Open Access. Powered by Scholars. Published by Universities.®

Electrical and Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

22,800 Full-Text Articles 26,412 Authors 8,255,962 Downloads 171 Institutions

All Articles in Electrical and Computer Engineering

Faceted Search

22,800 full-text articles. Page 1 of 649.

Stability Analysis Of A More General Class Of Systems With Delay-Dependent Coefficients, Chi Jin, Keqin Gu, Islam Boussaada, Silviu-Iulian Niculescu 2019 Laboratoire des Signaux et Syst`emes (L2S) CentraleSup´elec-CNRS-Universit´e Paris Sud, 3 rue Joliot- Curie 91192 Gif-sur-Yvette cedex, France.

Stability Analysis Of A More General Class Of Systems With Delay-Dependent Coefficients, Chi Jin, Keqin Gu, Islam Boussaada, Silviu-Iulian Niculescu

SIUE Faculty Research, Scholarship, and Creative Activity

This paper presents a systematic method to analyse the stability of systems with single delay in which the coefficient polynomials of the characteristic equation depend on the delay. Such systems often arise in, for example, life science and engineering systems. A method to analyze such systems was presented by Beretta and Kuang in a 2002 paper, but with some very restrictive assumptions. This work extends their results to the general case with the exception of some degenerate cases. It is found that a much richer behavior is possible when the restrictive assumptions are removed. The interval of interest for the ...


Security Of Vehicular Platooning, Soodeh Dadras 2019 Utah State University

Security Of Vehicular Platooning, Soodeh Dadras

All Graduate Theses and Dissertations

Platooning concept involves a group of vehicles acting as a single unit through coordination of movements. While Platooning as an evolving trend in mobility and transportation diminishes the individual and manual driving concerns, it creates new risks. New technologies and passenger’s safety and security further complicate matters and make platooning attractive target for the malicious minds. To improve the security of the vehicular platooning, threats and their potential impacts on vehicular platooning should be identified to protect the system against security risks. Furthermore, algorithms should be proposed to detect intrusions and mitigate the effects in case of attack. This ...


Revamping Timing Error Resilience To Tackle Choke Points At Ntc, Aatreyi Bal 2019 Utah State University

Revamping Timing Error Resilience To Tackle Choke Points At Ntc, Aatreyi Bal

All Graduate Theses and Dissertations

The growing market of portable devices and smart wearables has contributed to innovation and development of systems with longer battery-life. While Near Threshold Computing (NTC) systems address the need for longer battery-life, they have certain limitations. NTC systems are prone to be significantly affected by variations in the fabrication process, commonly called process variation (PV). This dissertation explores an intriguing effect of PV, called choke points. Choke points are especially important due to their multifarious influence on the functional correctness of an NTC system. This work shows why novel research is required in this direction and proposes two techniques to ...


Sensor Intrusion Detection In Control Systems Using Estimation Theory, Jiayi Su 2019 Marquette University

Sensor Intrusion Detection In Control Systems Using Estimation Theory, Jiayi Su

Master's Theses (2009 -)

In this thesis, two different approaches to sensor intrusion detection are presented. In the first approach, an estimation algorithm using a bank of Kalman Filters is designed that is capable of estimating the intrusion signal when sensors are affected in control systems. The mathematical models of the control system will be estabilished and the system measurement will be shown and after that, various false signals, such as constant-type and ramp-type signal, will be selected as the intrusion signal to affect the system output mentioned above. The system measurement will be tested based on a bank of Kalman Filters. The probabilities ...


Demo: A Low-Cost Fleet Monitoring System, Lotfi ben Othmane, Venecia Alvarez, Kendall Berner, Matthew Fuhrmann, William Fuhrmann, Anthony Guss, Tyler Hartsock 2019 Iowa State University

Demo: A Low-Cost Fleet Monitoring System, Lotfi Ben Othmane, Venecia Alvarez, Kendall Berner, Matthew Fuhrmann, William Fuhrmann, Anthony Guss, Tyler Hartsock

Lotfi ben Othmane

Organizations use fleet monitoring systems for e.g., vehicle tracking, driver behavior analysis, and efficient fleet management. Current systems are designed for commercial use and are of high cost. We present a prototype of a low-cost fleet monitoring system that could be used for non-commercial applications. The system is composed of a device, a service application, and a Web application. The device reads data such as speed and fuel from the internal network of the connected vehicle and the location of the vehicle and sends them to a remote service. The remote service processes and stores the data. The users ...


