Bitrate Classification Of Twice-Encoded Audio Using Objective Quality Features, 2016 Trinity College Dublin
Bitrate Classification Of Twice-Encoded Audio Using Objective Quality Features, Colm Sloan, Damien Kelly, Naomi Harte, Anil C. Kokaram, Andrew Hines
When a user uploads audio files to a music stream- ing service, these files are subsequently re-encoded to lower bitrates to target different devices, e.g. low bitrate for mobile. To save time and bandwidth uploading files, some users encode their original files using a lossy codec. The metadata for these files cannot always be trusted as users might have encoded their files more than once. Determining the lowest bitrate of the files allows the streaming service to skip the process of encoding the files to bitrates higher than that of the uploaded files, saving on processing and storage space ...
Double Alternating Minimization (Dam) For Phase Retrieval In The Presence Of Poisson Noise And Pixelation, 2016 Washington University in St Louis
Double Alternating Minimization (Dam) For Phase Retrieval In The Presence Of Poisson Noise And Pixelation, Weimin Zhou
Engineering and Applied Science Theses & Dissertations
Optical detectors, such as photodiodes and CMOS cameras, can only read intensity information, and thus phase information of wavefronts is lost. Phase retrieval algorithms are used to estimate the lost phase and reconstruct an accurate effective pupil function, where the squared modulus of its Fourier transform is detected by a camera. However, current algorithms such as the Gerchberg-Saxton algorithm and Fienup-style algorithm do not consider the detector sampling rate and shot noise introduced by photon detection. If the sampling rate is low, we must interpolate the detected image in order to accurately reconstruct its pupil function. Here, we develop an ...
3-D Shape Recovery From A Single Camera Image, 2016 Purdue University
3-D Shape Recovery From A Single Camera Image, Vijai Jayadevan, Aaron Michaux, Edward Delp, Zygmunt Pizlo
3-D shape recovery is an ill-posed inverse problem which must be solved by using a priori constraints. We use symmetry and planarity constraints to recover 3-D shapes from a single image. Once we assume that the object to be reconstructed is symmetric, all that is left to do is to estimate the plane of symmetry and establish the symmetry correspondence between the various parts of the object. The edge map of the image of an object serves as a good representation of its 2-D shape and establishing symmetry correspondence means identifying pairs of symmetric curves in the edge map. The ...
An Image-Based Model For Early Visual Processing, 2016 University of Tübingen
An Image-Based Model For Early Visual Processing, Heiko H. Schütt, Felix A. Wichmann
No abstract provided.
Source Separation Approach To Video Quality Prediction In Computer Networks, 2016 Dublin Institute of Technology
Source Separation Approach To Video Quality Prediction In Computer Networks, Ruairí De Fréin
Time-varying loads introduce errors in the estimated model parameters of service-level predictors in Computer Networks. A load-adjusted modification of a traditional unadjusted service-level predictor is contributed, based on Source Separation (SS). It mitigates these errors and improves service-quality predictions for Video-on-Demand (VoD) by :6 to 2dB.
Conversion Of Digital Circuits Labs, 2016 ETSU
Conversion Of Digital Circuits Labs, Caleb N. Taber
Undergraduate Honors Theses
The engineering technology department at ETSU currently lacks a modern method to teach digital circuits. The aim of this thesis is to convert our current digital circuits labs to equivalent labs suited to run on the Basys 3. The Basys has several advantages over the aging NI Elvis boards (and now just breadboards) currently in use. The first advantage is that the Basys gives students a taste of FPGA programming without being overwhelmingly; like the systems currently in place for the digital signal processing class. The Basys is also a more modern system; our current integrated circuit and breadboard system ...
Blind Front-End Processing Of Dynamic Multi-Channel Wideband Signals, 2016 Utah State University
Blind Front-End Processing Of Dynamic Multi-Channel Wideband Signals, Kevin Jackson
All Graduate Theses and Dissertations
In wireless digital communications, the sender and receiver typically know the modulation scheme with which they will be communicating. Automatic modulation identification is the ability to identify the modulation in a communication system with little to no prior knowledge of the modulation scheme. Many techniques for modulation identification operate on many assumptions including that the input signal is base-banded, the carrier frequency is known and that the signal is narrow-band (i.e. neighboring signals in the wide-band are excluded). This work provides the blind processing of an arbitrary wide-band signal to allow such assumptions. The challenges of such a front-end ...
