Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Discipline
Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 36031 - 36060 of 302471

Full-Text Articles in Physical Sciences and Mathematics

A Novel Echo State Network Autoencoder For Anomaly Detection In Industrial Iot Systems, Fabrizio De Vita, Giorgio Nocera, Dario Bruneo, Sajal K. Das Jan 2022

A Novel Echo State Network Autoencoder For Anomaly Detection In Industrial Iot Systems, Fabrizio De Vita, Giorgio Nocera, Dario Bruneo, Sajal K. Das

Computer Science Faculty Research & Creative Works

The Industrial Internet of Things (IIoT) technology had a very strong impact on the realization of smart frameworks for detecting anomalous behaviors that could be potentially dangerous to a system. In this regard, most of the existing solutions involve the use of Artificial Intelligence (AI) models running on Edge devices, such as Intelligent Cyber Physical Systems (ICPS) typically equipped with sensing and actuating capabilities. However, the hardware restrictions of these devices make the implementation of an effective anomaly detection algorithm quite challenging. Considering an industrial scenario, where signals in the form of multivariate time-series should be analyzed to perform a …


Noise Resilient Learning For Attack Detection In Smart Grid Pmu Infrastructure, Prithwiraj Roy, Shameek Bhattacharjee, Sahar Abedzadeh, Sajal K. Das Jan 2022

Noise Resilient Learning For Attack Detection In Smart Grid Pmu Infrastructure, Prithwiraj Roy, Shameek Bhattacharjee, Sahar Abedzadeh, Sajal K. Das

Computer Science Faculty Research & Creative Works

Falsified data from compromised Phasor Measurement Units (PMUs) in a smart grid induce Energy Management Systems (EMS) to have an inaccurate estimation of the state of the grid, disrupting various operations of the power grid. Moreover, the PMUs deployed at the distribution layer of a smart grid show dynamic fluctuations in their data streams, which make it extremely challenging to design effective learning frameworks for anomaly-based attack detection. In this paper, we propose a noise resilient learning framework for anomaly-based attack detection specifically for distribution layer PMU infrastructure, that show real time indicators of data falsifications attacks while offsetting the …


Cansafe: An Mtd Based Approach For Providing Resiliency Against Dos Attack Within In-Vehicle Networks, Ayan Roy, Sanjay Kumar Madria Jan 2022

Cansafe: An Mtd Based Approach For Providing Resiliency Against Dos Attack Within In-Vehicle Networks, Ayan Roy, Sanjay Kumar Madria

Computer Science Faculty Research & Creative Works

Trending towards autonomous transportation systems, modern vehicles are equipped with hundreds of sensors and actuators that increase the intelligence of the vehicles with a higher level of autonomy, as well as facilitate increased communication with entities outside the in-vehicle network. However, increase in a contact point with the outside world has exposed the controller area network (CAN) of a vehicle to remote security vulnerabilities. In particular, an attacker can inject fake high priority messages within the CAN through the contact points, while preventing legitimate messages from controlling the CAN (Denial-of-Service (DoS) attack). In this paper, we propose a Moving Target …


Distributed Decision Making For V2v Charge Sharing In Intelligent Transportation Systems, Punyasha Chatterjee, Pratham Majumder, Arpita Debnath, Sajal K. Das Jan 2022

Distributed Decision Making For V2v Charge Sharing In Intelligent Transportation Systems, Punyasha Chatterjee, Pratham Majumder, Arpita Debnath, Sajal K. Das

Computer Science Faculty Research & Creative Works

Electric vehicles (EVs) have emerged in the intelligent transportation system (ITS) to meet the increasing environmental concerns. To facilitate on-demand requirement of EV charging, vehicle-to-vehicle (V2V) charge transfer can be employed. However, most of the existing approaches to V2V charge sharing are centralized or semi-centralized, incurring huge message overhead, long waiting time, and infrastructural cost. In this paper, we propose novel distributed heuristic algorithms for V2V charge sharing based on the multi-criteria decision-making policy. The problem is mapped to an alias classical problem (i.e., optimum matching in weighted bipartite graphs), where the goal is to maximize the matching cardinality while …


