Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Discipline
Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 12421 - 12450 of 302419

Full-Text Articles in Physical Sciences and Mathematics

Towards Omni-Generalizable Neural Methods For Vehicle Routing Problems, Jianan Zhou, Yaoxin Wu, Wen Song, Zhiguang Cao, Jie Zhang Jul 2023

Towards Omni-Generalizable Neural Methods For Vehicle Routing Problems, Jianan Zhou, Yaoxin Wu, Wen Song, Zhiguang Cao, Jie Zhang

Research Collection School Of Computing and Information Systems

Learning heuristics for vehicle routing problems (VRPs) has gained much attention due to the less reliance on hand-crafted rules. However, existing methods are typically trained and tested on the same task with a fixed size and distribution (of nodes), and hence suffer from limited generalization performance. This paper studies a challenging yet realistic setting, which considers generalization across both size and distribution in VRPs. We propose a generic meta-learning framework, which enables effective training of an initialized model with the capability of fast adaptation to new tasks during inference. We further develop a simple yet efficient approximation method to reduce …


Modularized Zero-Shot Vqa With Pre-Trained Models, Rui Cao, Jing Jiang Jul 2023

Modularized Zero-Shot Vqa With Pre-Trained Models, Rui Cao, Jing Jiang

Research Collection School Of Computing and Information Systems

Large-scale pre-trained models (PTMs) show great zero-shot capabilities. In this paper, we study how to leverage them for zero-shot visual question answering (VQA).Our approach is motivated by a few observations. First, VQA questions often require multiple steps of reasoning, which is still a capability that most PTMs lack. Second, different steps in VQA reasoning chains require different skills such as object detection and relational reasoning, but a single PTM may not possess all these skills. Third, recent work on zero-shot VQA does not explicitly consider multi-step reasoning chains, which makes them less interpretable compared with a decomposition-based approach. We propose …


Is Web3 Better Than Web2 For Investors? Evidence From Domain Name Auctions, Ping Fan Ke, Yi Meng Lau, Daniel Varghese Hanley Jul 2023

Is Web3 Better Than Web2 For Investors? Evidence From Domain Name Auctions, Ping Fan Ke, Yi Meng Lau, Daniel Varghese Hanley

Research Collection School Of Computing and Information Systems

Blockchain-based assets are commonly believed to attract new investors. To investigate this claim, we compared investor preferences for Web2 and Web3 domain name auctions by analyzing daily auction patterns in Namecheap and OpenSea. Our results indicate that Web3 platforms may attract extreme investors with low or high values as a niche market. We found a significantly higher number of bids per auction, higher average bid prices, and greater price spreads on OpenSea, but a significantly lower number of unique bidders per auction. Our findings highlight the importance of considering the auction platform's characteristics and asset context when evaluating bid patterns …


Balancing Privacy And Flexibility Of Cloud-Based Personal Health Records Sharing System, Yudi Zhang, Fuchun Guo, Willy Susilo, Guomin Yang Jul 2023

Balancing Privacy And Flexibility Of Cloud-Based Personal Health Records Sharing System, Yudi Zhang, Fuchun Guo, Willy Susilo, Guomin Yang

Research Collection School Of Computing and Information Systems

The Internet of Things and cloud services have been widely adopted in many applications, and personal health records (PHR) can provide tailored medical care. The PHR data is usually stored on cloud servers for sharing. Weighted attribute-based encryption (ABE) is a practical and flexible technique to protect PHR data. Under a weighted ABE policy, the data user's attributes will be “scored”, if and only if the score reaches the threshold value, he/she can access the data. However, while this approach offers a flexible access policy, the data owners have difficulty controlling their privacy, especially sharing PHR data in collaborative e-health …


Cone: An Efficient Coarse-To-Fine Alignment Framework For Long Video Temporal Grounding, Zhijian Hou, Wanjun Zhong, Lei Ji, Difei Gao, Kun Yan, Wing-Kwong Chan, Chong-Wah Ngo, Mike Z. Shou, Nan. Duan Jul 2023