Magnetic Local Positioning System With Supplemental Magnetometer-Accelerometer Data Fusion, 2016 The University of Tennessee, Knoxville
Magnetic Local Positioning System With Supplemental Magnetometer-Accelerometer Data Fusion, Benjamin Scott Prothro
Geo-location and tracking technology, once confined to the industrial and military sectors, have been widely proliferated to the consumer world since early in the twenty-first century. The commoditization of Global Positioning System (GPS) and inertial measurement integrated circuits has made this possible, with devices small enough to fit in a cellular phone. However, GPS technology is not without its drawbacks: Its power use is high, and it can fail in smaller, obstructed spaces. Magnetic positioning, which exploits the magnetic field coupling between a set of transmitter beacon coils and a set of receiver coils, is an often overlooked, complementary technology ...
Using Labview For Signal Processing And Noise Reduction For Flow Cytometry, 2016 Iowa State University
Using Labview For Signal Processing And Noise Reduction For Flow Cytometry, Jacob Feddersen
Honors Projects and Posters
Flow cytometry is a method by which microparticles and cells in a stream of fluid can be measured. Most currently available cytometers are very large and expensive because they require equipment such as lasers and optics. Our goal was to create a basic lightweight, inexpensive cytometer. The sensor works by passing the fluid with the particles through a specially designed microchannel that forces the particles to flow through in single file. The particles are measured by taking into account their optical properties; an LED of a specific frequency is shined on the particles which excites them, causing them to emit ...
Ac Power Monitoring System Provides Individual Circuit Energy Consumption Data, 2016 Cedarville University
Ac Power Monitoring System Provides Individual Circuit Energy Consumption Data, Jared L. Newman, Grayson H. Dearing, Luke M. Tomlinson, Frederick G. Harmon
The Research and Scholarship Symposium
Motivated by high energy costs, people and organizations want to cut back on their energy consumption. However, the only feedback consumers typically receive is a monthly bill listing their total electricity usage (in kWh). Some companies have begun developing systems that allow households and organizations to monitor their energy usage for individual circuits. Available systems are expensive so a CU engineering senior design team has designed, fabricated, and tested a system for use at Cedarville University. The AC power monitoring system has the ability to measure energy consumption for each individual circuit in the breaker panel, store the data, and ...
Novel Convergence Results In Nonlinear Filtering, 2016 Marquette University
Novel Convergence Results In Nonlinear Filtering, Jennifer Lynn Bonniwell
Dissertations (2009 -)
In this dissertation, the discrete-time extended Kalman filter is analyzed for its ability to attenuate finite-energy disturbances, known as the H-infinity property. Though the extended Kalman filter is designed to be a locally optimal minimum variance estimator, this dissertation proves that it has additional properties, such as H-infinity. This analysis is performed with the extended Kalman filter in direct form. Since this form reduces assumptions placed on the system in previous works on convergence and H-2 properties of the extended Kalman filter, the extended Kalman filter used as a nonlinear observer for noise-free models is revisited using the direct form ...
Hardware Development And Error Characterisation For The Afit Rail Sar System, 2016 Air Force Institute of Technology
Hardware Development And Error Characterisation For The Afit Rail Sar System, Dayne A. Schmidt
Theses and Dissertations
This research is focussed on updating the Air Force Institute of Technology (AFIT) Radar Instrumentation Lab (RAIL) Synthetic Aperture Radar (SAR) experimental system. Firstly, this research assesses current hardware limitations and updates the system configuration and methodology to enable collections from a receiver in motion. Secondly, orthogonal frequency-division multiplexing (OFDM) signals are used to form (SAR) images in multiple experimental and simulation configurations. This research analyses, characterises and attempts compensation of relevant SAR image error sources, such as Doppler shift or motion measurement errors (MMEs). Error characterisation is conducted using theoretical, simulated and experimental methods. Final experimental results are presented ...
Comparison Of Methods For Radio Position Of Non-Emitting Dismounts, 2016 Air Force Institute of Technology
Comparison Of Methods For Radio Position Of Non-Emitting Dismounts, Collin J. Seanor
Theses and Dissertations
Radio Tomographic Imaging (RTI) is a form of Device Free Passive Localization (DFPL) that utilizes the Received Signal Strength (RSS) values from a collection of wireless transceivers to produce an image in order to localize a subject within a Wireless Sensor Network (WSN). Radio Mapping is another form of DFPL that can utilize the same RSS values from a WSN to localize a subject by comparing recent values to a set of calibration data. RTI and Radio Mapping have never been directly compared to one another as a means of localization within a WSN. The goal of this research is ...
Geosynchronous Binary Object Detection, 2016 Air Force Institute of Technology
Geosynchronous Binary Object Detection, Patrick B. Cunningham
Theses and Dissertations
This paper will compare competing methods for optically detecting binary objects. This is mostly intended for use in Space Situational Awareness (SSA), though has the potential to be used in other applications. The first method referred to as, “Single Object Detection” is a versatile algorithm which is currently used to detect extraterrestrial objects. However, it does not take into account interference by a nearby object. Therefore a second algorithm is investigated, referred to as “Binary Object Detection”, which does. The binary detection algorithm proved to have a comparable or superior Receiver Operating Characteristic (ROC) curve (based upon the area under ...
