Analysis, Qi Zhang, Kayoung Park, Junzhou Zhang, Chuanyi Tang
Community & Environmental Health Faculty Publications
The Special Supplemental Nutrition Program for Women, Infants, and Children (WIC) is a nutrition assistance program in the United States (U.S.). Participants in the program redeem their prescribed food benefits in WIC-authorized grocery stores. Online ordering is an innovative method being pilot-tested in some stores to facilitate WIC participants' food benefit redemption, which has become especially important in the COVID-19 pandemic. The present research aimed to examine the online ordering (OO) behaviors among 726 WIC households who adopted WIC OO in a grocery chain, XYZ (anonymous) store, in Oklahoma (OK). These households represented approximately 5% of WIC households who redeemed …
Predictive Models In Software Engineering: Challenges And Opportunities, Yanming Yang, Xin Xia, David Lo, Tingting Bi, John C. Grundy, Xiaohu Yang
Predictive Models In Software Engineering: Challenges And Opportunities, Yanming Yang, Xin Xia, David Lo, Tingting Bi, John C. Grundy, Xiaohu Yang
Research Collection School Of Computing and Information Systems
Predictive models are one of the most important techniques that are widely applied in many areas of software engineering. There have been a large number of primary studies that apply predictive models and that present well-performed studies in various research domains, including software requirements, software design and development, testing and debugging, and software maintenance. This article is a first attempt to systematically organize knowledge in this area by surveying a body of 421 papers on predictive models published between 2009 and 2020. We describe the key models and approaches used, classify the different models, summarize the range of key application …
Orchestration Or Automation: Authentication Flaw Detection In Android Apps, Siqi Ma, Juanru Li, Surya Nepal, Diethelm Ostry, David Lo, Sanjay K. Jha, Robert H. Deng, Elisa Bertino
Orchestration Or Automation: Authentication Flaw Detection In Android Apps, Siqi Ma, Juanru Li, Surya Nepal, Diethelm Ostry, David Lo, Sanjay K. Jha, Robert H. Deng, Elisa Bertino
Research Collection School Of Computing and Information Systems
Passwords are pervasively used to authenticate users' identities in mobile apps. To secure passwords against attacks, protection is applied to the password authentication protocol (PAP). The implementation of the protection scheme becomes an important factor in protecting PAP against attacks. We focus on two basic protection in Android, i.e., SSL/TLS-based PAP and timestamp-based PAP. Previously, we proposed an automated tool, GLACIATE, to detect authentication flaws. We were curious whether orchestration (i.e., involving manual-effort) works better than automation. To answer this question, we propose an orchestrated approach, AUTHEXPLOIT and compare its effectiveness GLACIATE. We study requirements for correct implementation of PAP …
Correlating Automated And Human Evaluation Of Code Documentation Generation Quality, Xing Hu, Qiuyuan Chen, Haoye Wang, Xin Xia, David Lo, Thomas Zimmermann
Correlating Automated And Human Evaluation Of Code Documentation Generation Quality, Xing Hu, Qiuyuan Chen, Haoye Wang, Xin Xia, David Lo, Thomas Zimmermann
Research Collection School Of Computing and Information Systems
Automatic code documentation generation has been a crucial task in the field of software engineering. It not only relieves developers from writing code documentation but also helps them to understand programs better. Specifically, deep-learning-based techniques that leverage large-scale source code corpora have been widely used in code documentation generation. These works tend to use automatic metrics (such as BLEU, METEOR, ROUGE, CIDEr, and SPICE) to evaluate different models. These metrics compare generated documentation to reference texts by measuring the overlapping words. Unfortunately, there is no evidence demonstrating the correlation between these metrics and human judgment. We conduct experiments on two …
Toward Video-Conferencing Tools For Hands-On Activities In Online Teaching, Audrey Labrie, Terrance Mok, Anthony Tang, Michelle Lui, Lora Oehlberg, Lev Poretski
Toward Video-Conferencing Tools For Hands-On Activities In Online Teaching, Audrey Labrie, Terrance Mok, Anthony Tang, Michelle Lui, Lora Oehlberg, Lev Poretski