Rssafe: Personalized Driver Behavior Prediction For Safe Driving, Bhumika, Debasis Das, Sajal K. Das Jan 2022

Rssafe: Personalized Driver Behavior Prediction For Safe Driving, Bhumika, Debasis Das, Sajal K. Das

Computer Science Faculty Research & Creative Works

While the increased demand for taxi services like Uber, Lyft, Hailo, Ola, Grab, Cabify etc. provides livelihood to many drivers, the desire to raise income forces the drivers to work very hard without rest. However, continuous journeys not only affect their health, but also lead to abnormal driving behavior such as rash driving, swerving, sideslipping, sudden brakes, or weaving, leading to accidents in the worst cases. Motivated by the severity of rising accidents and health issues among drivers, this paper proposes a recommendation system, called RsSafe, for the safety of drivers. Aiming to improve the driving quality and the driver's …


Toward Feature-Preserving Vector Field Compression, Xin Liang, Sheng Di, Franck Cappello, Mukund Raj, Chunhui Liu, Kenji Ono, Zizhong Chen, Tom Peterka, Hanqi Guo Jan 2022

Toward Feature-Preserving Vector Field Compression, Xin Liang, Sheng Di, Franck Cappello, Mukund Raj, Chunhui Liu, Kenji Ono, Zizhong Chen, Tom Peterka, Hanqi Guo

Computer Science Faculty Research & Creative Works

The objective of this work is to develop error-bounded lossy compression methods to preserve topological features in 2D and 3D vector fields. Specifically, we explore the preservation of critical points in piecewise linear and bilinear vector fields. We define the preservation of critical points as, without any false positive, false negative, or false type in the decompressed data, (1) keeping each critical point in its original cell and (2) retaining the type of each critical point (e.g., saddle and attracting node). The key to our method is to adapt a vertex-wise error bound for each grid point and to compress …


Improving Age Of Information With Interference Problem In Long-Range Wide Area Networks, Preti Kumari, Hari Prabhat Gupta, Tanima Dutta, Sajal K. Das Jan 2022

Improving Age Of Information With Interference Problem In Long-Range Wide Area Networks, Preti Kumari, Hari Prabhat Gupta, Tanima Dutta, Sajal K. Das

Computer Science Faculty Research & Creative Works

Low Power Wide Area Networks (LPWAN) offer a promising wireless communications technology for Internet of Things (IoT) applications. Among various existing LPWAN technologies, Long-Range WAN (LoRaWAN) consumes minimal power and provides virtual channels for communication through spreading factors. However, LoRaWAN suffers from the interference problem among nodes connected to a gateway that uses the same spreading factor. Such interference increases data communication time, thus reducing data freshness and suitability of LoRaWAN for delay-sensitive applications. To minimize the interference problem, an optimal allocation of the spreading factor is requisite for determining the time duration of data transmission. This paper proposes a …


Mobility Management In Industrial Iot Environments, Marco Pettorali, Francesca Righetti, Carlo Vallati, Sajal K. Das, Giuseppe Anastasi Jan 2022

Mobility Management In Industrial Iot Environments, Marco Pettorali, Francesca Righetti, Carlo Vallati, Sajal K. Das, Giuseppe Anastasi

Computer Science Faculty Research & Creative Works

The Internet Engineering Task Force (IETF) has defined the 6TiSCH architecture to enable the Industrial Inter-net of Things (IIoT). Unfortunately, 6TiSCH does not provide mechanisms to manage node mobility, while many industrial applications involve mobile devices (e.g., mobile robots or wearable devices carried by workers). In this paper, we consider the Synchronized Single-hop Multiple Gateway framework to manage mobility in 6TiSCH networks. For this framework, we address the problem of positioning Border Routers in a deployment area, which is similar to the "Art Gallery"problem, proposing an efficient deployment policy for Border Routers based on geometrical rules. Moreover, we define a …