Details On Csa-Sbl: An Algorithm For Sparse Bayesian Learning Boosted By Partial Erroneous Support Knowledge, Mohammad Shekaramiz, Todd K. Moon, Jacob H. Gunther 2019 Utah State University

Details On Csa-Sbl: An Algorithm For Sparse Bayesian Learning Boosted By Partial Erroneous Support Knowledge, Mohammad Shekaramiz, Todd K. Moon, Jacob H. Gunther

Electrical and Computer Engineering Faculty Publications

This report provides details on CSA-SBL(VB) algorithm for the recovery of sparse signals with unknown clustering pattern. More specifically, we deal with the recovery of sparse signals with unknown clustering pattern in the case of having partial erroneous prior knowledge on the supports of the signal. In [1], we provided a modified sparse Bayesian learning model to incorporate prior knowledge and simultaneously learn the unknown clustering pattern. For this purpose, we added one more layer to support-aided sparse Bayesian learning algorithm (SA-SBL) that was proposed in [2]. This layer adds a prior on the shape parameters of Gamma distributions ...


Robustness Evaluation Of Computer-Aided Clinical Trials For Medical Devices, Kuk Jin Jang, Yash Vardhan Pant, Bo Zhang, James Weimer, Rahul Mangharam 2019 University of Pennsylvania

Robustness Evaluation Of Computer-Aided Clinical Trials For Medical Devices, Kuk Jin Jang, Yash Vardhan Pant, Bo Zhang, James Weimer, Rahul Mangharam

Real-Time and Embedded Systems Lab (mLAB)

Medical cyber-physical systems, such as the implantable cardioverter defibrillator (ICD), require evaluation of safety and efficacy in the context of a patient population in a clinical trial. Advances in computer modeling and simulation allow for generation of a simulated cohort or virtual cohort which mimics a patient population and can be used as a source of prior information. A major obstacle to acceptance of simulation results as a source of prior information is the lack of a framework for explicitly modeling sources of uncertainty in simulation results and quantifying the effect on trial outcomes.

In this work, we formulate the ...


Detection Of Injection Attacks In In-Vehicle Networks, Lotfi ben Othmane, Lalitha Dhulipala, Moataz Abdelkhalek, Manimaran Govindarasu, Nicholas Multari 2019 Iowa State University

Detection Of Injection Attacks In In-Vehicle Networks, Lotfi Ben Othmane, Lalitha Dhulipala, Moataz Abdelkhalek, Manimaran Govindarasu, Nicholas Multari

Lotfi ben Othmane

There have been several public demonstrations of attacks on connected vehicles showing the ability of an attacker to take control of a targeted vehicle by injecting messages into their Controller Area Network (CAN) bus. In this paper, using injected speed reading and Revolutions Per Minute (RPM) messages, we examined the ability of the Pearson correlation, the k-means clustering, and the Hidden Markov Model (HMM) techniques to differentiate ’no-attack’ and ’under-attack’ states of the given vehicle. We found that the Pearson correlation distinguishes the two states while the k-means fails to distinguish the two states and HMM can successfully detect attacks ...


Survey Of Automotive Controller Area Network Intrusion Detection Systems, Clinton Young, Joseph Zambreno, Habeeb Olufowobi, Gedare Bloom 2019 Iowa State University

Survey Of Automotive Controller Area Network Intrusion Detection Systems, Clinton Young, Joseph Zambreno, Habeeb Olufowobi, Gedare Bloom

Joseph Zambreno

Novel attacks continue to appear against in-vehicle networks due to the increasing complexity of heterogeneous software and hardware components used in vehicles. These new components introduce challenges when developing efficient and adaptable security mechanisms. Several intrusion detection systems (IDS) have been proposed to identify and protect in-vehicle networks against malicious activities. We describe the state-of-the-art intrusion detection methods for securing automotive networks, with special focus on the Controller Area Network (CAN). We provide a description of vulnerabilities, highlight threat models, identify known attack vectors present in CAN, and discuss the advantages and disadvantages of suggested solutions.


Open Source Low-Cost Power Monitoring System, Shane W. Oberloier, Joshua M. Pearce 2019 Michigan Technological University

Open Source Low-Cost Power Monitoring System, Shane W. Oberloier, Joshua M. Pearce

Joshua M. Pearce

This study presents an entirely open-source, low-cost power monitoring system capable of many types of measurements including both loads and supplies such as solar photovoltaic systems. In addition, the system can be fabricated using only open source software and hardware. The design revolves around the Digital Universal Energy Logger (DUEL) Node, which is responsible for reading and properly scaling the voltage and current of a particular load, and then serializing it via an on-board ATTiny85 chip. The configuration of the DUEL node allows for custom sensitivity ranges, and can handle up to 50 A and 300 V. Up to 127 ...