Spatio-Spectral Sampling And Color Filter Array Design, 2016 University of Dayton
Spatio-Spectral Sampling And Color Filter Array Design, Keigo Hirakawa, Patrick Wolfe
Owing to the growing ubiquity of digital image acquisition and display, several factors must be considered when developing systems to meet future color image processing needs, including improved quality, increased throughput, and greater cost-effectiveness. In consumer still-camera and video applications, color images are typically obtained via a spatial subsampling procedure implemented as a color filter array (CFA), a physical construction whereby only a single component of the color space is measured at each pixel location. Substantial work in both industry and academia has been dedicated to post-processing this acquired raw image data as part of the so-called image processing pipeline ...
An Optical Design Configuration For Wireless Data Transmission, 2016 Florida International University
An Optical Design Configuration For Wireless Data Transmission, Seyed Mohammad Amin Motahari Bidgoli
FIU Electronic Theses and Dissertations
The concept of 2D barcodes is of great relevance for use in wireless data transmission between handheld electronic devices. In a typical setup, any file on a cell phone for example can be transferred to a second cell phone through a series of images on the LCD which are then captured and decoded through the camera of the second cell phone. In this research, a new approach for data modulation in 2D barcodes is introduced, and its performance is evaluated in comparison to other standard methods of barcode modulation. In the proposed method, Orthogonal Frequency Division Multiplexing (OFDM) modulation is ...
Coffee Queue Project, 2016 California Polytechnic State University - San Luis Obispo
Coffee Queue Project, George Dimitrov Gargov
Master's Theses and Project Reports
In this paper, a computer vision system for counting people standing in line is presented. In this application, common techniques such as Adaptive Background Subtraction (ABS), blob tracking with Kalman filter, and occlusion resistive techniques are used to detect and track people. Additionally, a novel method using Dual Adaptive Background Subtractors (DABS) is implemented for dynamically determining the line region in a real-world crowded scene, and also as an alternative target acquisition to regular ABS. The DABS technique acts as a temporal bandpass filter for motion, helping identify people standing in line while in the presence of other moving people ...
Optimization Algorithms For Big Data With Application In Wireless Networks, 2016 Iowa State University
Optimization Algorithms For Big Data With Application In Wireless Networks, Mingyi Hong, Wei-Cheng Liao, Ruoyu Sun, Zhi-Quan Luo
Industrial and Manufacturing Systems Engineering Publications
This chapter proposes the use of modern first-order large-scale optimization techniques to manage a cloud-based densely deployed next-generation wireless network. In the first part of the chapter we survey a few popular first-order methods for large-scale optimization, including the block coordinate descent (BCD) method, the block successive upper-bound minimization (BSUM) method and the alternating direction method of multipliers (ADMM). In the second part of the chapter, we show that many difficult problems in managing large wireless networks can be solved efficiently and in a parallel manner, by modern first-order optimization methods. Extensive numerical results are provided to demonstrate the benefit ...
Coded Caching With Low Subpacketization Levels, 2016 Iowa State University
Coded Caching With Low Subpacketization Levels, Li Tang, Aditya Ramamoorthy
Electrical and Computer Engineering Conference Papers, Posters and Presentations
Caching is popular technique in content delivery networks that allows for reductions in transmission rates from the content-hosting server to the end users. Coded caching is a generalization of conventional caching that considers the possibility of coding in the caches and transmitting coded signals from the server. Prior results in this area demonstrate that huge reductions in transmission rates are possible and this makes coded caching an attractive option for the next generation of content-delivery networks. However, these results require that each file hosted in the server be partitioned into a large number (i.e., the subpacketization level) of non- ...
Resilient Dynamic State Estimation In The Presence Of False Information Injection Attacks, 2016 Virginia Commonwealth University
Resilient Dynamic State Estimation In The Presence Of False Information Injection Attacks, Jingyang Lu
Theses and Dissertations
The impact of false information injection is investigated for linear dynamic systems with multiple sensors. First, it is assumed that the system is unaware of the existence of false information and the adversary is trying to maximize the negative effect of the false information on Kalman filter's estimation performance under a power constraint. The false information attack under different conditions is mathematically characterized. For the adversary, many closed-form results for the optimal attack strategies that maximize the Kalman filter's estimation error are theoretically derived. It is shown that by choosing the optimal correlation coefficients among the false information ...