Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Discipline
Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 7261 - 7290 of 302419

Full-Text Articles in Physical Sciences and Mathematics

Heed The Warning Signs: The Effectiveness Of Message Popup Warnings For Deterring The Spread Of Misinformation, Hollis Greenberg Jan 2024

Heed The Warning Signs: The Effectiveness Of Message Popup Warnings For Deterring The Spread Of Misinformation, Hollis Greenberg

CCE Theses and Dissertations

As false news can propagate to others rapidly, social media platforms employ multiple methods to combat misinformation. Debunking techniques are warning features embedded into a platform’s interface that alert readers of misinformation. These warnings have two goals: to “debunk” false information and to prevent the further spread of misinformation. Researchers have evaluated the effectiveness of debunking techniques to understand how users increase their awareness of misinformation, and what users do with the information given in warning messages. Message popup warnings are a newer and understudied type of debunking technique.

The overarching research question of this study was: Are message popup …


Assessing Organizational Investments In Cybersecurity And Financial Performance Before And After Data Breach Incidents Of Cloud Saas Platforms, Munther B. Ghazawneh Jan 2024

Assessing Organizational Investments In Cybersecurity And Financial Performance Before And After Data Breach Incidents Of Cloud Saas Platforms, Munther B. Ghazawneh

CCE Theses and Dissertations

Prior research indicated that providing inappropriate investment in organizations for Information Technology (IT) security makes these organizations suffer from IT security issues that may cause data breach incidents. Data breaches in cloud Software as a Service (SaaS) platforms lead to the disclosure of sensitive information, which causes disruption of services, damage to the organizational image, or financial losses. Massive data breaches still exist in cloud SaaS platforms which result in data leaks and data theft of customers in organizations.

IT security risks and vulnerabilities cost organizations millions of dollars a year as organizations may face an increase in cybersecurity challenges. …


Validating Machine And Human Decision-Making In Forensic Fire Debris Analysis, Frances A. Whitehead Jan 2024

Validating Machine And Human Decision-Making In Forensic Fire Debris Analysis, Frances A. Whitehead

Graduate Thesis and Dissertation 2023-2024

This work presents a background on the chemical complexity of fire debris analysis, including an ever-present matrix of pyrolysis products as the catalyst that led to the creation of the National Center for Forensic Science's Fire Debris Database. A selection of these 1,000+ casework-relevant ground truth samples was used to create two newly proposed analyst workflows to connect the current method of categorical reporting with evaluative reporting practices reflective of the strength of the evidence. Both workflows use linear sequential unmasking to help mitigate bias, a discrete scoring system for quantification of the analysis, and receiver operating characteristic (ROC) curves …


Optical Seed Development For Yb-Fiber Laser, James G. Brutus Jan 2024

Optical Seed Development For Yb-Fiber Laser, James G. Brutus

Graduate Thesis and Dissertation 2023-2024

Master Oscillator Power Amplifiers (MOPA) are laser systems that utilize a seed and pump amplification system to boost the output power of high-quality lower power seeding signals. MOPAs can generate high gain while avoiding many of the nonlinearities that negatively affect resonance-based lasers that are known to feature higher internal intensities. Additionally, MOPAs provide an easy alternative to the construction of novel laser technologies for higher output power as they can be easily combined with existing laser sources to amplify their output power.

This thesis outlines the design of an ytterbium-doped fiber laser (YDFL), featuring a MOPA architecture. The YDFL …


Collect Spatiotemporally Correlated Data In Iot Networks With An Energy-Constrained Uav, Wenzheng Xu, Heng Shao, Qunli Shen, Jian Peng, Wen Huang, Weifa Liang, Tang Liu, Xin Wei Yao, Tao Lin, Sajal K. Das Jan 2024

Collect Spatiotemporally Correlated Data In Iot Networks With An Energy-Constrained Uav, Wenzheng Xu, Heng Shao, Qunli Shen, Jian Peng, Wen Huang, Weifa Liang, Tang Liu, Xin Wei Yao, Tao Lin, Sajal K. Das