Cone: An Efficient Coarse-To-Fine Alignment Framework For Long Video Temporal Grounding, Zhijian Hou, Wanjun Zhong, Lei Ji, Difei Gao, Kun Yan, Wing-Kwong Chan, Chong-Wah Ngo, Mike Z. Shou, Nan. Duan

Research Collection School Of Computing and Information Systems

This paper tackles an emerging and challenging problem of long video temporal grounding (VTG) that localizes video moments related to a natural language (NL) query. Compared with short videos, long videos are also highly demanded but less explored, which brings new challenges in higher inference computation cost and weaker multi-modal alignment. To address these challenges, we propose CONE, an efficient COarse-to-fiNE alignment framework. CONE is a plug-and-play framework on top of existing VTG models to handle long videos through a sliding window mechanism. Specifically, CONE (1) introduces a query-guided window selection strategy to speed up inference, and (2) proposes a …


Mdps As Distribution Transformers: Affine Invariant Synthesis For Safety Objectives, S. Akshay, Krishnendu Chatterjee, Tobias Meggendorfer, Dorde Zikelic Jul 2023

Mdps As Distribution Transformers: Affine Invariant Synthesis For Safety Objectives, S. Akshay, Krishnendu Chatterjee, Tobias Meggendorfer, Dorde Zikelic

Research Collection School Of Computing and Information Systems

Markov decision processes can be viewed as transformers of probability distributions. While this view is useful from a practical standpoint to reason about trajectories of distributions, basic reachability and safety problems are known to be computationally intractable (i.e., Skolem-hard) to solve in such models. Further, we show that even for simple examples of MDPs, strategies for safety objectives over distributions can require infinite memory and randomization.In light of this, we present a novel overapproximation approach to synthesize strategies in an MDP, such that a safety objective over the distributions is met. More precisely, we develop a new framework for template-based …


Synthesizing Speech Test Cases With Text-To-Speech? An Empirical Study On The False Alarms In Automated Speech Recognition Testing, Julia Kaiwen Lau, Kelvin Kai Wen Kong, Julian Hao Yong, Per Hoong Tan, Zhou Yang, Zi Qian Yong, Joshua Chern Wey Low, Chun Yong Chong, Mei Kuan Lim, David Lo Jul 2023

Synthesizing Speech Test Cases With Text-To-Speech? An Empirical Study On The False Alarms In Automated Speech Recognition Testing, Julia Kaiwen Lau, Kelvin Kai Wen Kong, Julian Hao Yong, Per Hoong Tan, Zhou Yang, Zi Qian Yong, Joshua Chern Wey Low, Chun Yong Chong, Mei Kuan Lim, David Lo

Research Collection School Of Computing and Information Systems

Recent studies have proposed the use of Text-To-Speech (TTS) systems to automatically synthesise speech test cases on a scale and uncover a large number of failures in ASR systems. However, the failures uncovered by synthetic test cases may not reflect the actual performance of an ASR system when it transcribes human audio, which we refer to as false alarms. Given a failed test case synthesised from TTS systems, which consists of TTS-generated audio and the corresponding ground truth text, we feed the human audio stating the same text to an ASR system. If human audio can be correctly transcribed, an …


Safe Mdp Planning By Learning Temporal Patterns Of Undesirable Trajectories And Averting Negative Side Effects, Siow Meng Low, Akshat Kumar, Scott Sanner Jul 2023

Safe Mdp Planning By Learning Temporal Patterns Of Undesirable Trajectories And Averting Negative Side Effects, Siow Meng Low, Akshat Kumar, Scott Sanner

