Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Computer Sciences (3187)
- Life Sciences (2880)
- Earth Sciences (2682)
- Environmental Sciences (2344)
- Engineering (1803)
-
- Plant Sciences (1550)
- Soil Science (1533)
- Agronomy and Crop Sciences (1471)
- Plant Biology (1464)
- Agricultural Science (1458)
- Weed Science (1448)
- Plant Pathology (1444)
- Chemistry (1264)
- Mathematics (1172)
- Physics (1131)
- Social and Behavioral Sciences (1028)
- Artificial Intelligence and Robotics (965)
- Medicine and Health Sciences (768)
- Sustainability (669)
- Oceanography and Atmospheric Sciences and Meteorology (561)
- Statistics and Probability (557)
- Education (519)
- Computer Engineering (488)
- Natural Resources and Conservation (482)
- Environmental Monitoring (448)
- Natural Resources Management and Policy (424)
- Environmental Indicators and Impact Assessment (415)
- Arts and Humanities (405)
- Business (388)
- Institution
-
- University of Kentucky (1537)
- University of Nebraska - Lincoln (641)
- Singapore Management University (583)
- TÜBİTAK (404)
- Old Dominion University (371)
-
- Montana Tech Library (258)
- China Coal Technology and Engineering Group (CCTEG) (254)
- University of Texas Rio Grande Valley (254)
- Utah State University (226)
- China Simulation Federation (223)
- Missouri University of Science and Technology (178)
- University of Arkansas, Fayetteville (163)
- University of Texas at El Paso (160)
- Technological University Dublin (143)
- Western University (142)
- Edith Cowan University (141)
- Kennesaw State University (135)
- City University of New York (CUNY) (120)
- Portland State University (120)
- Western Washington University (120)
- Claremont Colleges (119)
- MBZUAI (115)
- Clemson University (110)
- Michigan Technological University (110)
- University of New Mexico (110)
- Air Force Institute of Technology (107)
- East Tennessee State University (101)
- University of South Florida (101)
- Chinese Academy of Sciences (100)
- Illinois State University (100)
- Keyword
-
- Machine learning (249)
- Deep learning (163)
- Machine Learning (142)
- Climate change (138)
- Artificial intelligence (125)
-
- Sustainability (71)
- Priority Soils (70)
- Technical Reports (70)
- UTEP Computer Science Department (70)
- Deep Learning (69)
- Grazing (66)
- Weather (60)
- Artificial Intelligence (59)
- Metals Abatement (59)
- Cybersecurity (57)
- COVID-19 (56)
- Simulation (53)
- Drought summary (52)
- Droughts (52)
- Physics (52)
- Tennessee Climate Office (52)
- Biodiversity (51)
- Classification (50)
- Climate (46)
- Chemistry (45)
- Internship (45)
- Mathematics (45)
- Optimization (45)
- Education (43)
- Natural language processing (43)
- Publication
-
- IGC Proceedings (1993-2023) (1442)
- Research Collection School Of Computing and Information Systems (527)
- Theses and Dissertations (434)
- Silver Bow Creek/Butte Area Superfund Site (256)
- Coal Geology & Exploration (254)
-
- Electronic Theses and Dissertations (244)
- Journal of System Simulation (223)
- Turkish Journal of Mathematics (134)
- Research outputs 2022 to 2026 (130)
- Turkish Journal of Chemistry (118)
- United States Department of Agriculture Wildlife Services: Staff Publications (102)
- Bulletin of Chinese Academy of Sciences (Chinese Version) (100)
- All Works (98)
- Electronic Thesis and Dissertation Repository (93)
- Open Access Theses & Dissertations (89)
- Annual Symposium on Biomathematics and Ecology Education and Research (86)
- School of Natural Resources: Faculty Publications (84)
- Honors Theses (81)
- Department of Physics and Astronomy: Faculty Publications (79)
- Turkish Journal of Electrical Engineering and Computer Sciences (78)
- USF Tampa Graduate Theses and Dissertations (78)
- School of Mathematical and Statistical Sciences Faculty Publications and Presentations (76)
- Faculty Publications (75)
- Dissertations (73)
- Master's Projects (73)
- Departmental Technical Reports (CS) (70)
- Doctoral Dissertations (69)
- The Synapse: Intercollegiate science magazine (69)
- Articles (68)
- Chulalongkorn University Theses and Dissertations (Chula ETD) (68)
- Publication Type
Articles 12391 - 12420 of 12566
Full-Text Articles in Physical Sciences and Mathematics
Studies On Depth And Torsion In Tensor Products Of Modules, Uyen Huyen Thao Le
Studies On Depth And Torsion In Tensor Products Of Modules, Uyen Huyen Thao Le
Graduate Theses, Dissertations, and Problem Reports
This dissertation represents an in-depth exploration of two distinct yet interconnected research topics within commutative algebra: one centered around a conjecture of Huneke and R. Wiegand and the other concerns a depth inequality of Auslander. It consists of the following three papers as well as the author's work under the direction of Professor Olgur Celikbas:
- Remarks on a conjecture of Huneke and Wiegand and the vanishing of (co)homology, Journal of Mathematical Society of Japan Advance Publication. (joint work with Olgur Celikbas, Hiroki Matsui, and Arash Sadeghi).