Computer Science Faculty Research & Creative Works

UAVs (Unmanned Aerial Vehicles) Are Promising Tools For Efficient Data Collections Of Sensors In IoT Networks. Existing Studies Exploited Both Spatial And Temporal Data Correlations To Reduce The Amount Of Collected Redundant Data, In Which Sensors Are First Partitioned Into Different Clusters, A Master Sensor In Each Cluster Then Collects Raw Data From Other Sensors And Compresses The Received Data. An Energy-Constrained UAV Finally Collects The Maximum Amount Of Compressed Data From Different Master Sensors. We However Notice That The Compressed Data From Only A Portion Of Clusters Are Collected By The UAV In The Existing Studies, While The Data …


Stitching Satellites To The Edge: Pervasive And Efficient Federated Leo Satellite Learning, Mohamed Elmahallawy, Tony Tie Luo Jan 2024

Stitching Satellites To The Edge: Pervasive And Efficient Federated Leo Satellite Learning, Mohamed Elmahallawy, Tony Tie Luo

Computer Science Faculty Research & Creative Works

In the Ambitious Realm of Space AI, the Integration of Federated Learning (FL) with Low Earth Orbit (LEO) Satellite Constellations Holds Immense Promise. However, Many Challenges Persist in Terms of Feasibility, Learning Efficiency, and Convergence. These Hurdles Stem from the Bottleneck in Communication, Characterized by Sporadic and Irregular Connectivity between LEO Satellites and Ground Stations, Coupled with the Limited Computation Capability of Satellite Edge Computing (SEC). This Paper Proposes a Novel FL-SEC Framework that Empowers LEO Satellites to Execute Large-Scale Machine Learning (ML) Tasks Onboard Efficiently. its Key Components Include I) Personalized Learning Via Divide-And-Conquer, Which Identifies and Eliminates Redundant …


On A Fully Coupled Nonlocal Multipoint Boundary Value Problem For A Dual Hybrid System Of Nonlinear Q -Fractional Differential Equations, Ahmed Alsaedi, Martin Bohner, Bashir Ahmad, Boshra Alharbi Jan 2024

On A Fully Coupled Nonlocal Multipoint Boundary Value Problem For A Dual Hybrid System Of Nonlinear Q -Fractional Differential Equations, Ahmed Alsaedi, Martin Bohner, Bashir Ahmad, Boshra Alharbi

Mathematics and Statistics Faculty Research & Creative Works

A new class of nonlocal multipoint boundary value problems involving a dual hybrid system of nonlinear Riemann-Liouville-type q-fractional differential equations is studied in this paper. Existence and uniqueness results for the given problem are derived by applying the Leray-Schauder nonlinear alternative and the Banach contraction mapping principle. Examples are presented for illustrating the obtained results. The work established in this paper is a useful contribution to the existing literature on q-fractional differential equations. Some interesting special cases are also discussed.


Critical Point Approaches To Nonlinear Square Root Laplacian Equations, Martin Bohner, Giuseppe Caristi, Shapour Heidarkhani, Amjad Salari Jan 2024

Critical Point Approaches To Nonlinear Square Root Laplacian Equations, Martin Bohner, Giuseppe Caristi, Shapour Heidarkhani, Amjad Salari

Mathematics and Statistics Faculty Research & Creative Works

This work is devoted to the study of multiplicity results of solutions for a class of nonlinear equations involving the square root of the Laplacian. Indeed, we will use variational methods for smooth functionals, defined on reflexive Banach spaces, in order to achieve the existence of at least three solutions for the equations. Moreover, assuming that the nonlinear terms are nonnegative, we will prove that the solutions are nonnegative. Finally, by presenting an example, we will ensure the applicability of our results.


