2023 IEEE Long Island Systems, Applications and Technology Conference (LISAT)最新文献

筛选
英文 中文
Effect of Silica nanoparticles (Laponite) on 3D printed Gelatin Methacryloyl Cell-based Scaffolds 二氧化硅纳米颗粒(拉脱石)对3D打印明胶甲基丙烯酰细胞支架的影响
2023 IEEE Long Island Systems, Applications and Technology Conference (LISAT) Pub Date : 2023-05-05 DOI: 10.1109/LISAT58403.2023.10179559
Naomi Edwards, S. Tharakan, M. Hadjiargyrou, A. Ilyas
{"title":"Effect of Silica nanoparticles (Laponite) on 3D printed Gelatin Methacryloyl Cell-based Scaffolds","authors":"Naomi Edwards, S. Tharakan, M. Hadjiargyrou, A. Ilyas","doi":"10.1109/LISAT58403.2023.10179559","DOIUrl":"https://doi.org/10.1109/LISAT58403.2023.10179559","url":null,"abstract":"Surgical resection of bone is largely due to trauma and tumors, resulting in a critical size defect (CSD). Treatment of CSDs involves the use of synthetic or biological grafts to foster tissue growth and bone regeneration. Modern advancements in tissue engineering allow for the rapid creation of such biocompatible scaffolds to assist in bone regeneration. Gelatin methacryloyl (after dialysis) is biocompatible and fosters cell proliferation but it is printable using a 3D printer due to excessive water content. Here, we investigated a novel composite biomaterial comprising of Gelatin Methacryloyl (GelMA), Laponite (LP), and tween 80 for its 3D printing capability with cells and biomechanical characteristics. These cell-laden composite scaffolds demonstrated the ability to degrade slowly across 14 days and were able to retain large amounts of fluid within 24 hours. Cell proliferation was significantly improved 14 days with the presence LP in the GelMA scaffolds.","PeriodicalId":250536,"journal":{"name":"2023 IEEE Long Island Systems, Applications and Technology Conference (LISAT)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114657531","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Smart Acquiring Platform in Contactless Payments using Advanced Machine Learning : Security Controls using Device Recognition, Geo Fencing and Customer on File 使用先进机器学习的非接触式支付智能收单平台:使用设备识别、地理围栏和客户档案的安全控制
2023 IEEE Long Island Systems, Applications and Technology Conference (LISAT) Pub Date : 2023-05-05 DOI: 10.1109/LISAT58403.2023.10179552
Bharathan Kasthuri Rengan
{"title":"Smart Acquiring Platform in Contactless Payments using Advanced Machine Learning : Security Controls using Device Recognition, Geo Fencing and Customer on File","authors":"Bharathan Kasthuri Rengan","doi":"10.1109/LISAT58403.2023.10179552","DOIUrl":"https://doi.org/10.1109/LISAT58403.2023.10179552","url":null,"abstract":"Acquiring platform (Merchant Bank) today faces greater Merchant Fraud cases (catering to small medium business) post pandemic as new methods of payments are evolving. In many cases, the fraud merchants, present the legitimate Know Your Customer (KYC) documents and complete onboarding like a legitimate merchant profile. Acquirers need to mitigate the merchant risk in Payments (multiple method of payments – card Present, card Not Present, contactless Payments (Tap to Pay, Apple Pay, Samsung Pay, using Near-Field Communication (NFC) and biometric based payments), in Point of Sale (PoS) and in large ecommerce portals). To address this, acquiring platform needs to build a comprehensive risk management platform with large set of data from multiple sources (device activity, merchant activity over time, analyze merchant portfolio for a specific geography and finally line of business). Acquirer needs to also analyze KYC data as well as payment data (over period of time). While doing so, risk platform needs to address both account fraud and payments fraud. It also needs to balance accuracy in fraud detection and without compromising high authorization rates. As new payment methods emerge, it is critical that risk management platform gets data from various sources in addition to just KYC and payment data. These are device /peripherals – Internet of Things (IoT) data, leveraging estate management, tracking geo location, analyzing transaction pattern (over period of twenty hours), profiling merchants and merchant segmentation. Risk management platform needs to address PoS3 needs specifically.","PeriodicalId":250536,"journal":{"name":"2023 IEEE Long Island Systems, Applications and Technology Conference (LISAT)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116231127","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mitigating Man-In-The-Middle Attack Using Quantum Key Distribution 利用量子密钥分发缓解中间人攻击
2023 IEEE Long Island Systems, Applications and Technology Conference (LISAT) Pub Date : 2023-05-05 DOI: 10.1109/LISAT58403.2023.10179560