- An extension of a depth inequality of Auslander, Taiwanese Journal of Mathematics, …
Improving The Health And Safety Of Manufacturing Workers By Detecting And Addressing Personal Protective Equipment (Ppe) Violations In Real-Time With The Use Of Automated Ppe Detection Technology, Joseph Olufemi Fasinu
Improving The Health And Safety Of Manufacturing Workers By Detecting And Addressing Personal Protective Equipment (Ppe) Violations In Real-Time With The Use Of Automated Ppe Detection Technology, Joseph Olufemi Fasinu
Graduate Theses, Dissertations, and Problem Reports
The Centers for Disease Control and Prevention (CDC) emphasized that Personal Protective Equipment (PPE) can significantly reduce the risk of occupational injuries and illnesses. However, improper use, failure to use, and other PPE-related violations can still result in injuries and fatalities. Eye and face protection violation has been one of the top 10 most frequently violated OSHA standards in fiscal years 2018, 2019, 2020, 2021 and 2022 consecutively. A common practice among safety professionals to ensure PPE compliance has been to physically inspect or monitor PPE usage among workers, which has been found to be unsustainable on a continuous real-time …
Applications Of Digital Filters In Radio Astronomy, Joseph William Kania
Applications Of Digital Filters In Radio Astronomy, Joseph William Kania
Graduate Theses, Dissertations, and Problem Reports
The radio sky spans tens of orders of magnitude in length, density, and time.
In this thesis, using novel filtering techniques and two different telescopes,
we investigate two tracers of cosmic structure: Baryon Acoustic Oscillations
(BAOs) and Fast Radio Bursts (FRBs). BAOs formed as the universe cooled
after the Big Bang. BAOs provide a fiducial length scale of the universe
throughout cosmic time and thus can be used to understand how the universe
is evolving. FRBs are very bright, short timescale, bursts of as-yet unknown
origin which occur uniformly on the sky at a rate of a few thousand per …
Probabilistic Short Term Solar Driver Forecasting With Neural Network Ensembles, Joshua Daniell
Probabilistic Short Term Solar Driver Forecasting With Neural Network Ensembles, Joshua Daniell
Graduate Theses, Dissertations, and Problem Reports
Commonly utilized space weather indices and proxies drive predictive models for thermosphere density, directly impacting objects in low-Earth orbit (LEO) by influencing atmospheric drag forces. A set of solar proxies and indices (drivers), F10.7, S10.7, M10.7, and Y10.7, are created from a mixture of ground based radio observations and satellite instrument data. These solar drivers represent heating in various levels of the thermosphere and are used as inputs by the JB2008 empirical thermosphere density model. The United States Air Force (USAF) operational High Accuracy Satellite Drag Model (HASDM) relies on JB2008, and …
Quantization Dimension For Inhomogeneous Bi-Lipschitz Ifs, Amit Priyadarshi, Mrinal Kanti Roychowdhury, Manuj Verma
Quantization Dimension For Inhomogeneous Bi-Lipschitz Ifs, Amit Priyadarshi, Mrinal Kanti Roychowdhury, Manuj Verma
School of Mathematical and Statistical Sciences Faculty Publications and Presentations
Let ν be a Borel probability measure on a d-dimensional Euclidean space Rd, d≥1, with a compact support, and let (p0,p1,p2,…,pN) be a probability vector with pj>0 for 1≤j≤N. Let {Sj:1≤j≤N} be a set of contractive mappings on Rd. Then, a Borel probability measure μ on Rd such that μ=∑Nj=1pjμ∘S−1j+p0ν is called an inhomogeneous measure, also known as a condensation measure on Rd. For a given r∈(0,+∞), the quantization dimension of order r, if it exists, denoted by Dr(μ), of a Borel probability measure μ on Rd represents the speed at which the nth quantization error of order r …