Identifying The Origins Of Business’ Data Breaches Utilizing Covert Timing Channels, Gayle L. Frisbie Jan 2024

Identifying The Origins Of Business’ Data Breaches Utilizing Covert Timing Channels, Gayle L. Frisbie

Master's Theses and Doctoral Dissertations

Cybersecurity events and data breaches are on the rise and are very costly to businesses. Businesses rely on connectivity and information systems to conduct business, yet those same information systems can be breached and the organization's data exposed. Today, there is a heavy reliance of organizations upon network connections to connect the entire organization in order to conduct business efficiently and from multiple locations. Covert timing channels are a cybersecurity attack method in which malicious actors embed privileged information into normal network traffic without authorization. Malicious actors, by carefully manipulating timing patterns in covert timing channels, can create a hidden …


Towards A Transparency-Based, Value-Sensitive Design Solution For Bias In Self-Driving Cars: An Ethical Violation Assessment And Risk Analysis Framework On Consumer-Held Values, Nada Ahmad Madkour Jan 2024

Towards A Transparency-Based, Value-Sensitive Design Solution For Bias In Self-Driving Cars: An Ethical Violation Assessment And Risk Analysis Framework On Consumer-Held Values, Nada Ahmad Madkour

Master's Theses and Doctoral Dissertations

Background: The rapid growth of automated systems and artificial intelligence (AI), particularly, self-driving cars (SDCs), has attracted significant investments and can potentially contribute to humanity’s flourishing. However, before widespread adoption, it is important to address ethical violations such as bias in AI, highlighted by many real-world cases of bias in AI leading to unfair outcomes in tools like facial recognition, hiring software, and pedestrian detection. Bias in AI can lead to potentially fatal outcomes in SDCs, emphasizing the need for a thorough examination of bias in SDCs.

Purpose: To enhance AI ethics by providing tools to support transparency and value- …


Automatic Modeling Of Cyber Intrusions Using The Diamond Model Utilizing Security Logs And Events, Mahmoud Al-Maani Jan 2024

Automatic Modeling Of Cyber Intrusions Using The Diamond Model Utilizing Security Logs And Events, Mahmoud Al-Maani

Master's Theses and Doctoral Dissertations

Current intrusion analysis models suffer from unreliability and inaccuracy due to their reliance on outdated and inadequate data sources. Numerous models focus on a particular type of data, leading to potential modeling faults in intrusion analysis models' recommendations. The objective of this thesis is to build a modernized model by integrating the diamond model with security information and event management systems. This thesis presents a detailed cyber intrusion analysis model; in which Elasticsearch is being used to collect and analyze logs about cyber attacks and extract major indicators of compromise then finally map them to the diamond model. The results …


Probing The Ising Model’S Thermodynamics Through Restricted Boltzmann Machines, Xiaobei (Emma) Zhang Jan 2024

Probing The Ising Model’S Thermodynamics Through Restricted Boltzmann Machines, Xiaobei (Emma) Zhang

HMC Senior Theses

This thesis explores the connection between physics and machine learning by using Restricted Boltzmann Machines (RBMs) to study the thermodynamic properties of the Ising model. The Ising model is a simple but realistic model that captures the magnetic behavior of a system, where spins occupy a lattice of sites and different spin configurations correspond to different energies. The model exhibits phase transitions between ferromagnetic and paramagnetic phases as a function of temperature. RBMs are two-layered neural networks that can learn probability distributions over binary spins. The study generates 2D Ising model data at different temperatures using Monte Carlo simulations, including …


Solving Robert Wilson’S 𝑡 ≠ 2 Conjecture On Graham Sequences, Krishna Rajesh Jan 2024

Solving Robert Wilson’S 𝑡 ≠ 2 Conjecture On Graham Sequences, Krishna Rajesh

HMC Senior Theses

Ron Graham's sequence is a surprising bijection from the natural numbers to the non-prime integers, which is constructed by looking at sequences whose product is square. In this thesis we will resolve a 22-year-old conjecture about this bijection, by construction of explicit sequences in a modified number theoretic context. Additionally, we will discuss the history of this problem, and give computational techniques for computing this bijection, levering ideas from linear algebra over the finite field of two elements.