Research Collection School Of Computing and Information Systems
Many instructors in computing and HCI disciplines use hands-on activities for teaching and training new skills. Beyond simply teaching hands-on skills like sketching and programming, instructors also use these activities so students can acquire tacit skills. Yet, current video-conferencing technologies may not effectively support hands-on activities in online teaching contexts. To develop an understanding of the inadequacies of current video-conferencing technologies for hands-on activities, we conducted 15 interviews with university-level instructors who had quickly pivoted their use of hands-on activities to an online context during the early part of the COVID-19 pandemic. Based on our analysis, we uncovered four pedagogical …
Partnering For Value Perfection And Business Sustainability In The Cloud Services Brokerage Market, Richard Shang, Robert John Kauffman
Partnering For Value Perfection And Business Sustainability In The Cloud Services Brokerage Market, Richard Shang, Robert John Kauffman
Research Collection School Of Computing and Information Systems
The cloud computing and services market has advanced in the past ten years. They now include most IT services from fundamental computing to cutting-edge AI capabilities. With the widespread adoption of cloud services, clients are facing the fact that they are utilizing cloud resources at a sub-optimal level. Cloud services brokers (CSBs) grew from the market to fill the needs for cloud resource management and risk mitigation. Based on analysis of the cloud market and the case of cloud services brokerage and related activities in North America, we offer theoretical analysis for how value creation works, its impacts on the …
An Exploratory Study On The Repeatedly Shared External Links On Stack Overflow, Jiakun Liu, Haoxiang Zhang, Xin Xia, David Lo, Ying Zou, Ahmed E. Hassan, Shanping Li
An Exploratory Study On The Repeatedly Shared External Links On Stack Overflow, Jiakun Liu, Haoxiang Zhang, Xin Xia, David Lo, Ying Zou, Ahmed E. Hassan, Shanping Li
Research Collection School Of Computing and Information Systems
On Stack Overflow, users reuse 11,926,354 external links to share the resources hosted outside the Stack Overflow website. The external links connect to the existing programming-related knowledge and extend the crowdsourced knowledge on Stack Overflow. Some of the external links, so-called as repeated external links, can be shared for multiple times. We observe that 82.5% of the link sharing activities (i.e., sharing links in any question, answer, or comment) on Stack Overflow share external resources, and 57.0% of the occurrences of the external links are sharing the repeated external links. However, it is still unclear what types of external resources …
Authenticated Data Redaction With Accountability And Transparency, Jinhua Ma, Xinyi Huang, Yi Mu, Robert H. Deng
Authenticated Data Redaction With Accountability And Transparency, Jinhua Ma, Xinyi Huang, Yi Mu, Robert H. Deng
Research Collection School Of Computing and Information Systems
A common practice in data redaction is removing sensitive information prior to data publication or release. In data-driven applications, one must be convinced that the redacted data is still trustworthy. Meanwhile, the data redactor must be held accountable for (malicious) redaction, which could change/hide the meaning of the original data. Motivated by these concerns, we present a novel solution for authenticated data redaction based on a new Redactable Signature Scheme with Implicit Accountability (RSS - IA). In the event of a dispute, not only the original data signer but also the redactor can generate an evidence tag to unequivocally identify …
Defining Smart Contract Defects On Ethereum, Jiachi Chen, Xin Xia, David Lo, John Grundy, Xiapu Luo, Ting Chen
Defining Smart Contract Defects On Ethereum, Jiachi Chen, Xin Xia, David Lo, John Grundy, Xiapu Luo, Ting Chen
Research Collection School Of Computing and Information Systems