On The Total Perimeter Of Disjoint Convex Bodies, Arseniy Akopyan, Alexey Glazyrin
On The Total Perimeter Of Disjoint Convex Bodies, Arseniy Akopyan, Alexey Glazyrin
School of Mathematical and Statistical Sciences Faculty Publications and Presentations
In this note we introduce a pseudometric on convex planar curves based on distances between normal lines and show its basic properties. Then we use this pseudometric to give a short proof of the theorem by Pinchasi that the sum of perimeters of k convex planar bodies with disjoint interiors contained in a convex body of perimeter p and diameter d is not greater than p+2(k−1)d.
Oscillating Icebergs, John Adam
Oscillating Icebergs, John Adam
Mathematics & Statistics Faculty Publications
No abstract provided.
Exploding Haystacks: Solutions For Fermi Questions, March 2023, John Adam
Exploding Haystacks: Solutions For Fermi Questions, March 2023, John Adam
Mathematics & Statistics Faculty Publications
No abstract provided.
Exploding Haystacks, John Adam
Exploding Haystacks, John Adam
Mathematics & Statistics Faculty Publications
No abstract provided.
Another Angle On Perspective, John Adam
Another Angle On Perspective, John Adam
Mathematics & Statistics Faculty Publications
No abstract provided.
More Properties Of Optimal Polynomial Approximants In Hardy Spaces, Raymond Cheng, Christopher Felder
More Properties Of Optimal Polynomial Approximants In Hardy Spaces, Raymond Cheng, Christopher Felder
Mathematics & Statistics Faculty Publications
We study optimal polynomial approximants (OPAs) in the classical Hardy spaces on the unit disk, Hp (1 < p < ∞). For fixed f ∈ Hp and n ∈ N, the OPA of degree n associated to f is the polynomial which minimizes the quantity ∥qf −1∥p over all complex polynomials q of degree less than or equal to n. We begin with some examples which illustrate, when p ≠ 2, how the Banach space geometry makes the above minimization problem interesting. We then weave through various results concerning limits and roots of these polynomials, including results which show that OPAs can be witnessed as solutions …
Controls On Thermokarst Lake Water Balances In The Inuvik - Tuktoyaktuk Region, Evan J. Wilcox
Controls On Thermokarst Lake Water Balances In The Inuvik - Tuktoyaktuk Region, Evan J. Wilcox
Theses and Dissertations (Comprehensive)
There are tens of thousands of thermokarst lakes in the Inuvik-Tuktoyaktuk region, located in the northwest corner of the Northwest Territories, Canada. These lakes formed following the last glacial period in areas where ice-rich permafrost thawed and created depressions in the landscape. The Inuvik-Tuktoyaktuk region is one of the fastest warming regions in the world, leading to changing precipitation patterns, permafrost thaw and deciduous shrub expansion, all of which are affecting the water balance of thermokarst lakes. During the past several decades, lake expansion and contraction have been observed in response to fluctuations in precipitation. While these changes in lake …
Opposite Trees, Theo Goossens
Opposite Trees, Theo Goossens
Theses and Dissertations (Comprehensive)
A spanning tree of a graph G is a connected acyclic subgraph of G that includes all of the vertices in G. The degree of a vertex is the number of edges incident to that vertex. Given a spanning tree T of a graph G, an opposite tree of T is a spanning tree of G where the degree of each of its vertices is different from its degree in T. For complete, complete bipartite, and complete multipartite graphs, we give the conditions spanning trees of these graphs must satisfy in order to have an opposite tree.