The Dual Boundary Complex Of The Moduli Space Of Cyclic Compactifications, Toby Anderson Jan 2024

The Dual Boundary Complex Of The Moduli Space Of Cyclic Compactifications, Toby Anderson

HMC Senior Theses

Moduli spaces provide a useful method for studying families of mathematical objects. We study certain moduli spaces of algebraic curves, which are generalizations of familiar lines and conics. This thesis focuses on, Δ(r,n), the dual boundary complex of the moduli space of genus-zero cyclic curves. This complex is itself a moduli space of graphs and can be investigated with combinatorial methods. Remarkably, the combinatorics of this complex provides insight into the geometry and topology of the original moduli space. In this thesis, we investigate two topologically invariant properties of Δ(r,n). We compute its Euler characteristic and …


Exploring Sigmoidal Bounded Confidence Models With Mean Field Methods, Tian Dong Jan 2024

Exploring Sigmoidal Bounded Confidence Models With Mean Field Methods, Tian Dong

HMC Senior Theses

Mathematicians use models of opinion dynamics to describe how opinions in a group of people change over time, which can yield insight into mechanisms behind phenomena like polarization and consensus. In these models, mathematicians represent the community as a graph, where nodes represent agents and edges represent possible interactions. Opinion updates are modeled with a system of differential equations (ODEs). Our work focuses on the sigmoidal bounded confidence model (SBCM), where agents update their opinion toward a weighted average of their neighbors' opinions by weighting similar opinions more heavily. Using tools developed in physics (mean-field theory), we derive a continuity …


A Combinatorial Model For Affine Demazure Crystals Of Levels Zero And One, Samuel Spellman Jan 2024

A Combinatorial Model For Affine Demazure Crystals Of Levels Zero And One, Samuel Spellman

Electronic Theses & Dissertations (2024 - present)

The symmetric and non-symmetric Macdonald polynomials are special families of orthogonal polynomials with parameters q and t. They are indexed by dominant, (resp. arbitrary) weights associated to a root system and generalize several well-known polynomials such as the Schur polynomials, Jack polynomials, Hall-Littlewood polynomials, etc. There are two well-known combinatorial models for computing these polynomials: a tableau model in type A, due to Haglund, Haiman and Loehr, and a type-independent model due to Ram and Yip, based on alcove walks.

Crystals bases are an important construction encoding information about Lie algebra representations. It turns out that there is an interesting …


Examining Downshear Reformation In Tropical Cyclones, Nathalie Rivera Torres Jan 2024

Examining Downshear Reformation In Tropical Cyclones, Nathalie Rivera Torres

Electronic Theses & Dissertations (2024 - present)

The development of a new low-level circulation center in tropical cyclones, known as downshear reformation, can lead to sudden changes in storm structure and intensity, representing a challenge in forecasting tropical cyclones. This phenomenon is commonly observed in weak tropical cyclones (e.g., tropical depressions, tropical storms) experiencing moderate to strong vertical wind shear (> 5 m s-1), when the vertical wind shear organizes convection in the downshear region of the tropical cyclone, and lower-tropospheric vorticity is generated within the intense convection. Downshear reformation has been proposed as a mechanism for intensification, sometimes rapidly, in tropical cyclones under unfavorable environmental wind …


Polar Stacking Of Dipole Parallel-Aligned Monolayers Of Unsymmetrical 1,4-Diphenyl-1,3-Butadienes Creates Nonlinear Optical Materials: Insights From Experiments Guide Structure Assignments, Harmeet Bhoday, Justin Nulsen, Steven P. Kelley, Rainer Glaser Jan 2024

Polar Stacking Of Dipole Parallel-Aligned Monolayers Of Unsymmetrical 1,4-Diphenyl-1,3-Butadienes Creates Nonlinear Optical Materials: Insights From Experiments Guide Structure Assignments, Harmeet Bhoday, Justin Nulsen, Steven P. Kelley, Rainer Glaser

Chemistry Faculty Research & Creative Works

A series of 1-(4′-halophenyl)-4-(4″-methoxyphenyl) buta-1,3-dienes, (H, MeO, Y)-1,4-diphenylbutadienes with halogens Y = F (1), Cl (2), Br (3), and I (4) are described. Crystal structure analysis establishes that 1-4 present a new class of highly dipole parallel-aligned polar organic molecular materials for nonlinear optics (NLO). Building on previous studies of polar crystals of unsymmetrical acetophenone azines, (R, X, Y)-azines, X-Ph-CR═N-N═CR-Ph-Y (R = Me; X = R'O, PhO, R'OPh; Y = F, Cl, Br, I), we suspected that the all-carbon analogs (R, R'O, Y)-1,4-diphenylbutadienes, R'O-Ph-CR═CH-CH═CR-Ph-Y, could crystallize with polar lattices and feature stronger NLO effects because of their improved conjugation and …