S. Alhazmi, Prashanna Kandel, Jayne Sabovik, Nadine Matondo-Mvula, K. Elleithy
{"title":"Mitigating Man-In-The-Middle Attack Using Quantum Key Distribution","authors":"S. Alhazmi, Prashanna Kandel, Jayne Sabovik, Nadine Matondo-Mvula, K. Elleithy","doi":"10.1109/LISAT58403.2023.10179560","DOIUrl":"https://doi.org/10.1109/LISAT58403.2023.10179560","url":null,"abstract":"While the use of Quantum Key Distribution is very secure, some faults can occur, specifically, that can create a manin-the-middle attack. This paper examines how the man-in-the-middle attack can occur and why Quantum Key Distribution is still the superior encryption choice. Applying Post-Quantum Cryptography (FALCON Algorithm) to the Quantum Key Distribution should create more secure encryption to mitigate a man-in-the-middle attack, thusly protecting the communication from the eavesdropper.","PeriodicalId":250536,"journal":{"name":"2023 IEEE Long Island Systems, Applications and Technology Conference (LISAT)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129790279","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards ARSPI-Net: development of an efficient hybrid deep learning framework 迈向ARSPI-Net:一个高效混合深度学习框架的开发
2023 IEEE Long Island Systems, Applications and Technology Conference (LISAT) Pub Date : 2023-05-05 DOI: 10.1109/LISAT58403.2023.10179592
Andre C. Lane, Wendy Tang, Brady D. Nelson
{"title":"Towards ARSPI-Net: development of an efficient hybrid deep learning framework","authors":"Andre C. Lane, Wendy Tang, Brady D. Nelson","doi":"10.1109/LISAT58403.2023.10179592","DOIUrl":"https://doi.org/10.1109/LISAT58403.2023.10179592","url":null,"abstract":"In this paper, we implement and experiment with a portion of our overall hybrid deep learning framework, An Affective hYbrid SPIking Neural Network [ARSPI-NET]. In order to motivate and show the usage of liquid state machines as an efficient, feature extraction framework we perform experiments on connection architecture as well as neuron model and their effect on overall classification performance. We perform our initial experimentation on the MNIST dataset and achieve a 87% classification using a liquid state machine and logistic regression classifier. Our results suggest that our framework can compare with current models in terms of accuracy, however, we outperform traditional deep learning methods in terms of energy consumption and the potential to move to energy-efficient neuromorphic platforms. In addition, our framework has the advantage of being more interpretable, as it allows us to model the spatiotemporal dynamics of signals through the usage of a liquid reservoir and an interpretable readout vector. This paper sets precedence for future experimentation and development of ARSPI-Net as a hybrid deep learning framework.","PeriodicalId":250536,"journal":{"name":"2023 IEEE Long Island Systems, Applications and Technology Conference (LISAT)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132204521","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Key Vulnerabilities in SSL & TLS That Needs To Be Mitigated 需要缓解的SSL和TLS中的关键漏洞
2023 IEEE Long Island Systems, Applications and Technology Conference (LISAT) Pub Date : 2023-05-05 DOI: 10.1109/LISAT58403.2023.10179546
S. Alhazmi, K. Elleithy
{"title":"Key Vulnerabilities in SSL & TLS That Needs To Be Mitigated","authors":"S. Alhazmi, K. Elleithy","doi":"10.1109/LISAT58403.2023.10179546","DOIUrl":"https://doi.org/10.1109/LISAT58403.2023.10179546","url":null,"abstract":"The cryptographic security protocols are designed to ensure that the information transmission that is taking place between two entities is secured and is not impacted while interaction occurs among them. Security protocols are a set of rules that are formulated to ensure that the intruder or third party is not able to access the information that is transmitted. In this context, one of the algorithms that could be used is the RC4 algorithm. There are many discussions about the RC4 algorithm, but as of now is only theoretically dominant. It is a fact that the theory alone cannot complete the RCA algorithm process in a detailed manner. The applications reveal the input and do not produce any output of the processes involved. This research paper will illustrate the vulnerability and possible solutions to avoid the RC4 Algorithm attack.","PeriodicalId":250536,"journal":{"name":"2023 IEEE Long Island Systems, Applications and Technology Conference (LISAT)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121707976","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A cloud-based fire safety system for emergency responders and civic community 一个基于云的消防安全系统,用于应急人员和公民社区