Ultrasensitive Tapered Optical Fiber Refractive Index, Erem Ujah, Meimei Lai, Gymama Slaughter
Ultrasensitive Tapered Optical Fiber Refractive Index, Erem Ujah, Meimei Lai, Gymama Slaughter
Electrical & Computer Engineering Faculty Publications
Refractive index (RI) sensors are of great interest for label-free optical biosensing. A tapered optical fiber (TOF) RI sensor with micron-sized waist diameters can dramatically enhance sensor sensitivity by reducing the mode volume over a long distance. Here, a simple and fast method is used to fabricate highly sensitive refractive index sensors based on localized surface plasmon resonance (LSPR). Two TOFs (l = 5 mm) with waist diameters of 5 µm and 12 µm demonstrated sensitivity enhancement at λ = 1559 nm for glucose sensing (5-45 wt%) at room temperature. The optical power transmission decreased with increasing glucose concentration due …
The Effect Of The Width Of The Incident Pulse To The Dielectric Transition Layer In The Scattering Of An Electromagnetic Pulse — A Qubit Lattice Algorithm Simulation, George Vahala, Linda Vahala, Abhay K. Ram, Min Soe
The Effect Of The Width Of The Incident Pulse To The Dielectric Transition Layer In The Scattering Of An Electromagnetic Pulse — A Qubit Lattice Algorithm Simulation, George Vahala, Linda Vahala, Abhay K. Ram, Min Soe
Electrical & Computer Engineering Faculty Publications
The effect of the thickness of the dielectric boundary layer that connects a material of refractive index n1 to another of index n2is considered for the propagation of an electromagnetic pulse. A qubit lattice algorithm (QLA), which consists of a specially chosen non-commuting sequence of collision and streaming operators acting on a basis set of qubits, is theoretically determined that recovers the Maxwell equations to second-order in a small parameter ϵ. For very thin boundary layer the scattering properties of the pulse mimics that found from the Fresnel jump conditions for a plane wave - except that …
View Synthesis With Scene Recognition For Cross-View Image Localization, Uddom Lee, Peng Jiang, Hongyi Wu, Chunsheng Xin
View Synthesis With Scene Recognition For Cross-View Image Localization, Uddom Lee, Peng Jiang, Hongyi Wu, Chunsheng Xin
Electrical & Computer Engineering Faculty Publications
Image-based localization has been widely used for autonomous vehicles, robotics, augmented reality, etc., and this is carried out by matching a query image taken from a cell phone or vehicle dashcam to a large scale of geo-tagged reference images, such as satellite/aerial images or Google Street Views. However, the problem remains challenging due to the inconsistency between the query images and the large-scale reference datasets regarding various light and weather conditions. To tackle this issue, this work proposes a novel view synthesis framework equipped with deep generative models, which can merge the unique features from the outdated reference dataset with …
Toward Real-Time, Robust Wearable Sensor Fall Detection Using Deep Learning Methods: A Feasibility Study, Haben Yhdego, Christopher Paolini, Michel Audette
Toward Real-Time, Robust Wearable Sensor Fall Detection Using Deep Learning Methods: A Feasibility Study, Haben Yhdego, Christopher Paolini, Michel Audette
Electrical & Computer Engineering Faculty Publications
Real-time fall detection using a wearable sensor remains a challenging problem due to high gait variability. Furthermore, finding the type of sensor to use and the optimal location of the sensors are also essential factors for real-time fall-detection systems. This work presents real-time fall-detection methods using deep learning models. Early detection of falls, followed by pneumatic protection, is one of the most effective means of ensuring the safety of the elderly. First, we developed and compared different data-segmentation techniques for sliding windows. Next, we implemented various techniques to balance the datasets because collecting fall datasets in the real-time setting has …
Class Activation Mapping And Uncertainty Estimation In Multi-Organ Segmentation, Md. Shibly Sadique, Walia Farzana, Ahmed Temtam, Khan Iftekharuddin, Khan Iftekharuddin (Ed.), Weijie Chen (Ed.)