The Effect Of Nanomorphology As Quantified Via The K-Index On The Drug Delivery Properties Of Isocyanate-Derived Aerogels, Stephen Y. Owusu, A. B.M.Shaheen Ud Doulah, Vaibhav A. Edlabadkar, Kamden J. George, Chariklia Sotiriou-Leventis Jan 2024

The Effect Of Nanomorphology As Quantified Via The K-Index On The Drug Delivery Properties Of Isocyanate-Derived Aerogels, Stephen Y. Owusu, A. B.M.Shaheen Ud Doulah, Vaibhav A. Edlabadkar, Kamden J. George, Chariklia Sotiriou-Leventis

Chemistry Faculty Research & Creative Works

This study explores the potential to predict the drug-loading and release profiles of aerogels based on their morphologies: a milestone in drug delivery research, which can help save time and cost in formulating new aerogel drug carriers and cut-down evaluation of the drug delivery capabilities of aerogels to a few experimental runs. Polyurea (PUA) and poly(isocyanurate-urethane) (PIR-PUR) aerogels were used as model systems, while 5-fluorouracil (5-FU) and paracetamol (PM) were used as model drugs. These model systems were chosen because they can be synthesized into different morphologies, which can be quantified by the so-called K-index (water contact angle divided by …


Message From Bits 2024 Co-Chairs And Technical Program Co-Chairs; Smartcomp 2024, Sajal K. Das, Hayato Yamana, Keiichi Yasumoto, Shameek Bhattacharjee Jan 2024

Message From Bits 2024 Co-Chairs And Technical Program Co-Chairs; Smartcomp 2024, Sajal K. Das, Hayato Yamana, Keiichi Yasumoto, Shameek Bhattacharjee

Computer Science Faculty Research & Creative Works

No abstract provided.


Landmark-Based Localization Using Stereo Vision And Deep Learning In Gps-Denied Battlefield Environment, Ganesh Sapkota, Sanjay Madria Jan 2024

Landmark-Based Localization Using Stereo Vision And Deep Learning In Gps-Denied Battlefield Environment, Ganesh Sapkota, Sanjay Madria

Computer Science Faculty Research & Creative Works

Localization in a battlefield environment is increasingly challenging as GPS connectivity is often denied or unreliable, and physical deployment of anchor nodes across wireless networks for localization can be difficult in hostile battlefield terrain. This paper proposes a novel framework for the localization of moving objects in non-GPS battlefield environments using stereo vision and a deep learning model by recognizing naturally existing or artificial landmarks as anchors. The proposed method utilizes a custom-calibrated stereo vision camera for distance estimation and the YOLOv8s model, which is trained and fine-tuned with our real-world dataset for landmark anchor recognition. The depth images are …


Posca: Path Optimization For Solar Cover Amelioration In Urban Air Mobility, Debjyoti Sengupta, Anurag Satpathy, Sajal K. Das Jan 2024

Posca: Path Optimization For Solar Cover Amelioration In Urban Air Mobility, Debjyoti Sengupta, Anurag Satpathy, Sajal K. Das

Computer Science Faculty Research & Creative Works

Urban Air Mobility (UAM) encompasses both piloted and autonomous aerial vehicles, spanning from small unmanned aerial vehicles (UAVs) like drones to passenger-carrying personal air vehicles (PAVs), to revolutionize smart transportation in congested urban areas. This emerging paradigm is anticipated to offer disruptive solutions to the mobility challenges in congested cities. In this context, a pivotal concern centers on the sustainability of transitioning to this mode of transportation, especially with the focus on incorporating clean technology into developing innovative solutions from the ground up. Recent studies highlight that a significant portion of the total energy consumption in UAM can be attributed …