Research Collection School Of Computing and Information Systems

In safe MDP planning, a cost function based on the current state and action is often used to specify safety aspects. In real world, often the state representation used may lack sufficient fidelity to specify such safety constraints. Operating based on an incomplete model can often produce unintended negative side effects (NSEs). To address these challenges, first, we associate safety signals with state-action trajectories (rather than just immediate state-action). This makes our safety model highly general. We also assume categorical safety labels are given for different trajectories, rather than a numerical cost function, which is harder to specify by the …


Social Troubleshooting Workshops: Upskilling Students' Soft And Self-Reflection Skills, Sandra Schulz, Rita Garcia, Christoph Treude Jul 2023

Social Troubleshooting Workshops: Upskilling Students' Soft And Self-Reflection Skills, Sandra Schulz, Rita Garcia, Christoph Treude

Research Collection School Of Computing and Information Systems

This poster focuses on workshops to support students’ soft and selfreflection skills during collaborative learning. These workshops intend to help reduce anxiety during group work and to promote inclusive and equitable collaborative learning environments. Unfortunately, single-paced instructional approaches are typically applied in learning environments [3] and do not consider students’ needs when learning nor provide soft-skills guidance that encourages equal participation. The workshops offer educator and student support for equitable group work through upskilling students’ soft skills, such as leadership and communication, that promote better teamwork. By assisting students in developing and practising soft and self-reflection skills, they might have …


Knowledge-Enhanced Mixed-Initiative Dialogue System For Emotional Support Conversations, Yang Deng, Wenxuan Zhang, Yifei Yuan, Wai Lam Jul 2023

Knowledge-Enhanced Mixed-Initiative Dialogue System For Emotional Support Conversations, Yang Deng, Wenxuan Zhang, Yifei Yuan, Wai Lam

Research Collection School Of Computing and Information Systems

Unlike empathetic dialogues, the system in emotional support conversations (ESC) is expected to not only convey empathy for comforting the help-seeker, but also proactively assist in exploring and addressing their problems during the conversation. In this work, we study the problem of mixed-initiative ESC where the user and system can both take the initiative in leading the conversation. Specifically, we conduct a novel analysis on mixed-initiative ESC systems with a tailor-designed schema that divides utterances into different types with speaker roles and initiative types. Four emotional support metrics are proposed to evaluate the mixed-initiative interactions. The analysis reveals the necessity …


Peerda: Data Augmentation Via Modeling Peer Relation For Span Identification Tasks, Weiwen Xu, Xin Li, Yang Deng, Wai Lam, Lidong Bing Jul 2023

Peerda: Data Augmentation Via Modeling Peer Relation For Span Identification Tasks, Weiwen Xu, Xin Li, Yang Deng, Wai Lam, Lidong Bing

Research Collection School Of Computing and Information Systems

Span identification aims at identifying specific text spans from text input and classifying them into pre-defined categories. Different from previous works that merely leverage the Subordinate (SUB) relation (i.e. if a span is an instance of a certain category) to train models, this paper for the first time explores the Peer (PR) relation, which indicates that two spans are instances of the same category and share similar features. Specifically, a novel Peer Data Augmentation (PeerDA) approach is proposed which employs span pairs with the PR relation as the augmentation data for training. PeerDA has two unique advantages: (1) There are …


A Practical Framework For Early Detection Of Diabetes Using Ensemble Machine Learning Models, Qusay Saihood, Emrullah Sonuç Jul 2023

A Practical Framework For Early Detection Of Diabetes Using Ensemble Machine Learning Models, Qusay Saihood, Emrullah Sonuç

Turkish Journal of Electrical Engineering and Computer Sciences

The diagnosis of diabetes, a prevalent global health condition, is crucial for preventing severe complications. In recent years, there has been a growing effort to develop intelligent diagnostic systems for diabetes utilizing machine learning (ML) algorithms. Despite these efforts, achieving high accuracy rates using such systems remains a significant challenge. Recent advancements in ensemble ML methods offer promising opportunities for early detection of diabetes, as they are known to be faster and more cost-effective than traditional approaches. Therefore, this study proposes a practical framework for diagnosing diabetes that involves three stages. The data preprocessing stage encompasses several crucial tasks, including …