Mdz: An Efficient Error-Bounded Lossy Compressor For Molecular Dynamics, Kai Zhao, Sheng Di, Danny Perez, Xin Liang, Zizhong Chen, Franck Cappello Jan 2022

Mdz: An Efficient Error-Bounded Lossy Compressor For Molecular Dynamics, Kai Zhao, Sheng Di, Danny Perez, Xin Liang, Zizhong Chen, Franck Cappello

Computer Science Faculty Research & Creative Works

Molecular dynamics (MD) has been widely used in today's scientific research across multiple domains including materials science, biochemistry, biophysics, and structural biology. MD simulations can produce extremely large amounts of data in that each simulation could involve a large number of atoms (up to trillions) for a large number of timesteps (up to hundreds of millions). In this paper, we perform an in-depth analysis of a number of MD simulation datasets and then develop an efficient error-bounded lossy compressor that can significantly improve the compression ratios. The contributions are fourfold. (1) We characterize a number of MD datasets and summarize …


Spade: Multi-Stage Spam Account Detection For Online Social Networks, Federico Concone, Giuseppe Lo Re, Marco Morana, Sajal K. Das Jan 2022

Spade: Multi-Stage Spam Account Detection For Online Social Networks, Federico Concone, Giuseppe Lo Re, Marco Morana, Sajal K. Das

Computer Science Faculty Research & Creative Works

In recent years, Online Social Networks (OSNs) have radically changed the way people communicate. The most widely used platforms, such as Facebook, Youtube, and Instagram, claim more than one billion monthly active users each. Beyond these, news-oriented micro-blogging services, e.g., Twitter, are daily accessed by more than 120 million users sharing contents from all over the world. Unfortunately, legitimate users of the OSNs are mixed with malicious ones, which are interested in spreading unwanted, misleading, harmful, or discriminatory content. Spam detection in OSNs is generally approached by considering the characteristics of the account under analysis, its connection with the rest …


Look-Up Table Based Fhe System For Privacy Preserving Anomaly Detection In Smart Grids, Ruixiao Li, Shameek Bhattacharjee, Sajal K. Das, Hayato Yamana Jan 2022

Look-Up Table Based Fhe System For Privacy Preserving Anomaly Detection In Smart Grids, Ruixiao Li, Shameek Bhattacharjee, Sajal K. Das, Hayato Yamana

Computer Science Faculty Research & Creative Works

In advanced metering infrastructure (AMI), the customers' power consumption data is considered private but needs to be revealed to data-driven attack detection frameworks. In this paper, we present a system for privacy-preserving anomaly-based data falsification attack detection over fully homomorphic encrypted (FHE) data, which enables computations required for the attack detection over encrypted individual customer smart meter's data. Specifically, we propose a homomorphic look-up table (LUT) based FHE approach that supports privacy preserving anomaly detection between the utility, customer, and multiple partied providing security services. In the LUTs, the data pairs of input and output values for each function required …


Message From The Bits 2022 Workshop Co-Chairs, Sajal K. Das, Hayato Yamana, Keiichi Yasumoto, Shameek Bhattacharjee Jan 2022

Message From The Bits 2022 Workshop Co-Chairs, Sajal K. Das, Hayato Yamana, Keiichi Yasumoto, Shameek Bhattacharjee

Computer Science Faculty Research & Creative Works

No abstract provided.