Epics: A Framework For Enforcing Security Policies In Composite Web Services, Rohit Ranchal, Bharat Bhargava, Pelin Angin, Lotfi ben Othmane 2019 IBM

Epics: A Framework For Enforcing Security Policies In Composite Web Services, Rohit Ranchal, Bharat Bhargava, Pelin Angin, Lotfi Ben Othmane

Lotfi ben Othmane

With advances in cloud computing and the emergence of service marketplaces, the popularity of composite services marks a paradigm shift from single-domain monolithic systems to cross-domain distributed services, which raises important privacy and security concerns. Access control becomes a challenge in such systems because authentication, authorization and data disclosure may take place across endpoints that are not known to clients. The clients lack options for specifying policies to control the sharing of their data and have to rely on service providers which provide limited selection of security and privacy preferences. This lack of awareness and loss of control over data ...


Progress Report I: Fabrication Of Nanopores In Silicon Nitride Membranes Using Self-Assembly Of Ps-B-Pmma, Unnati Joshi, Vishal Venkatesh, Hiromichi Yamamoto 2019 Quattrone Nanofabrication Facility

Progress Report I: Fabrication Of Nanopores In Silicon Nitride Membranes Using Self-Assembly Of Ps-B-Pmma, Unnati Joshi, Vishal Venkatesh, Hiromichi Yamamoto

Protocols and Reports

This progress report describes fabrication of silicon nitride membranes from Si wafers using cleanroom techniques, and of nanopore preparation via a self-assembled PS-b-PMMA film. A 36.9 nm thick membrane is successfully prepared by KOH wet etching. The membrane is a layered structure of 36.8 µm thick Si and 116 nm thick silicon nitride. It is also exhibited that in the 47 nm thick PS-b-PMMA film, the nanopore structure is observed in the vicinity of a dust particle, but most of the area indicates lamellar domain structure. The thickness of PS-b-PMMA film will ...


Expansion Planning For Transmission Network Under Demand Uncertainty: A Real Options Framework, Fikri Fucuksayacigil, K. Jo Min 2019 Iowa State University

Expansion Planning For Transmission Network Under Demand Uncertainty: A Real Options Framework, Fikri Fucuksayacigil, K. Jo Min

Kyung J. Min

In recent years, there has been much expectation that transmission expansion planning should address ever increasing demands for transmission services under significant and complex economic and regulatory uncertainties. In this article, toward meeting the aforementioned expectation, we develop and analyze a real options framework that provides the valuation of a transmission owner’s option to expand in his or her network. What distinguishes our framework from the extant literature is that the evolution of the demand follows a geometric Brownian motion process, it explicitly accounts for the physical flow of the electric power economically manifested as the locational marginal prices ...


Transmission Expansion Planning With Transformer Replacement, Mujing Ye, Sarah M. Ryan, James D. McCalley 2019 Iowa State University

Transmission Expansion Planning With Transformer Replacement, Mujing Ye, Sarah M. Ryan, James D. Mccalley

Sarah M. Ryan

Investments in high-voltage transmission facilities require large financial commitments and significantly affect the future reliability and economy of the interconnected power system. Transmission expansion planning is complicated by the potential component unavailability due to forced or scheduled outage. Transformers comprise one important set of system components of which many in current use are reaching an advanced service age. Condition monitoring technologies can help improve predictions of their reliability. We formulate and analyze an optimization model for transmission expansion planning and transformer replacement that accounts for transformer as well as transmission line reliability and solve a small instance in a reasonable ...


A Voice Activated Prosthetic Mode Of Control, Will Picken 2019 University of Nebraska at Omaha

A Voice Activated Prosthetic Mode Of Control, Will Picken

Student Research and Creative Activity Fair

There are many options for a prosthetic mode of control. The most commonly created modes of control involve surface EMG (sEMG) and require that the user have well defined muscle activation in order to trigger the movement of the prosthetic. Unfortunately, many prosthetic users do not have the required muscle tone or strength to trigger these sensors, so the need for a control mechanism that doesn’t rely on sEMG is clear. This study focuses on the development of a low-cost, voice activated prosthetic mode of control compatible with the prosthetics developed by Dr. Zuniga and his research team.