18 Million Links In Commit Messages: Purpose, Evolution, And Decay, Tao Xiao, Sebastian Baltes, Hideaki Hata, Christoph Treude, Raula Kula, Takashi Ishio, Kenichi Matsumoto Jul 2023

18 Million Links In Commit Messages: Purpose, Evolution, And Decay, Tao Xiao, Sebastian Baltes, Hideaki Hata, Christoph Treude, Raula Kula, Takashi Ishio, Kenichi Matsumoto

Research Collection School Of Computing and Information Systems

Commit messages contain diverse and valuable types of knowledge in all aspects of software maintenance and evolution. Links are an example of such knowledge. Previous work on “9.6 million links in source code comments” showed that links are prone to decay, become outdated, and lack bidirectional traceability. We conducted a large-scale study of 18,201,165 links from commits in 23,110 GitHub repositories to investigate whether they suffer the same fate. Results show that referencing external resources is prevalent and that the most frequent domains other than github.com are the external domains of Stack Overflow and Google Code. Similarly, links serve as …


Identification Of Transient Radio Frequency Occlusion Events In Urban Environments, Margaret M. Rooney, Mark Hinders Jul 2023

Identification Of Transient Radio Frequency Occlusion Events In Urban Environments, Margaret M. Rooney, Mark Hinders

Arts & Sciences Articles

We model the propagation of SHF OFDM signals around vehicles and buildings since these are the most common elements present in urban environments that could lead to complex radio frequency signal scattering. Scenarios involving temporary hidden node situations, which we term transient occlusion events, are simulated and compared to scenarios where a line of sight transmission event occurs. Sets of fingerprints generated from signals recorded in full-wave 3D finite difference time domain simulations of these two different types of situations are compared, and features in the fingerprints corresponding to the occlusion of a transmitted signal by a vehicle or a …


Predicting Material Structures And Properties Using Deep Learning And Machine Learning Algorithms, Yuqi Song Jul 2023

Predicting Material Structures And Properties Using Deep Learning And Machine Learning Algorithms, Yuqi Song

Theses and Dissertations

Discovering new materials and understanding their crystal structures and chemical properties are critical tasks in the material sciences. Although computational methodologies such as Density Functional Theory (DFT), provide a convenient means for calculating certain properties of materials or predicting crystal structures when combined with search algorithms, DFT is computationally too demanding for structure prediction and property calculation for most material families, especially for those materials with a large number of atoms. This dissertation aims to address this limitation by developing novel deep learning and machine learning algorithms for effective prediction of material crystal structures and properties. Our data-driven machine learning …


Establishing Effective Conservation Management Strategies For A Poorly Known Endangered Species: A Case Study Using Australia’S Night Parrot (Pezoporus Occidentalis), Nicholas P. Leseberg, Alex Kutt, Megan C. Evans, Tida Nou, Scott Spillias, Zoe Stone, Jessica C. Walsh, Stephen A. Murphy, Mike Bamford, Allan H. Burbidge, Kate Crossing, Robert A. Davis, Stephen T. Garnett, Rodney P. Kavanagh, Robert Murphy, John Read, Julian Reid, Stephen Van Leeuwen, Alexander W. T. Watson, James E. M. Watson, Martine Maron Jul 2023

Establishing Effective Conservation Management Strategies For A Poorly Known Endangered Species: A Case Study Using Australia’S Night Parrot (Pezoporus Occidentalis), Nicholas P. Leseberg, Alex Kutt, Megan C. Evans, Tida Nou, Scott Spillias, Zoe Stone, Jessica C. Walsh, Stephen A. Murphy, Mike Bamford, Allan H. Burbidge, Kate Crossing, Robert A. Davis, Stephen T. Garnett, Rodney P. Kavanagh, Robert Murphy, John Read, Julian Reid, Stephen Van Leeuwen, Alexander W. T. Watson, James E. M. Watson, Martine Maron