2023 IEEE Long Island Systems, Applications and Technology Conference (LISAT) Pub Date : 2023-05-05 DOI: 10.1109/LISAT58403.2023.10179600
Swarnamouli Majumdar, Sonny E. Kirkley
{"title":"A cloud-based fire safety system for emergency responders and civic community","authors":"Swarnamouli Majumdar, Sonny E. Kirkley","doi":"10.1109/LISAT58403.2023.10179600","DOIUrl":"https://doi.org/10.1109/LISAT58403.2023.10179600","url":null,"abstract":"The main goal of this research is to identify, demonstrate, and provide a secure approach to homeowners in creating fire-safety checklists and pre-incident plans of their homes, and uploading them through a secure cloud service to the centralized fire safety cloud-based system, ALIKE, which in turn provides updated and scalable views of the home interiors for their local fire departments. ALIKE is a cloud-based system that integrates 3D scans, AI, image recognition, and augmented reality to help homeowners improve the safety of their homes and conduct pre-incident planning with the local fire department. The ALIKE system provides for two modal approaches: the homeowner system approach and the firefighter system approach. Watson AI functionality within ALIKE system can identify potential fire safety issue in the home, examine the issue and recommend fire safe products to mitigate the potential hazard. Thus, the cause of residential fires would be reduced to a great extent, providing safer homes for residents.","PeriodicalId":250536,"journal":{"name":"2023 IEEE Long Island Systems, Applications and Technology Conference (LISAT)","volume":"221 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122828426","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancement of CNNHQ with an Activation Function 用激活函数增强CNNHQ
2023 IEEE Long Island Systems, Applications and Technology Conference (LISAT) Pub Date : 2023-05-05 DOI: 10.1109/LISAT58403.2023.10179557
Abdulrahman Kariri, Mohammed Aljamal, Jinan Al Aridhee, Ismaiel Albukhari, Nadine Matondo-Mvula, K. Elleithy
{"title":"Enhancement of CNNHQ with an Activation Function","authors":"Abdulrahman Kariri, Mohammed Aljamal, Jinan Al Aridhee, Ismaiel Albukhari, Nadine Matondo-Mvula, K. Elleithy","doi":"10.1109/LISAT58403.2023.10179557","DOIUrl":"https://doi.org/10.1109/LISAT58403.2023.10179557","url":null,"abstract":"In this paper, we present an overview of quantum neural network (QNN) and quantum computing benefits in the Artificial Intelligence field with methods used to enhance the application of machine learning. The approach uses quantum computers to enhance Convolutional Neural Network (CNN) with Hybrid QNNs using IBM Qiskit called the Convolutional Neural Network Hybrid Qiskit (CNNHQ). This paper will compare and focus on using the quantum concepts of computation to develop and optimize the network process entirely depending on Activation functions used in the neural network approach.","PeriodicalId":250536,"journal":{"name":"2023 IEEE Long Island Systems, Applications and Technology Conference (LISAT)","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122649556","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Subspace-Classification Approach for Simulated Tuple Class Assignment 模拟元组类分配的子空间分类方法
2023 IEEE Long Island Systems, Applications and Technology Conference (LISAT) Pub Date : 2023-05-05 DOI: 10.1109/LISAT58403.2023.10179509
Victor Robila, R. Haralick
{"title":"Subspace-Classification Approach for Simulated Tuple Class Assignment","authors":"Victor Robila, R. Haralick","doi":"10.1109/LISAT58403.2023.10179509","DOIUrl":"https://doi.org/10.1109/LISAT58403.2023.10179509","url":null,"abstract":"We developed a subspace classifier for measurement classification to provide an alternative to current deep learning approaches. Many modern neural networks cannot provide an understandable explanation for their classification. The subspace classifier provides a decomposition of the classification problem making it computationally simpler. We first use a Bayesian method in which all the class conditional probabilities for the entire measurement space can be stored in memory.Then we made experiments with simulated class conditional distributions and defined a subspace classifier that only stores the class conditional probabilities for the subspaces. This can use much larger distributions than the previous model as it uses much less memory so we expanded to cases where the measurement space is generated sequentially and everything does not have to be in the memory at the same time.For cases with distributions that fit in the memory we also compared a Bayesian approach with the