Sum-Rate Optimization For Visible-Light-Band Uav Networks Based On Particle Swarm Optimization, Yuwei Long, Nan Cen Jan 2022

Sum-Rate Optimization For Visible-Light-Band Uav Networks Based On Particle Swarm Optimization, Yuwei Long, Nan Cen

Computer Science Faculty Research & Creative Works

The mobility nature of unmanned aerial vehicles (UAVs) takes them into high consideration in military, public, and civilian applications in recent years. However, scaling out millions of UAVs in the air will inevitably lead to a more crowded radio frequency (RF) spectrum. Therefore, researchers have been focused on new technologies such as millimeter-wave, Terahertz, and visible light communications (VLCs) to alleviate the spectrum crunch problem. VLC has shown its great potential for UAV networking because of its high data rate, interference-free to legacy RF spectrum, and low-complex frontends. While the physical layer design of the VLC system has been extensively …


Instructions To Authors, Academy Editors Jan 2022

Instructions To Authors, Academy Editors

Journal of the Arkansas Academy of Science

No abstract provided.


Table Of Contents, Academy Editors Jan 2022

Table Of Contents, Academy Editors

Journal of the Arkansas Academy of Science

No abstract provided.


Academy Presidents And Institutional Members, Academy Editors Jan 2022

Academy Presidents And Institutional Members, Academy Editors

Journal of the Arkansas Academy of Science

No abstract provided.


Business Meeting Report (Secretary's And Treasurer's Report), Academy Editors Jan 2022

Business Meeting Report (Secretary's And Treasurer's Report), Academy Editors

Journal of the Arkansas Academy of Science

No abstract provided.


Journal Of The Arkansas Academy Of Science - Volume 76, 2022, Academy Editors Jan 2022

Journal Of The Arkansas Academy Of Science - Volume 76, 2022, Academy Editors

Journal of the Arkansas Academy of Science

No abstract provided.


Geology Of The Jacksonville 7.5 Minute Quadrangle And U–Pb And (U–Th)/He Reveal Sediment Routing And Uplift In The Southern Appalachian Valley And Ridge Province, Derek L. Spurgeon Jan 2022

Geology Of The Jacksonville 7.5 Minute Quadrangle And U–Pb And (U–Th)/He Reveal Sediment Routing And Uplift In The Southern Appalachian Valley And Ridge Province, Derek L. Spurgeon

MSU Graduate Theses

The southern Appalachian Mountains have experienced multiple deformation events having undergone two full Wilson cycles. The foreland Valley and Ridge province is composed of sedimentary Paleozoic rock that range in age from earliest Cambrian to Middle Pennsylvanian. This sedimentary basin was intensely folded and faulted during the collision of Gondwana during the Middle to Late Carboniferous Period. From previous geologic structural mapping that has taken place, some large-scale structures in the Valley and Ridge Province seem to be out of sequence. To better understand the relationships in these structures, geologic mapping in high detail at the 1:24,000 scale coupled with …


A Game Theoretical Model Of Radiological Terrorism Defense, Shraddha Rane, Jason Timothy Harris Jan 2022

A Game Theoretical Model Of Radiological Terrorism Defense, Shraddha Rane, Jason Timothy Harris

International Journal of Nuclear Security

Radiological dispersal devices (RDD) pose a threat to the United States. Healthcare facilities housing high-risk radioactive materials and devices are potentially easy targets for unauthorized access and are vulnerable to malevolent acts of theft or sabotage. The three most attractive candidates for use in RDD considered in this study are: 60Co (radiosurgery devices), 137Cs (blood irradiators) and 192Ir (brachytherapy high dose radiation device). The threat posed by RDDs has led to evaluating the security risk of radioactive materials and defending against attacks. The concepts of risk analysis used in conjunction with game theory lay the foundations of …


There From The Beginning: The Women Of Los Alamos National Laboratory Supporting National And International Nuclear Security, Olga Martin, Laura Mcclellan, Octavio Ramos, Heather Quinn Jan 2022

There From The Beginning: The Women Of Los Alamos National Laboratory Supporting National And International Nuclear Security, Olga Martin, Laura Mcclellan, Octavio Ramos, Heather Quinn

International Journal of Nuclear Security

From the beginning of the Manhattan Project in the early 1940s, the women of what would become Los Alamos National Laboratory (LANL) worked in technical positions alongside their male counterparts, played a key role as computers, and worked in administrative jobs as secretaries, phone operators, bookkeepers, and on behalf of the U.S. Army in the Women’s Army Corps.