Research outputs 2022 to 2026

An evidence-based approach to the conservation management of a species requires knowledge of that species’ status, distribution, ecology, and threats. Coupled with budgets for specific conservation strategies, this knowledge allows prioritisation of funding toward activities that maximise benefit for the species. However, many threatened species are poorly known, and determining which conservation strategies will achieve this is difficult. Such cases require approaches that allow decision-making under uncertainty. Here we used structured expert elicitation to estimate the likely benefit of potential management strategies for the Critically Endangered and, until recently, poorly known Night Parrot (Pezoporus occidentalis). Experts considered cat management the …


The Internet Of Things (Iot) In Healthcare: Taking Stock And Moving Forward, Abderahman Rejeb, Karim Rejeb, Horst Treiblmaier, Andrea Appolloni, Salem Alghamdi, Yaser Alhasawi, Mohammad Iranmanesh Jul 2023

The Internet Of Things (Iot) In Healthcare: Taking Stock And Moving Forward, Abderahman Rejeb, Karim Rejeb, Horst Treiblmaier, Andrea Appolloni, Salem Alghamdi, Yaser Alhasawi, Mohammad Iranmanesh

Research outputs 2022 to 2026

Recent improvements in the Internet of Things (IoT) have allowed healthcare to evolve rapidly. This article summarizes previous studies on IoT applications in healthcare. A comprehensive review and a bibliometric analysis were performed to objectively summarize the growth of IoT research in healthcare. To begin, 2,990 journal articles were carefully selected for further investigation. These publications were analyzed based on various bibliometric metrics, including publication year, journals, authors, institutions, and countries. Keyword co-occurrence and co-citation networks were generated to unravel significant research hotspots. The findings show that IoT research has received considerable interest from the healthcare community. Based on the …


Hurricane Impacts On Land In The Central And Eastern Caribbean Since 1494 Ce From Written Records, Michael Chenoweth, Ian Howard Jul 2023

Hurricane Impacts On Land In The Central And Eastern Caribbean Since 1494 Ce From Written Records, Michael Chenoweth, Ian Howard

Geosciences Faculty Publications and Presentations

Written accounts of hurricanes and their impacts in the Caribbean region date back to 1494 CE We report a new compilation of hurricanes in the longest settled regions of the central and eastern Caribbean region (CECR) that is the most complete yet produced and present basic statistics. We assess likely undercounts of hurricanes due to incomplete documentary records in the earliest part of the record by using the most complete reporting from Puerto Rico relative to the remainder of the CECR. We compare our results with other documentary and proxy data from the region and demonstrate using wavelet analysis significant …


The Appropriateness Of Outlier Exclusion Approaches Depends On The Expected Contamination: Commentary On André (2022), Daniel Villanova Jul 2023

The Appropriateness Of Outlier Exclusion Approaches Depends On The Expected Contamination: Commentary On André (2022), Daniel Villanova

Marketing Faculty Publications and Presentations

In a recent article, André (2022) addressed the decision to exclude outliers using a threshold across conditions or within conditions and offered a clear recommendation to avoid within-conditions exclusions because of the possibility for large false-positive inflation. In this commentary, I note that André’s simulations did not include the situation for which within-conditions exclusion has previously been recommended—when across-conditions exclusion would exacerbate selection bias. Examining test performance in this situation confirms the recommendation for within-conditions exclusion in such a circumstance. Critically, the suitability of exclusion criteria must be considered in relationship to assumptions about data-generating mechanisms.