The ...


An Electrooculography Prosthetic Control System, Walker Arce 2019 University of Nebraska at Omaha

An Electrooculography Prosthetic Control System, Walker Arce

Student Research and Creative Activity Fair

For many surface EMG (sEMG) prosthetic control systems, the muscles on the affected limb are used to trigger the control system. This can lead to fatigue in the user as they have to maintain continuous muscle activation and coactivation in order to achieve prosthetic control [3]. The crux of any prosthetic control system is the human machine interface that is developed, and at present many control systems have complicated interfaces that limit the degrees of freedom of the prosthetics. This study focuses on the development of a low-cost prosthetic control peripheral that is compatible with the prosthetics developed by Dr ...


A Radio Frequency Identification (Rfid) Prosthetic Control System, Andrew Butler 2019 University of Nebraska at Omaha

A Radio Frequency Identification (Rfid) Prosthetic Control System, Andrew Butler

Student Research and Creative Activity Fair

Item classification and tagging in embedded systems has become ubiquitous in our society due to radio frequency identification (RFID) and the cost has dropped significantly for hardware that can interact with these devices. Due to this, possibilities in the realm of prosthetic control systems opens up for dynamic grip selection without user intervention. This study focuses on the development of a device capable of this functionality that is compatible with the prosthetics designed by Dr. Zuniga and his research team.

The printed circuit board (PCB) was designed using the EAGLE EDA package and incorporates a lithium polymer battery with a ...


Automotive Intrusion Detection Based On Constant Can Message Frequencies Across Vehicle Driving Modes, Clinton Young, Habeeb Olufowobi, Gedare Bloom, Joseph Zambreno 2019 Iowa State University

Automotive Intrusion Detection Based On Constant Can Message Frequencies Across Vehicle Driving Modes, Clinton Young, Habeeb Olufowobi, Gedare Bloom, Joseph Zambreno

Electrical and Computer Engineering Conference Papers, Posters and Presentations

The modern automobile relies on numerous electronic control units communicating over the de facto standard of the controller area network (CAN) bus. This communication network was not developed with cybersecurity in mind. Many methods based on constant time intervals between messages have been proposed to address this lack of security issue with the CAN bus. However, these existing methods may struggle to handle variable time intervals between messages during transitions of vehicle driving modes. This paper proposes a simple and cost-effective method to ensure the security of the CAN bus that is based on constant message frequencies across vehicle driving ...


Anomaly Detection Approach Using Adaptive Cumulative Sum Algorithm For Controller Area Network, Habeeb Olufowobi, Uchenna Ezeobi, Eric Muhati, Gaylon Robinson, Clinton Young, Joseph Zambreno, Gedare Bloom 2019 Howard University

Anomaly Detection Approach Using Adaptive Cumulative Sum Algorithm For Controller Area Network, Habeeb Olufowobi, Uchenna Ezeobi, Eric Muhati, Gaylon Robinson, Clinton Young, Joseph Zambreno, Gedare Bloom

Electrical and Computer Engineering Conference Papers, Posters and Presentations

The modern vehicle has transformed from a purely mechanical system to a system that embeds several electronic devices. These devices communicate through the in-vehicle network for enhanced safety and comfort but are vulnerable to cyber-physical risks and attacks. A well-known technique of detecting these attacks and unusual events is by using intrusion detection systems. Anomalies in the network occur at unknown points and produce abrupt changes in the statistical features of the message stream. In this paper, we propose an anomaly-based intrusion detection approach using the cumulative sum (CUSUM) change-point detection algorithm to detect data injection attacks on the controller ...


Reactive Ion Etching Selectivity Of Si/Sio2: Comparing Of Two fluorocarbon Gases Chf3 And Cf4, Meiyue Zhang, Pat Watson 2019 Singh Center for Nanotechnology

Reactive Ion Etching Selectivity Of Si/Sio2: Comparing Of Two fluorocarbon Gases Chf3 And Cf4, Meiyue Zhang, Pat Watson

Protocols and Reports

Two reactive ion etching (RIE) processes were studied to show the relative etch selectivity between SiO2 and Si using two fluorocarbon gases, CF4 and CHF3. Results show that CHF3 gives better selectivity (16:1) over CF4 (1.2 :1). On the other hand, the etch rate of SiO2 of CF4 is approximately 52.8 nm/min, faster than CHF3 (32.4 nm/min).


Digital Commons powered by bepress