Smart contracts are programs running on a blockchain. They are immutable to change, and hence can not be patched for bugs once deployed. Thus it is critical to ensure they are bug-free and well-designed before deployment. A Contract defect is an error, flaw or fault in a smart contract that causes it to produce an incorrect or unexpected result, or to behave in unintended ways. The detection of contract defects is a method to avoid potential bugs and improve the design of existing code. Since smart contracts contain numerous distinctive features, such as the gas system. decentralized, it is important …
Perceptions And Needs Of Artificial Intelligence In Health Care To Increase Adoption: Scoping Review, Han Shi Jocelyn Chew, Palakorn Achananuparp
Perceptions And Needs Of Artificial Intelligence In Health Care To Increase Adoption: Scoping Review, Han Shi Jocelyn Chew, Palakorn Achananuparp
Research Collection School Of Computing and Information Systems
Background: Artificial intelligence (AI) has the potential to improve the efficiency and effectiveness of health care service delivery. However, the perceptions and needs of such systems remain elusive, hindering efforts to promote AI adoption in health care. Objective: This study aims to provide an overview of the perceptions and needs of AI to increase its adoption in health care. Methods: A systematic scoping review was conducted according to the 5-stage framework by Arksey and O’Malley. Articles that described the perceptions and needs of AI in health care were searched across nine databases: ACM Library, CINAHL, Cochrane Central, Embase, IEEE Xplore, …
Enjoy Your Observability: An Industrial Survey Of Microservice Tracing And Analysis, Bowen Li, Xin Peng, Qilin Xiang, Hanzhang Wang, Tao Xie, Jun Sun, Xuanzhe Liu
Enjoy Your Observability: An Industrial Survey Of Microservice Tracing And Analysis, Bowen Li, Xin Peng, Qilin Xiang, Hanzhang Wang, Tao Xie, Jun Sun, Xuanzhe Liu
Research Collection School Of Computing and Information Systems
Microservice systems are often deployed in complex cloud-based environments and may involve a large number of service instances being dynamically created and destroyed. It is thus essential to ensure observability to understand these microservice systems’ behaviors and troubleshoot their problems. As an important means to achieve the observability, distributed tracing and analysis is known to be challenging. While many companies have started implementing distributed tracing and analysis for microservice systems, it is not clear whether existing approaches fulfill the required observability. In this article, we present our industrial survey on microservice tracing and analysis through interviewing developers and operation engineers …
A Quantum Interpretation Of Separating Conjunction For Local Reasoning Of Quantum Programs Based On Separation Logic, Xuan Bach Le, Shang-Wei Lin, Jun Sun, David Sanan
A Quantum Interpretation Of Separating Conjunction For Local Reasoning Of Quantum Programs Based On Separation Logic, Xuan Bach Le, Shang-Wei Lin, Jun Sun, David Sanan
Research Collection School Of Computing and Information Systems
It is well-known that quantum programs are not only complicated to design but also challenging to verify because the quantum states can have exponential size and require sophisticated mathematics to encode and manipulate. To tackle the state-space explosion problem for quantum reasoning, we propose a Hoare-style inference framework that supports local reasoning for quantum programs. By providing a quantum interpretation of the separating conjunction, we are able to infuse separation logic into our framework and apply local reasoning using a quantum frame rule that is similar to the classical frame rule. For evaluation, we apply our framework to verify various …
Approximate K-Nn Graph Construction: A Generic Online Approach, Wan-Lei Zhao, Hui Wang, Chong-Wah Ngo
Approximate K-Nn Graph Construction: A Generic Online Approach, Wan-Lei Zhao, Hui Wang, Chong-Wah Ngo
Research Collection School Of Computing and Information Systems
Nearest neighbor search and k-nearest neighbor graph construction are two fundamental issues that arise from many disciplines such as multimedia information retrieval, data-mining, and machine learning. They become more and more imminent given the big data emerge in various fields in recent years. In this paper, a simple but effective solution both for approximate k-nearest neighbor search and approximate k-nearest neighbor graph construction is presented. These two issues are addressed jointly in our solution. On one hand, the approximate k-nearest neighbor graph construction is treated as a search task. Each sample along with its k-nearest neighbors is joined into the …