Monitoring Dam Stability Using Psi And Sbas Analysis, Rejoice Thomas, Wenzhao Li, Shahryar Fazli, Nikolay Grisel Todorov, Hesham El-Askary Jul 2023

Monitoring Dam Stability Using Psi And Sbas Analysis, Rejoice Thomas, Wenzhao Li, Shahryar Fazli, Nikolay Grisel Todorov, Hesham El-Askary

Mathematics, Physics, and Computer Science Faculty Articles and Research

Water preservation and maximization of its efficient use is key in areas facing water scarcity like California. One of the most important resources available to us are dams, which are useful to address a variety of needs like water supply, flood control, and maintaining environmental flows. However, if not managed properly, dams can be disastrous to humans and wildlife alike, different water species, habitats, and even impact water quality for a region. In this context, we have used newer Synthetic Aperture Radar Interferometry techniques like Persistent Scatterer Interferometry (PSI) and Small Baseline Subset (SBAS) to estimate the displacement rates at …


Mechanical Properties And Deformation Mechanisms Of Nanocrystalline U-10mo Alloys By Molecular Dynamics Simulation, Xuelian Ou, Yanxin Shen, Yue Yang, Zhenjiang You, Peng Wang, Yexin Yang, Xiaofeng Tian Jul 2023

Mechanical Properties And Deformation Mechanisms Of Nanocrystalline U-10mo Alloys By Molecular Dynamics Simulation, Xuelian Ou, Yanxin Shen, Yue Yang, Zhenjiang You, Peng Wang, Yexin Yang, Xiaofeng Tian

Research outputs 2022 to 2026

U-Mo alloys were considered to be the most promising candidates for high-density nuclear fuel. The uniaxial tensile behavior of nanocrystalline U-10Mo alloys with average grain sizes of 8–23 nm was systematically studied by molecular dynamics (MD) simulation, mainly focusing on the influence of average grain size on the mechanical properties and deformation mechanisms. The results show that Young’s modulus, yield strength and ultimate tensile strength follow as average grain size increases. During the deformation process, localized phase transitions were observed in samples. Grain boundary sliding and grain rotation, as well as twinning, dominated the deformation in the smaller and larger …


Ocean Connectivity And Habitat Characteristics Predict Population Genetic Structure Of Seagrass In An Extreme Tropical Setting, Udhi E. Hernawan, Kor-Jent Van Dijk, Gary A. Kendrick, Ming Feng, Oliver Berry, Christopher Kavazos, Kathryn Mcmahon Jul 2023

Ocean Connectivity And Habitat Characteristics Predict Population Genetic Structure Of Seagrass In An Extreme Tropical Setting, Udhi E. Hernawan, Kor-Jent Van Dijk, Gary A. Kendrick, Ming Feng, Oliver Berry, Christopher Kavazos, Kathryn Mcmahon

Research outputs 2022 to 2026

Understanding patterns of gene flow and processes driving genetic differentiation is important for a broad range of conservation practices. In marine organisms, genetic differentiation among populations is influenced by a range of spatial, oceanographic, and environmental factors that are attributed to the seascape. The relative influences of these factors may vary in different locations and can be measured using seascape genetic approaches. Here, we applied a seascape genetic approach to populations of the seagrass, Thalassia hemprichii, at a fine spatial scale (~80 km) in the Kimberley coast, western Australia, a complex seascape with strong, multidirectional currents greatly influenced by extreme …


Spatial Patterns In Host-Associated And Free-Living Bacterial Communities Across Six Temperate Estuaries, Alessandra L. Suzzi, Michael Stat, Troy F. Gaston, Megan J. Huggett Jul 2023

Spatial Patterns In Host-Associated And Free-Living Bacterial Communities Across Six Temperate Estuaries, Alessandra L. Suzzi, Michael Stat, Troy F. Gaston, Megan J. Huggett