Throughout the history of the Laboratory, women experts at LANL helped establish and lead important national and international security programs, with careers in science, technology, engineering, and mathematics. Over time, the women of Los Alamos have come together under various Employee Resource …


Electronic Structure Of Early Transition Metal Complexes Supported By Pyridine Polypyrrolide Ligands, Dylan Connor Leary Jan 2022

Electronic Structure Of Early Transition Metal Complexes Supported By Pyridine Polypyrrolide Ligands, Dylan Connor Leary

Graduate Theses, Dissertations, and Problem Reports

A thorough study of photoluminescent molecules involving the pyridine polypyrrole(ide) ligand platform has been conducted. A detailed analysis on speciation of the proligand H2(MesPDPPh) (H2MesPDPPh = 2,6-bis(5-mesityl-3-phenyl-1H-pyrrol-2-yl)-pyridine) and its dilithium salt Li2(MesPDPPh) revealed temperature- and solvent-dependent effects. These molecules, along with the hydrochloric acid adduct [H3(MesPDPPh)]Cl were found to exhibit short-lived photoluminescence in both tetrahydrofuran and benzene solution. These findings confirm the hypothesis that heavy-atom involvement is crucial for the favorable photophysical properties observed for the Zr(PDP)2 …


Automatically Inferring Image Bases Of Arm32 Binaries, Daniel T. Chong Jan 2022

Automatically Inferring Image Bases Of Arm32 Binaries, Daniel T. Chong

Browse all Theses and Dissertations

Reverse engineering tools rely on the critical image base value for tasks such as correctly mapping code into virtual memory for an emulator or accurately determining branch destinations for a disassembler. However, binaries are often stripped and therefore, do not explicitly state this value. Currently available solutions for calculating this essential value generally require user input in the form of parameter configurations or manual binary analysis, thus these methods are limited by the experience and knowledge of the user. In this thesis, we propose a user-independent solution for determining the image base of ARM32 binaries and describe our implementation. Our …


Mercury Concentrations And Mercury Methylation Along The Freshwater To Marine Continuum, Lindsay D. Starr Jan 2022

Mercury Concentrations And Mercury Methylation Along The Freshwater To Marine Continuum, Lindsay D. Starr

Browse all Theses and Dissertations

Mercury (Hg) is a neurotoxin that can have detrimental impacts on the human nervous system and on brain development in infants. Methylmercury (MeHg) is the most toxic form of Hg and can concentrate to potentially harmful levels in higher levels of marine food webs. Production of MeHg in oxic water columns is poorly understood due to lack of knowledge of the mechanisms of formation and distribution. Recent work has reported widespread, putative Hg methylation genes in nitrite oxidizers, but any relationship with nitrifiers is unknown. This work focuses on Hg water column distribution, speciation, and methylation. The aims of this …


How Can Microgrids Help The Philippines’ Energy Transition? Adapting The Institutional Analysis And Development (Iad) Framework For Microgrid Development, John Charles A. Altomonte, Hannah Sofia Guinto Jan 2022

How Can Microgrids Help The Philippines’ Energy Transition? Adapting The Institutional Analysis And Development (Iad) Framework For Microgrid Development, John Charles A. Altomonte, Hannah Sofia Guinto

Environmental Science Faculty Publications

The Philippine energy sector remains plagued with issues of energy security, high electricity costs, and vulnerable grid infrastructure. This paper argues for the increased uptake of microgrids as a solution for these issues, using the Institutional Analysis and Development (IAD) Framework as a guide for microgrid policy. We begin this paper with an analysis of existing energy policies in the Philippines, highlighting a lacking integrated approach for energy security. The main discussion explores the IAD framework for microgrid development in the Philippines, identifying key barriers and dynamics among institutions and actors in the local energy sector. We then conclude with …


Impact Of Proton And Neutron Irradiation On Carrier Transport Properties In Ga2o3, Andrew C. Silverman Jan 2022

Impact Of Proton And Neutron Irradiation On Carrier Transport Properties In Ga2o3, Andrew C. Silverman

Honors Undergraduate Theses

This project studies the properties of minority charge carriers in beta gallium oxide (β -Ga2O3). The behavior of minority carriers is of high importance as it greatly affects conduction and consequently device performance. Cathodoluminescence (CL) spectroscopy and EBIC (Electron Beam Induced Current) are the main experimental techniques used to study minority carrier behavior.