Class Activation Mapping And Uncertainty Estimation In Multi-Organ Segmentation, Md. Shibly Sadique, Walia Farzana, Ahmed Temtam, Khan Iftekharuddin, Khan Iftekharuddin (Ed.), Weijie Chen (Ed.)
Electrical & Computer Engineering Faculty Publications
Deep learning (DL)-based medical imaging and image segmentation algorithms achieve impressive performance on many benchmarks. Yet the efficacy of deep learning methods for future clinical applications may become questionable due to the lack of ability to reason with uncertainty and interpret probable areas of failures in prediction decisions. Therefore, it is desired that such a deep learning model for segmentation classification is able to reliably predict its confidence measure and map back to the original imaging cases to interpret the prediction decisions. In this work, uncertainty estimation for multiorgan segmentation task is evaluated to interpret the predictive modeling in DL …
Ict Security Tools And Techniques Among Higher Education Institutions: A Critical Review, Miko Nuñez, Xavier-Lewis Palmer, Lucas Potter, Chris Jordan Aliac, Lemuel Clark Velasco
Ict Security Tools And Techniques Among Higher Education Institutions: A Critical Review, Miko Nuñez, Xavier-Lewis Palmer, Lucas Potter, Chris Jordan Aliac, Lemuel Clark Velasco
Electrical & Computer Engineering Faculty Publications
Higher education institutions (HEIs) are increasingly relying on digital technologies for classroom and organizational management, but this puts them at higher risk for information and communication (ICT security attacks. Recent studies show that HEIs have experienced more security breaches in ICT security composed of both cybersecurity an information security. A literature review was conducted to identify common ICT security practices in HEIs over the last decade. 11 journal articles were profiled and analyzed, revealing threats to HEIs’ security and protective measures in terms of organizational security, technological security, physical security, and standards and frameworks. Security tools and techniques were grouped …
A Review Of Iot Security And Privacy Using Decentralized Blockchain Techniques, Vinay Gugueoth, Sunitha Safavat, Sachin Shetty, Danda Rawat
A Review Of Iot Security And Privacy Using Decentralized Blockchain Techniques, Vinay Gugueoth, Sunitha Safavat, Sachin Shetty, Danda Rawat
Electrical & Computer Engineering Faculty Publications
IoT security is one of the prominent issues that has gained significant attention among the researchers in recent times. The recent advancements in IoT introduces various critical security issues and increases the risk of privacy leakage of IoT data. Implementation of Blockchain can be a potential solution for the security issues in IoT. This review deeply investigates the security threats and issues in IoT which deteriorates the effectiveness of IoT systems. This paper presents a perceptible description of the security threats, Blockchain based solutions, security characteristics and challenges introduced during the integration of Blockchain with IoT. An analysis of different …
Quantum Efficiency And Lifetime Study For Negative Electron Affinity Gaas Nanopillar Array Photocathode, Md Aziz Ar Rahman, Md Abdullah Mamun, Shukui Zhang, Hani E. Elsayed-Ali
Quantum Efficiency And Lifetime Study For Negative Electron Affinity Gaas Nanopillar Array Photocathode, Md Aziz Ar Rahman, Md Abdullah Mamun, Shukui Zhang, Hani E. Elsayed-Ali
Electrical & Computer Engineering Faculty Publications
Recent studies showed significant improvement in quantum efficiency (QE) by negative electron affinity (NEA) GaAs nanopillar array (NPA) photocathodes over their flat surface peers, particularly at 500 ─ 800 nm waveband. However, the underlying physics is yet to be well understood for further improvement in its performance. In this report, NEA GaAs NPA photocathodes with different dimensions were studied. The diameter of the nanopillars varied from 200 ─ 360 nm, the height varied from 230 ─ 1000 nm and the periodicity varied from 470 ─ 630 nm. The QE and photocathode lifetime were measured. Mie-resonance enhancement was observed at tunable …
Comparison Of Machine Learning Methods For Classification Of Alexithymia In Individuals With And Without Autism From Eye-Tracking Data, Furkan Iigin, Megan A. Witherow, Khan M. Iftekharuddin
Comparison Of Machine Learning Methods For Classification Of Alexithymia In Individuals With And Without Autism From Eye-Tracking Data, Furkan Iigin, Megan A. Witherow, Khan M. Iftekharuddin
Electrical & Computer Engineering Faculty Publications