Research outputs 2022 to 2026

A major goal of microbial ecology is to establish the importance of spatial and environmental factors in driving community variation. Their relative importance likely varies across spatial scales, but focus has primarily been on free-living communities within well-connected aquatic environments rather than less connected island-like habitats such as estuaries, and key host-associated communities within these systems. Here we sampled both free-living (seawater and sediment) and host-associated (estuarine fish hindgut microbiome, Pelates sexlineatus) communities across six temperate Australian estuaries spanning ∼500 km. We find that spatial and environmental factors have different influences on these communities, with seawater demonstrating strong distance-decay relationships …


Survey: An Overview Of Lightweight Rfid Authentication Protocols Suitable For The Maritime Internet Of Things, Glen Mudra, Hui Cui, Michael N. Johnstone Jul 2023

Survey: An Overview Of Lightweight Rfid Authentication Protocols Suitable For The Maritime Internet Of Things, Glen Mudra, Hui Cui, Michael N. Johnstone

Research outputs 2022 to 2026

The maritime sector employs the Internet of Things (IoT) to exploit many of its benefits to maintain a competitive advantage and keep up with the growing demands of the global economy. The maritime IoT (MIoT) not only inherits similar security threats as the general IoT, it also faces cyber threats that do not exist in the traditional IoT due to factors such as the support for long-distance communication and low-bandwidth connectivity. Therefore, the MIoT presents a significant concern for the sustainability and security of the maritime industry, as a successful cyber attack can be detrimental to national security and have …


A Novel Authentication Method That Combines Honeytokens And Google Authenticator, Vassilis Papaspirou, Maria Papathanasaki, Leandros Maglaras, Ioanna Kantzavelou, Christos Douligeris, Mohamed A. Ferrag, Helge Janicke Jul 2023

A Novel Authentication Method That Combines Honeytokens And Google Authenticator, Vassilis Papaspirou, Maria Papathanasaki, Leandros Maglaras, Ioanna Kantzavelou, Christos Douligeris, Mohamed A. Ferrag, Helge Janicke

Research outputs 2022 to 2026

Despite the rapid development of technology, computer systems still rely heavily on passwords for security, which can be problematic. Although multi-factor authentication has been introduced, it is not completely effective against more advanced attacks. To address this, this study proposes a new two-factor authentication method that uses honeytokens. Honeytokens and Google Authenticator are combined to create a stronger authentication process. The proposed approach aims to provide additional layers of security and protection to computer systems, increasing their overall security beyond what is currently provided by single-password or standard two-factor authentication methods. The key difference is that the proposed system resembles …


Authenticated Public Key Elliptic Curve Based On Deep Convolutional Neural Network For Cybersecurity Image Encryption Application, Esam A. A. Hagras, Saad Aldosary, Haitham Khaled, Tarek M. Hassan Jul 2023

Authenticated Public Key Elliptic Curve Based On Deep Convolutional Neural Network For Cybersecurity Image Encryption Application, Esam A. A. Hagras, Saad Aldosary, Haitham Khaled, Tarek M. Hassan

Research outputs 2022 to 2026

The demand for cybersecurity is growing to safeguard information flow and enhance data privacy. This essay suggests a novel authenticated public key elliptic curve based on a deep convolutional neural network (APK-EC-DCNN) for cybersecurity image encryption application. The public key elliptic curve discrete logarithmic problem (EC-DLP) is used for elliptic curve Diffie–Hellman key exchange (EC-DHKE) in order to generate a shared session key, which is used as the chaotic system’s beginning conditions and control parameters. In addition, the authenticity and confidentiality can be archived based on ECC to share the (Formula presented.) parameters between two parties by using the EC-DHKE …


Modulation Recognition Of Low-Snr Uav Radar Signals Based On Bispectral Slices And Ga-Bp Neural Network, Xuemin Liu, Yaoliang Song, Kuiyu Chen, Shihao Yan, Si Chen, Baihua Shi Jul 2023

Modulation Recognition Of Low-Snr Uav Radar Signals Based On Bispectral Slices And Ga-Bp Neural Network, Xuemin Liu, Yaoliang Song, Kuiyu Chen, Shihao Yan, Si Chen, Baihua Shi