Tasr: A Novel Trust-Aware Stackelberg Routing Algorithm To Mitigate Traffic Congestion, Doris E.M. Brown, Venkata Sriram Siddhardh Nadendla, Sajal K. Das Jan 2024

Tasr: A Novel Trust-Aware Stackelberg Routing Algorithm To Mitigate Traffic Congestion, Doris E.M. Brown, Venkata Sriram Siddhardh Nadendla, Sajal K. Das

Computer Science Faculty Research & Creative Works

A Stackelberg routing platform (SRP) reduces congestion in one-shot traffic networks by proposing optimal route recommendations to the selfish travelers. Traditionally, Stackel-berg routing is cast as a partial control problem where a fraction of the traveler flow complies with route recommendations, while the remaining responds as selfish travelers. In this paper, we formulate a novel Stackelberg routing framework where the agents exhibit probabilistic compliance by accepting SRP's route recommendations with a trust probability. Specifically, we propose a greedy Trust-Aware Stackelberg Routing algorithm (in short, TASR) for SRP to compute unique path recommendations to each traveler flow with a unique demand. …


Minerrouter : Effective Message Routing Using Contact-Graphs And Location Prediction In Underground Mine, Abhay Goyal, Sanjay Madria, Samuel Frimpong Jan 2024

Minerrouter : Effective Message Routing Using Contact-Graphs And Location Prediction In Underground Mine, Abhay Goyal, Sanjay Madria, Samuel Frimpong

Computer Science Faculty Research & Creative Works

Location-based distributed communication in underground mines has been a hard problem to solve due to unreliable centralized architecture such as leaky feeder systems, high attenuation, and the unavailability of GPS signals. Delay Tolerant Networks (DTN) enable decentralized message routing using the store-carry-forward method that can help in creating situational awareness needed to handle emergency and disaster scenarios. The ability to predict where the DTN nodes (miner) might have been at/are headed to (with respect to the mine regions and pillars) at different times, combined with contact-based routing and intelligent handling of buffer, can be used for better delivery of messages. …


Unsafe Events Detection In Smart Water Meter Infrastructure Via Noise-Resilient Learning, Ayanfeoluwa Oluyomi, Sahar Abedzadeh, Shameek Bhattacharjee, Sajal K. Das Jan 2024

Unsafe Events Detection In Smart Water Meter Infrastructure Via Noise-Resilient Learning, Ayanfeoluwa Oluyomi, Sahar Abedzadeh, Shameek Bhattacharjee, Sajal K. Das

Computer Science Faculty Research & Creative Works

Residential smart water meters (SWMs) collect real-time water consumption data, enabling automated billing and peak period forecasting. The presence of unsafe events is typically detected via deviations from the benign profile of water usage. However, profiling the benign behavior is non-trivial for large-scale SWM networks because once deployed, the collected data already contain those events, biasing the benign profile. To address this challenge, we propose a real-time data-driven unsafe event detection framework for city-scale SWM networks that automatically learns the profile of benign behavior of water usage. Specifically, we first propose an optimal clustering of SWMs based on the recognition …


Traffic Prediction-Based Vnf Auto-Scaling And Deployment Mechanism For Flexible And Elastic Service Provision, Bo Yi, Jiacheng Wang, Qiang He, Xingwei Wang, Min Huang, Sajal K. Das, Keqin Li Jan 2024

Traffic Prediction-Based Vnf Auto-Scaling And Deployment Mechanism For Flexible And Elastic Service Provision, Bo Yi, Jiacheng Wang, Qiang He, Xingwei Wang, Min Huang, Sajal K. Das, Keqin Li

Computer Science Faculty Research & Creative Works

Network Function Virtualization (NFV) provides a flexible way to provision new services by decoupling network functions from hardware and implementing them as Virtual Network Functions (VNFs). However, the rapid development of technologies greatly promotes the explosion of diverse services, which directly results in the exponential increase of heterogeneous traffic. In addition, such a tremendous amount of heterogeneous traffic will generate bursts in a more dynamic and unexpected manner, so it becomes extremely hard to satisfy the customer demands. Aiming at addressing these challenges, this work proposes a positive and elastic VNF deployment mechanism for service provisioning, which introduces three novelties: …