High energy radiation affects minority carrier properties through damage to the material and through the production of carrier traps that reduce the conductivity and mobility of the material. In this investigation, we study the effects of various kinds of high energy radiation on …


Nebraska Tractor Summary: 1240 John Deere 6r 230 Infinitely Variable Transmission, Nebraska Tractor Test Lab Jan 2022

Nebraska Tractor Summary: 1240 John Deere 6r 230 Infinitely Variable Transmission, Nebraska Tractor Test Lab

Nebraska Tractor Tests

ABOUT THE TEST REPORT AND USE OF THE DATA The test data contained in this report are a tabulation of the results of a series of tests. Due to the restricted format of these pages, only a limited amount of data and not all of the tractor specifications are included. The full OECD report contains usually about 30 pages of data and specifications. The test data were obtained for each tractor under similar conditions and therefore, provide a means of comparison of performance based on a limited set of reported data. EXPLANATION OF THE TEST PROCEDURES Purpose The purpose of …


Nebraska Summary: 1241 John Deere 6r 250 Diesel Infinitely Variable Transmission, Nebraska Tractor Test Lab Jan 2022

Nebraska Summary: 1241 John Deere 6r 250 Diesel Infinitely Variable Transmission, Nebraska Tractor Test Lab

Nebraska Tractor Tests

ABOUT THE TEST REPORT AND USE OF THE DATA The test data contained in this report are a tabulation of the results of a series of tests. Due to the restricted format of these pages, only a limited amount of data and not all of the tractor specifications are included. The full OECD report contains usually about 30 pages of data and specifications. The test data were obtained for each tractor under similar conditions and therefore, provide a means of comparison of performance based on a limited set of reported data. EXPLANATION OF THE TEST PROCEDURES Purpose The purpose of …


Nebraska Summary: 1239 John Deere 6r 215diesel Infinitely Variable Transmission, Nebraska Tractor Test Lab Jan 2022

Nebraska Summary: 1239 John Deere 6r 215diesel Infinitely Variable Transmission, Nebraska Tractor Test Lab

Nebraska Tractor Tests

ABOUT THE TEST REPORT AND USE OF THE DATA The test data contained in this report are a tabulation of the results of a series of tests. Due to the restricted format of these pages, only a limited amount of data and not all of the tractor specifications are included. The full OECD report contains usually about 30 pages of data and specifications. The test data were obtained for each tractor under similar conditions and therefore, provide a means of comparison of performance based on a limited set of reported data. EXPLANATION OF THE TEST PROCEDURES Purpose The purpose of …


Nebraska Tractor Summary: 1238 John Deere 6r 195 Diesel Infinitely Variable Transmission, Nebraska Tractor Test Lab Jan 2022

Nebraska Tractor Summary: 1238 John Deere 6r 195 Diesel Infinitely Variable Transmission, Nebraska Tractor Test Lab

Nebraska Tractor Tests

ABOUT THE TEST REPORT AND USE OF THE DATA The test data contained in this report are a tabulation of the results of a series of tests. Due to the restricted format of these pages, only a limited amount of data and not all of the tractor specifications are included. The full OECD report contains usually about 30 pages of data and specifications. The test data were obtained for each tractor under similar conditions and therefore, provide a means of comparison of performance based on a limited set of reported data. EXPLANATION OF THE TEST PROCEDURES Purpose The purpose of …