Research outputs 2022 to 2026

In this paper, we address the challenge of low recognition rates in existing methods for radar signals from unmanned aerial vehicles (UAV) with low signal-to-noise ratios (SNRs). To overcome this challenge, we propose the utilization of the bispectral slice approach for accurate recognition of complex UAV radar signals. Our approach involves extracting the bispectral diagonal slice and the maximum bispectral amplitude horizontal slice from the bispectrum amplitude spectrum of the received UAV radar signal. These slices serve as the basis for subsequent identification by calculating characteristic parameters such as convexity, box dimension, and sparseness. To accomplish the recognition task, we …


On Irs-Assisted Covert Communication With A Friendly Uav, Xiaobei Xu, Linzi Hu, Sha Wei, Yuwen Qian, Shihao Yan, Feng Shu, Jun Li Jul 2023

On Irs-Assisted Covert Communication With A Friendly Uav, Xiaobei Xu, Linzi Hu, Sha Wei, Yuwen Qian, Shihao Yan, Feng Shu, Jun Li

Research outputs 2022 to 2026

Driven by the rapidly growing demand for information security, covert wireless communication has become an essential technology and attracted tremendous attention. However, traditional wireless covert communication is continuously exposing the inherent limitations, creating challenges around deployment in environments with a large number of obstacles, such as cities with high-rise buildings. In this paper, we propose an intelligent reflecting surface (IRS)-assisted covert communication system (CCS) for communicating with a friendly unmanned aerial vehicle (UAV) in which the UAV generates artificial noise (AN) to interfere with monitoring. Furthermore, we model the power of AN emitted by the UAV using an uncertainty model, …


Dos/Ddos-Mqtt-Iot: A Dataset For Evaluating Intrusions In Iot Networks Using The Mqtt Protocol, Alaa Alatram, Leslie F. Sikos, Mike Johnstone, Patryk Szewczyk, James Jin Kang Jul 2023

Dos/Ddos-Mqtt-Iot: A Dataset For Evaluating Intrusions In Iot Networks Using The Mqtt Protocol, Alaa Alatram, Leslie F. Sikos, Mike Johnstone, Patryk Szewczyk, James Jin Kang

Research outputs 2022 to 2026

Adversaries may exploit a range of vulnerabilities in Internet of Things (IoT) environments. These vulnerabilities are typically exploited to carry out attacks, such as denial-of-service (DoS) attacks, either against the IoT devices themselves, or using the devices to perform the attacks. These attacks are often successful due to the nature of the protocols used in the IoT. One popular protocol used for machine-to-machine IoT communications is the Message Queueing Telemetry Protocol (MQTT). Countermeasures for attacks against MQTT include testing defenses with existing datasets. However, there is a lack of real-world test datasets in this area. For this reason, this paper …


Confirmatory Factor Analysis Of Two Self-Efficacy Scales For Astronomy Understanding And Robotic Telescope Use, R. Freed, David H. Mckinnon, M. T. Fitzgerald, S. Salimpour Jul 2023

Confirmatory Factor Analysis Of Two Self-Efficacy Scales For Astronomy Understanding And Robotic Telescope Use, R. Freed, David H. Mckinnon, M. T. Fitzgerald, S. Salimpour

Research outputs 2022 to 2026

This paper presents the results of a confirmatory factor analysis on two self-efficacy scales designed to probe the self-efficacy of college-level introductory astronomy (Astro-101) students (n=15181) from 22 institutions across the United States of America and Canada. The students undertook a course based on similar curriculum materials, which involved students using robotic telescopes to support their learning of astronomical concepts covered in the "traditional"Astro-101 courses. Previous research by the authors using these self-efficacy scales within a pre-/post-test approach showed both high reliabilities and very high construct validities. However, the scale purporting to measure students' self-efficacy in relation to their use …