Alexithymia describes a psychological state where individuals struggle with feeling and expressing their emotions. Individuals with alexithymia may also have a more difficult time understanding the emotions of others and may express atypical attention to the eyes when recognizing emotions. This is known to affect individuals with Autism Spectrum Disorder (ASD) differently than neurotypical (NT) individuals. Using a public data set of eye-tracking data from seventy individuals with and without autism who have been assessed for alexithymia, we train multiple traditional machine learning models for alexithymia classification including support vector machines, logistic regression, decision trees, random forest, and multilayer perceptron. …
Special Section Editorial: Artificial Intelligence For Medical Imaging In Clinical Practice, Claudia Mello-Thoms, Karen Drukker, Sian Taylor-Phillips, Khan Iftekharuddin, Marios Gavrielides
Special Section Editorial: Artificial Intelligence For Medical Imaging In Clinical Practice, Claudia Mello-Thoms, Karen Drukker, Sian Taylor-Phillips, Khan Iftekharuddin, Marios Gavrielides
Electrical & Computer Engineering Faculty Publications
This editorial introduces the JMI Special Section on Artificial Intelligence for Medical Imaging in Clinical Practice.
Implications Of Cyberbiosecurity In Advanced Agriculture, Simone Stephen, Keitavius Alexander, Lucas Potter, Xavier-Lewis Palmer
Implications Of Cyberbiosecurity In Advanced Agriculture, Simone Stephen, Keitavius Alexander, Lucas Potter, Xavier-Lewis Palmer
Electrical & Computer Engineering Faculty Publications
The world is currently undergoing a rapid digital transformation sometimes referred to as the fourth industrial revolution. During this transformation, it is increasingly clear that many scientific fields are not prepared for this change. One specific area is agriculture. As the sector which creates global food supply, this critical infrastructure requires detailed assessment and research via newly developed technologies (Millett et al, 2019; Peccoud et al, 2018) . Despite its fundamental significance to modern civilization, many aspects of industrial agriculture have not yet adapted to the digital world. This is evident in the many vulnerabilities currently present within agricultural systems, …
Electron Beam Treatment For The Removal Of 1,4-Dioxane In Water And Wastewater, Robert Pearce, Xi Li, John Vennekate, Gianluigi Ciovati, Charles Bott
Electron Beam Treatment For The Removal Of 1,4-Dioxane In Water And Wastewater, Robert Pearce, Xi Li, John Vennekate, Gianluigi Ciovati, Charles Bott
Electrical & Computer Engineering Faculty Publications
Electron beam (e-beam) treatment uses accelerated electrons to form oxidizing and reducing radicals when applied to water without the use of external chemicals. In this study, electron beam treatment was used to degrade 1,4-dioxane in several water matrices. Removal improved in the progressively cleaner water matrices and removals as high as 94% to 99% were observed at a dose of 2.3 kGy in secondary effluent. 1,4-dioxane removal was confirmed to be primarily through hydroxyl radical oxidation. The calculated electrical energy per order was found to be 0.53, 0.26, and 0.08 kWh/m3/order for secondary effluent (Avg. total organic carbon …
Elevation-Distributed Multistage Reverse Osmosis Desalination With Seawater Pumped Storage, Hani E. Elsayed-Ali
Elevation-Distributed Multistage Reverse Osmosis Desalination With Seawater Pumped Storage, Hani E. Elsayed-Ali
Electrical & Computer Engineering Faculty Publications
A seawater reverse osmosis (RO) plant layout based on multistage RO with stages located at different elevations above sea level is described. The plant uses the weight of a seawater column from pumped storage as head pressure for RO (gravity-driven multistage RO) or to supplement high-pressure pumps used in RO (gravity-assisted multistage RO). The use of gravitational force reduces the specific energy for RO compared to using high-pressure pumps. By locating the RO stages at different elevations based on demand sites, the total specific energy consumption for RO and permeate transport to different elevations above sea level is reduced from …
Light Auditor: Power Measurement Can Tell Private Data Leakage Through Iot Covert Channels, Woosub Jung, Kailai Cui, Kenneth Koltermann, Junjie Wang, Chunsheng Xin, Gang Zhou
Light Auditor: Power Measurement Can Tell Private Data Leakage Through Iot Covert Channels, Woosub Jung, Kailai Cui, Kenneth Koltermann, Junjie Wang, Chunsheng Xin, Gang Zhou
Electrical & Computer Engineering Faculty Publications
Despite many conveniences of using IoT devices, they have suffered from various attacks due to their weak security. Besides well-known botnet attacks, IoT devices are vulnerable to recent covert-channel attacks. However, no study to date has considered these IoT covert-channel attacks. Among these attacks, researchers have demonstrated exfiltrating users' private data by exploiting the smart bulb's capability of infrared emission.