Federated Graph Anomaly Detection Via Contrastive Self-Supervised Learning, Xiangjie Kong, Wenyi Zhang, Hui Wang, Mingliang Hou, Xin Chen, Xiaoran Yan, Sajal K. Das Jan 2024

Federated Graph Anomaly Detection Via Contrastive Self-Supervised Learning, Xiangjie Kong, Wenyi Zhang, Hui Wang, Mingliang Hou, Xin Chen, Xiaoran Yan, Sajal K. Das

Computer Science Faculty Research & Creative Works

Attribute graph anomaly detection aims to identify nodes that significantly deviate from the majority of normal nodes and has received increasing attention due to the ubiquity and complexity of graph-structured data in various real-world scenarios. However, current mainstream anomaly detection methods are primarily designed for centralized settings, which may pose privacy leakage risks in certain sensitive situations. Although federated graph learning offers a promising solution by enabling collaborative model training in distributed systems while preserving data privacy, a practical challenge arises as each client typically possesses a limited amount of graph data. Consequently, naively applying federated graph learning directly to …


Log Sequence Anomaly Detection Based On Template And Parameter Parsing Via Bert, Xiaolin Chai, Hang Zhang, Jue Zhang, Yan Sun, Sajal K. Das Jan 2024

Log Sequence Anomaly Detection Based On Template And Parameter Parsing Via Bert, Xiaolin Chai, Hang Zhang, Jue Zhang, Yan Sun, Sajal K. Das

Computer Science Faculty Research & Creative Works

Logs record various operations and events during system running in text format, which is an essential basis for detecting and identifying potential security threats or system failures and is widely used in system management to ensure security and reliability. Existing log sequence anomaly detection is limited by log parsing and does not consider all key features of logs, which may cause false or missed detection. In this paper, we propose a fast and accurate log parsing method and feed the entire log content into the deep learning network for analysis. To avoid semantic loss during parsing, we replace some variables …


L3geocast: Enabling P4-Based Customizable Network-Layer Geocast At The Network Edge, Xindi Hou, Shuai Gao, Ningchun Liu, Fangtao Yao, Hongke Zhang, Sajal K. Das Jan 2024

L3geocast: Enabling P4-Based Customizable Network-Layer Geocast At The Network Edge, Xindi Hou, Shuai Gao, Ningchun Liu, Fangtao Yao, Hongke Zhang, Sajal K. Das

Computer Science Faculty Research & Creative Works

Geocast is a one-to-many communication paradigm that enables the transmission of data packets to a designated area rather than an IP address. The most common geocast solutions rely on the application-layer Geolocation-to-IP database. But these IP-based approaches cannot cope with the challenges of flexibility and mobility in a granularity-customizable geocast scenario. While some non-IP network-layer (L3) attempts have resulted in low addressing accuracy and poor routing scalability. Besides, the clean-slate design is incompatible with the existing network. To address these issues, this article proposes an innovative network-layer geographic addressing scheme that leverages P4-based Software Defined Networks (SDN) to enable flexible …


Mobilytics: Mobility Analytics Framework For Transferring Semantic Knowledge, Shreya Ghosh, Soumya K. Ghosh, Sajal K. Das, Prasenjit Mitra Jan 2024

Mobilytics: Mobility Analytics Framework For Transferring Semantic Knowledge, Shreya Ghosh, Soumya K. Ghosh, Sajal K. Das, Prasenjit Mitra

Computer Science Faculty Research & Creative Works

The proliferation of sensor-equipped smartphones has led to the generation of vast amounts of GPS data, such as timestamped location points, enabling a range of location-based services. However, deciphering the spatio-temporal dynamics of mobility to understand the underlying motivations behind travel patterns presents a significant challenge. his paper focuses on how individuals' GPS traces (latitude, longitude, timestamp) interpret the connection and correlations among different entities such as people, locations or point-of-interests (POIs), and semantic contexts (trip-purpose). We introduce a mobility analytics framework, named Mobilytics designed to identify trip purposes from individual GPS traces by leveraging a “mobility knowledge graph” (MKG) …