Learning From Web Recipe-Image Pairs For Food Recognition: Problem, Baselines And Performance, Bin Zhu, Chong-Wah Ngo, Wing-Kwong Chan
Learning From Web Recipe-Image Pairs For Food Recognition: Problem, Baselines And Performance, Bin Zhu, Chong-Wah Ngo, Wing-Kwong Chan
Research Collection School Of Computing and Information Systems
Cross-modal recipe retrieval has recently been explored for food recognition and understanding. Text-rich recipe provides not only visual content information (e.g., ingredients, dish presentation) but also procedure of food preparation (cutting and cooking styles). The paired data is leveraged to train deep models to retrieve recipes for food images. Most recipes on the Web include sample pictures as the references. The paired multimedia data is not noise-free, due to errors such as pairing of images containing partially prepared dishes with recipes. The content of recipes and food images are not always consistent due to free-style writing and preparation of food …
Lightweight And Expressive Fine-Grained Access Control For Healthcare Internet-Of-Things, Shengmin Xu, Yingjiu Li, Robert H. Deng, Yinghui Zhang, Xiangyang Luo, Ximeng Liu
Lightweight And Expressive Fine-Grained Access Control For Healthcare Internet-Of-Things, Shengmin Xu, Yingjiu Li, Robert H. Deng, Yinghui Zhang, Xiangyang Luo, Ximeng Liu
Research Collection School Of Computing and Information Systems
Healthcare Internet-of-Things (IoT) is an emerging paradigm that enables embedded devices to monitor patients vital signals and allows these data to be aggregated and outsourced to the cloud. The cloud enables authorized users to store and share data to enjoy on-demand services. Nevertheless, it also causes many security concerns because of the untrusted network environment, dishonest cloud service providers and resource-limited devices. To preserve patients' privacy, existing solutions usually apply cryptographic tools to offer access controls. However, fine-grained access control among authorized users is still a challenge, especially for lightweight and resource-limited end-devices. In this paper, we propose a novel …
A Blockchain-Based Self-Tallying Voting Protocol In Decentralized Iot, Yannan Li, Willy Susilo, Guomin Yang, Yong Yu, Dongxi Liu, Xiaojiang Du, Mohsen Guizani
A Blockchain-Based Self-Tallying Voting Protocol In Decentralized Iot, Yannan Li, Willy Susilo, Guomin Yang, Yong Yu, Dongxi Liu, Xiaojiang Du, Mohsen Guizani
Research Collection School Of Computing and Information Systems
The Internet of Things (IoT) is experiencing explosive growth and has gained extensive attention from academia and industry in recent years. However, most of the existing IoT infrastructures are centralized, which may cause the issues of unscalability and single-point-of-failure. Consequently, decentralized IoT has been proposed by taking advantage of the emerging technology called blockchain. Voting systems are widely adopted in IoT, for example a leader election in wireless sensor networks. Self-tallying voting systems are alternatives to unsuitable, traditional centralized voting systems in decentralized IoT. Unfortunately, self-tallying voting systems inherently suffer from fairness issues, such as adaptive and abortive issues caused …
Delta Debugging Microservice Systems With Parallel Optimization, Xiang Zhou, Xin Peng, Tao Xie, Jun Sun, Chao Ji, Wenha Li, Dan Ding
Delta Debugging Microservice Systems With Parallel Optimization, Xiang Zhou, Xin Peng, Tao Xie, Jun Sun, Chao Ji, Wenha Li, Dan Ding
Research Collection School Of Computing and Information Systems
Microservice systems are complicated due to their runtime environments and service communications. Debugging a failure involves the deployment and manipulation of microservice systems on a containerized environment and faces unique challenges due to the high complexity and dynamism of microservices. To address these challenges, we propose a debugging approach for microservice systems based on the delta debugging algorithm, which is to minimize failure-inducing deltas of circumstances (e.g., deployment, environmental configurations). Our approach includes novel techniques for defining, deploying/manipulating, and executing deltas during delta debugging. In particular, to construct a (failing) circumstance space for delta debugging to minimize, our approach defines …