In this paper, we propose a power-auditing-based system that defends the data exfiltration attack on the smart bulb as a case study. We first implement this infrared-based attack in a lab environment. With a newly-collected power consumption dataset, we pre-process …
Mwirgan: Unsupervised Visible-To Mwir Image Translation With Generative Adversarial Network, Mohammad Shahab Uddin, Chiman Kwan, Jiang Li
Mwirgan: Unsupervised Visible-To Mwir Image Translation With Generative Adversarial Network, Mohammad Shahab Uddin, Chiman Kwan, Jiang Li
Electrical & Computer Engineering Faculty Publications
Unsupervised image-to-image translation techniques have been used in many applications, including visible-to-Long-Wave Infrared (visible-to-LWIR) image translation, but very few papers have explored visible-to-Mid-Wave Infrared (visible-to-MWIR) image translation. In this paper, we investigated unsupervised visible-to-MWIR image translation using generative adversarial networks (GANs). We proposed a new model named MWIRGAN for visible-to-MWIR image translation in a fully unsupervised manner. We utilized a perceptual loss to leverage shape identification and location changes of the objects in the translation. The experimental results showed that MWIRGAN was capable of visible-to-MWIR image translation while preserving the object’s shape with proper enhancement in the translated images and …
Security Of Internet Of Things (Iot) Using Federated Learning And Deep Learning — Recent Advancements, Issues And Prospects, Vinay Gugueoth, Sunitha Safavat, Sachin Shetty
Security Of Internet Of Things (Iot) Using Federated Learning And Deep Learning — Recent Advancements, Issues And Prospects, Vinay Gugueoth, Sunitha Safavat, Sachin Shetty
Electrical & Computer Engineering Faculty Publications
There is a great demand for an efficient security framework which can secure IoT systems from potential adversarial attacks. However, it is challenging to design a suitable security model for IoT considering the dynamic and distributed nature of IoT. This motivates the researchers to focus more on investigating the role of machine learning (ML) in the designing of security models. A brief analysis of different ML algorithms for IoT security is discussed along with the advantages and limitations of ML algorithms. Existing studies state that ML algorithms suffer from the problem of high computational overhead and risk of privacy leakage. …
Adaptive Critic Network For Person Tracking Using 3d Skeleton Data, Joseph G. Zalameda, Alex Glandon, Khan M. Iftekharuddin, Mohammad S. Alam (Ed.), Vijayan K. Asari (Ed.)
Adaptive Critic Network For Person Tracking Using 3d Skeleton Data, Joseph G. Zalameda, Alex Glandon, Khan M. Iftekharuddin, Mohammad S. Alam (Ed.), Vijayan K. Asari (Ed.)
Electrical & Computer Engineering Faculty Publications
Analysis of human gait using 3-dimensional co-occurrence skeleton joints extracted from Lidar sensor data has been shown a viable method for predicting person identity. The co-occurrence based networks rely on the spatial changes between frames of each joint in the skeleton data sequence. Normally, this data is obtained using a Lidar skeleton extraction method to estimate these co-occurrence features from raw Lidar frames, which can be prone to incorrect joint estimations when part of the body is occluded. These datasets can also be time consuming and expensive to collect and typically offer a small number of samples for training and …