subspace approach. The Bayesian subspace classifiers consistently outperformed the subspace classifiers without Bayes rule by a large margin. We also compare the subspace classifier with 3 Python Machine Learning Models, namely a Ridge Classifier, a Multi-Layer Perceptron (MLP) classifier (neural network), and a Support Vector Machine (SVM) on a set of tuples and class conditional probability distributions with 4 classes. The subspace classifier had an average probability of correct identification of 0.25172, the SVM model had an average accuracy of 0.20987, the neural network MLP classifier had an average accuracy of 0.2140 and the Ridge Classifier had an average accuracy of 0.2798 over 10,000 trials.","PeriodicalId":250536,"journal":{"name":"2023 IEEE Long Island Systems, Applications and Technology Conference (LISAT)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126683709","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Vehicle Monitoring System using SIM7600CE-T controlled over Arduino platform 车载监控系统采用SIM7600CE-T在Arduino平台上控制
2023 IEEE Long Island Systems, Applications and Technology Conference (LISAT) Pub Date : 2023-05-05 DOI: 10.1109/LISAT58403.2023.10179505
Eden Yasin Ibraim, L. Szolga
{"title":"Vehicle Monitoring System using SIM7600CE-T controlled over Arduino platform","authors":"Eden Yasin Ibraim, L. Szolga","doi":"10.1109/LISAT58403.2023.10179505","DOIUrl":"https://doi.org/10.1109/LISAT58403.2023.10179505","url":null,"abstract":"The present work proposes a vehicle monitoring system’s hardware and software design. The proposed electronic device transmits the data provided by the vehicle’s onboard computer through the OBDII port, using the CAN-BUS interface, respectively the location and the speed of the vehicle, to a web API which has the role of receiving, process, and storing the information in a database. Later, the user can view the given data on a webpage that exposes the information on a map. The device respects all the regulation laws in the transportation field and uses the latest technology, which permits easy upgrades in the future. This open-source implementation permits the end users to customize the visualization of the parameters of interest. Developing and implementing this device is to be used in fleet tracking.","PeriodicalId":250536,"journal":{"name":"2023 IEEE Long Island Systems, Applications and Technology Conference (LISAT)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125217662","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
High Voltage Transmission Line Response to Traveling Waves 高压输电线路对行波的响应
2023 IEEE Long Island Systems, Applications and Technology Conference (LISAT) Pub Date : 2023-05-05 DOI: 10.1109/LISAT58403.2023.10179537
L. Durante, C. Burns, Mirjavad Hashemi Gavgani, R. Grabovickic, E. Seiter, T. Bujanovic
{"title":"High Voltage Transmission Line Response to Traveling Waves","authors":"L. Durante, C. Burns, Mirjavad Hashemi Gavgani, R. Grabovickic, E. Seiter, T. Bujanovic","doi":"10.1109/LISAT58403.2023.10179537","DOIUrl":"https://doi.org/10.1109/LISAT58403.2023.10179537","url":null,"abstract":"Fault occurrence, location, and system performance information, based on the analysis of traveling waves is gaining importance as new levels of high frequency measurement equipment are being introduced to the power grid. In this work Continuous Wavelet Transformations with the complex Morlet wavelet analyzing functions was used to design a signal processing scheme to extract time and frequency characteristics from measured and recorded transient events that launched traveling waves on a 115 kV transmission system. The primary motivation was to extract baseline system performance information employing the traveling waves launched as a result of line re-energizations. This work is a proof of concept aimed extracting and baselining a system’s line specific characteristics or ‘fingerprints’ and determining if a useful level of fingerprint consistency exists for typical line energizations. Implementation of the proposed scheme on these specific signals, measured at 1.5 MHz sampling frequency, successfully extracted consistent fingerprints of the system’s time-frequency behavior. A database of these fingerprints could be used to determine a dynamic high-frequency model for the system as well as track changes in the physical system as the response changes in different source and system operational scenarios.","PeriodicalId":250536,"journal":{"name":"2023 IEEE Long Island Systems, Applications and Technology Conference (LISAT)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126123322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信