Cross-Modal Food Retrieval: Learning A Joint Embedding Of Food Images And Recipes With Semantic Consistency And Attention Mechanism, Hao Wang, Doyen Sahoo, Chenghao Liu, Ke Shu, Palakorn Achananuparp, Ee-Peng Lim, Steven C. H. Hoi
Cross-Modal Food Retrieval: Learning A Joint Embedding Of Food Images And Recipes With Semantic Consistency And Attention Mechanism, Hao Wang, Doyen Sahoo, Chenghao Liu, Ke Shu, Palakorn Achananuparp, Ee-Peng Lim, Steven C. H. Hoi
Research Collection School Of Computing and Information Systems
Food retrieval is an important task to perform analysis of food-related information, where we are interested in retrieving relevant information about the queried food item such as ingredients, cooking instructions, etc. In this paper, we investigate cross-modal retrieval between food images and cooking recipes. The goal is to learn an embedding of images and recipes in a common feature space, such that the corresponding image-recipe embeddings lie close to one another. Two major challenges in addressing this problem are 1) large intra-variance and small inter-variance across cross-modal food data; and 2) difficulties in obtaining discriminative recipe representations. To address these …
"More Than Deep Learning": Post-Processing For Api Sequence Recommendation, Chi Chen, Xin Peng, Bihuan Chen, Jun Sun, Zhenchang Xing, Xin Wang, Wenyun Zhao
"More Than Deep Learning": Post-Processing For Api Sequence Recommendation, Chi Chen, Xin Peng, Bihuan Chen, Jun Sun, Zhenchang Xing, Xin Wang, Wenyun Zhao
Research Collection School Of Computing and Information Systems
In the daily development process, developers often need assistance in finding a sequence of APIs to accomplish their development tasks. Existing deep learning models, which have recently been developed for recommending one single API, can be adapted by using encoder-decoder models together with beam search to generate API sequence recommendations. However, the generated API sequence recommendations heavily rely on the probabilities of API suggestions at each decoding step, which do not take into account other domain-specific factors (e.g., whether an API suggestion satisfies the program syntax and how diverse the API sequence recommendations are). Moreover, it is difficult for developers …
Lessons Learnt Conducting Capture The Flag Cybersecurity Competition During Covid-19, Kee Hock Tan, Eng Lieh Ouh
Lessons Learnt Conducting Capture The Flag Cybersecurity Competition During Covid-19, Kee Hock Tan, Eng Lieh Ouh
Research Collection School Of Computing and Information Systems
This innovative practice full paper describes our experiences conducting cybersecurity capture the flag (CTF) competition for cybersecurity enthusiast participants (inclusive of both tertiary students and working professionals) local and abroad during the COVID-19 pandemic. Learning and appreciation of cybersecurity concepts for our participants with little to no technical background can be challenging. Gamification methods such as capture the flag competition style is a popular form of cybersecurity education to help participants overcome this challenge and identify talents. Participants get to apply theoretical concepts in a controlled environment, solve hands-on tasks in an informal, game-like setting and gain hands-on active learning …
A Billion-Dollar Flight Ticket: The Race For Recreational Space Exploration And Experiences, Emma Rekate
A Billion-Dollar Flight Ticket: The Race For Recreational Space Exploration And Experiences, Emma Rekate
The Synapse: Intercollegiate science magazine
No abstract provided.
Human-Animal Communication: Insights Into Interspecies Interactions, My Trinh
Human-Animal Communication: Insights Into Interspecies Interactions, My Trinh
The Synapse: Intercollegiate science magazine
No abstract provided.
Water, Water Everywhere, But Not A Drop To Drink: A Brief Look At The Water Crisis In Flint, Michigan, Jewels Watts
Water, Water Everywhere, But Not A Drop To Drink: A Brief Look At The Water Crisis In Flint, Michigan, Jewels Watts
The Synapse: Intercollegiate science magazine
No abstract provided.
