no code implementations • 18 Dec 2023 • Reek Majumder, Jacquan Pollard, M Sabbir Salek, David Werth, Gurcan Comert, Adrian Gale, Sakib Mahmud Khan, Samuel Darko, Mashrur Chowdhury
The environmental impacts of global warming driven by methane (CH4) emissions have catalyzed significant research initiatives in developing novel technologies that enable proactive and rapid detection of CH4.
no code implementations • 20 Aug 2021 • Esmail M M Abuhdima, Gurcan Comert, Pierluigi Pisu, Chin-Tser Huang, Ahmed El Qaouaq, Chunheng Zhao, Shakendra Alston, Kirk Ambrose, Jian Liu
A recent study investigates the effect of rain and snow on the 5G communication channel to reduce the challenge of using high millimeter-wave frequencies.
no code implementations • 15 Aug 2021 • Gurcan Comert, Negash Begashaw, Negash G. Medhin
This paper presents Bayesian parameter estimation for first order Grey system models' parameters (or sometimes referred to as hyperparameters).
no code implementations • 2 Aug 2021 • Sakib Mahmud Khan, Gurcan Comert, Mashrur Chowdhury
Change point models, can be used for real-time anomaly detection caused by the false information attack.
no code implementations • 2 Aug 2021 • Zadid Khan, Sakib Mahmud Khan, Jean Michel Tine, Ayse Turhan Comert, Diamon Rice, Gurcan Comert, Dimitra Michalaka, Judith Mwakalonge, Reek Majumdar, Mashrur Chowdhury
The incident detection performance of the hybrid model is evaluated against baseline classical ML models.
no code implementations • 2 Aug 2021 • Reek Majumder, Sakib Mahmud Khan, Fahim Ahmed, Zadid Khan, Frank Ngeni, Gurcan Comert, Judith Mwakalonge, Dimitra Michalaka, Mashrur Chowdhury
To make classification models resilient against adversarial attacks, we used a hybrid deep-learning model with both the quantum and classical layers.
no code implementations • 24 Nov 2020 • Gurcan Comert
Dynamic behavior of traffic adversely affect the performance of the prediction models in intelligent transportation applications.
no code implementations • 18 Nov 2020 • Gurcan Comert, Negash Begashaw, Nathan Huynh
To evaluate the performance of the proposed models, they are compared against a set of benchmark models: GM(1, 1) model, Grey Verhulst models with and without Fourier error corrections, linear time series model, and nonlinear time series model.
no code implementations • 18 Nov 2020 • Gurcan Comert, Mashrur Chowdhury, David M. Nicol
This study presents a methodology to quantify vulnerability of cyber attacks and their impacts based on probabilistic graphical models for intelligent transportation systems under connected and autonomous vehicles framework.
no code implementations • 18 Nov 2020 • Gurcan Comert, Negash Begashaw
The results show that with Kalman and Particle filters, parameter estimators are able to find the true values within 15 minutes and meet and surpass the accuracy of known parameter scenarios especially for low market penetration rates.
no code implementations • 5 Mar 2020 • Gurcan Comert, Mizanur Rahman, Mhafuzul Islam, Mashrur Chowdhury
Connected vehicle (CV) systems are cognizant of potential cyber attacks because of increasing connectivity between its different components such as vehicles, roadside infrastructure, and traffic management centers.
no code implementations • 29 Dec 2019 • Gurcan Comert, Zadid Khan, Mizanur Rahman, Mashrur Chowdhury
Thus, the objective of this study is to develop queue length prediction models for signalized intersections that can be leveraged by ASCS using four variations of Grey systems: (i) the first order single variable Grey model (GM(1, 1)); (ii) GM(1, 1) with Fourier error corrections; (iii) the Grey Verhulst model (GVM), and (iv) GVM with Fourier error corrections.
no code implementations • 2 Jul 2019 • Mhafuzul Islam, Mizanur Rahman, Mashrur Chowdhury, Gurcan Comert, Eshaa Deepak Sood, Amy Apon
The contribution of this paper lies in the development of a system using a vision-based deep learning model that is able to generate personal safety messages (PSMs) in real-time (every 100 milliseconds).
no code implementations • 30 Nov 2018 • Gurcan Comert, Mizanur Rahman, Mhafuzul Islam, Mashrur Chowdhury
Connected vehicle (CV) systems are cognizant of potential cyber attacks because of increasing connectivity between its different components such as vehicles, roadside infrastructure and traffic management centers.
Cryptography and Security