Evaluating Essential Processes And Forecast Requirements For Meteotsunami-Induced Coastal Flooding, Chenfu Huang, Eric Anderson, Yi Liu, Gangfeng Ma, Greg Mann, Pengfei Xue
Evaluating Essential Processes And Forecast Requirements For Meteotsunami-Induced Coastal Flooding, Chenfu Huang, Eric Anderson, Yi Liu, Gangfeng Ma, Greg Mann, Pengfei Xue
Civil & Environmental Engineering Faculty Publications
Meteotsunamis pose a unique threat to coastal communities and often lead to damage of coastal infrastructure, deluge of nearby property, and loss of life and injury. The Great Lakes are a known hot-spot of meteotsunami activity and serve as an important region for investigation of essential hydrodynamic processes and model forecast requirements in meteotsunami-induced coastal flooding. For this work, we developed an advanced hydrodynamic model and evaluate key model attributes and dynamic processes, including: (1) coastal model grid resolution and wetting and drying process in low-lying zones, (2) coastal infrastructure, including breakwaters and associated submerging and overtopping processes, (3) annual/seasonal …
Editorial: Coastal Flooding: Modeling, Monitoring, And Protection Systems, Valentina Prigiobbe, Clint Dawson, Yao Hu, Hatim O. Sharif, Navid Tahvildari
Editorial: Coastal Flooding: Modeling, Monitoring, And Protection Systems, Valentina Prigiobbe, Clint Dawson, Yao Hu, Hatim O. Sharif, Navid Tahvildari
Civil & Environmental Engineering Faculty Publications
Coastal flooding has received significant attention in recent years due to future sea-level rise (SLR) projections and intensification of precipitation, which will exacerbate frequent flooding, coastal erosion, and eventually create permanently inundated low-elevation land. Coastal governments will be forced to implement measures to manage risk on the population and infrastructure and build protection systems to mitigate or adapt to the negative impacts of flooding. Research in this area is required to establish holistic frameworks for timely and accurate flooding forecast and design of protection systems.
Deeppose: Detecting Gps Spoofing Attack Via Deep Recurrent Neural Network, Peng Jiang, Hongyi Wu, Chunsheng Xin
Deeppose: Detecting Gps Spoofing Attack Via Deep Recurrent Neural Network, Peng Jiang, Hongyi Wu, Chunsheng Xin
Electrical & Computer Engineering Faculty Publications
The Global Positioning System (GPS) has become a foundation for most location-based services and navigation systems, such as autonomous vehicles, drones, ships, and wearable devices. However, it is a challenge to verify if the reported geographic locations are valid due to various GPS spoofing tools. Pervasive tools, such as Fake GPS, Lockito, and software-defined radio, enable ordinary users to hijack and report fake GPS coordinates and cheat the monitoring server without being detected. Furthermore, it is also a challenge to get accurate sensor readings on mobile devices because of the high noise level introduced by commercial motion sensors. To this …
Deep Learning Based Superconducting Radio-Frequency Cavity Fault Classification At Jefferson Laboratory, Lasitha Vidyaratne, Adam Carpenter, Tom Powers, Chris Tennant, Khan M. Iftekharuddin, Md. Monibor Rahman, Anna S. Shabalina
Deep Learning Based Superconducting Radio-Frequency Cavity Fault Classification At Jefferson Laboratory, Lasitha Vidyaratne, Adam Carpenter, Tom Powers, Chris Tennant, Khan M. Iftekharuddin, Md. Monibor Rahman, Anna S. Shabalina
Electrical & Computer Engineering Faculty Publications
This work investigates the efficacy of deep learning (DL) for classifying C100 superconducting radio-frequency (SRF) cavity faults in the Continuous Electron Beam Accelerator Facility (CEBAF) at Jefferson Lab. CEBAF is a large, high-power continuous wave recirculating linac that utilizes 418 SRF cavities to accelerate electrons up to 12 GeV. Recent upgrades to CEBAF include installation of 11 new cryomodules (88 cavities) equipped with a low-level RF system that records RF time-series data from each cavity at the onset of an RF failure. Typically, subject matter experts (SME) analyze this data to determine the fault type and identify the cavity of …