Design And Simulation Of An 8-Bit Successive Approximation Register Charge-Redistribution Analog-To-Digital Converter, 2017 University of Texas at Tyler
Design And Simulation Of An 8-Bit Successive Approximation Register Charge-Redistribution Analog-To-Digital Converter, Sumit K. Verma
Electrical Engineering Theses
The thesis initially investigates the history of the monolithic ADCs. The next chapter explores the different types of ADCs available in the market today. Next, the operation of a 4-bit SAR ADC has been studied. Based on this analysis, an 8-bit charge-redistribution SAR ADC has been designed and simulated with Multisim (National Instruments, Austin, TX). The design is divided into different blocks which are individually implemented and tested. Level-1 SPICE MOSFET models representative of 5μm devices were used wherever individual MOSFETs were used in the design. Finally, the power dissipation during the conversion period was also estimated. The supply voltage ...
Crowdsourced Smart Cities, 2017 Carnegie Mellon University
Crowdsourced Smart Cities, Robert A. Iannucci, Anthony Rowe
2017 Eclipse Rfd-900 Still Image System, 2017 Montana State University-Bozeman
2017 Eclipse Rfd-900 Still Image System, Tristan Running Crane, Uciel Garcia Olmedo, David Schwehr
2017 Academic High Altitude Conference
As part of the NASA Space Grant 2017 Eclipse Ballooning Project, Montana Space Grant Consortium designed a camera system capable of transmitting still images from a balloon borne payload to a remote ground station via a RFD-900 radio. This payload consists of a Raspberry Pi, a Raspberry Pi camera, custom power supply and a RFD 900MHz radio. This system was designed to record pictures at high and low resolution at altitude. The low resolution images could be selected for downlinking back to the ground via the radio, while the high resolution pictures were saved to the Raspberry Pi memory card ...
University Of Maine High Altitude Ballooning Eclipse Experience, 2017 University of Maine
University Of Maine High Altitude Ballooning Eclipse Experience, Kent Seneres, Derek Haas, William Bessette, Richard Eason
2017 Academic High Altitude Conference
The University of Maine High Altitude Ballooning (UMHAB) team launched two balloons during the August 21, 2017 total solar eclipse, producing a consistent online video stream of the eclipse to an altitude of 110,000 feet. This paper discusses the key factors that lead to a successful launch and recovery, such as thorough testing procedures, redesign of components, choice of launch site, and a touch of luck. In preparation for the event, the team tested the equipment and code over eleven balloon launches. Airplane based testing and land testing were conducted for the tracking and video stream components. The payloads ...
Fusing Self-Reported And Sensor Data From Mixed-Reality Training, 2017 Iowa State University
Fusing Self-Reported And Sensor Data From Mixed-Reality Training, Trevor Richardson, Stephen B. Gilbert, Joseph Holub, Frederick Thompson, Anastacia Macallister, Rafael Radkowski, Eliot Winer
Military and industrial use of smaller, more accurate sensors are allowing increasing amounts of data to be acquired at diminishing costs during training. Traditional human subject testing often collects qualitative data from participants through self-reported questionnaires. This qualitative information is valuable but often incomplete to assess training outcomes. Quantitative information such as motion tracking data, communication frequency, and heart rate can offer the missing pieces in training outcome assessment. The successful fusion and analysis of qualitative and quantitative information sources is necessary for collaborative, mixed-reality, and augmented-reality training to reach its full potential. The challenge is determining a reliable framework ...
Footprintid: Indoor Pedestrian Identification Through Ambient Structural Vibration Sensing, 2017 Carnegie Mellon University
Footprintid: Indoor Pedestrian Identification Through Ambient Structural Vibration Sensing, Shijia Pan, Tong Yu, Mostafa Mirshekari, Jonathon Fagert, Amelie Bonde, Ole J. Mengshoel, Hae Young Noh, Pei Zhang
Ole J Mengshoel
Improving Speech Recognition For Interviews With Both Clean And Telephone Speech, 2017 Minnesota State University, Mankato
Improving Speech Recognition For Interviews With Both Clean And Telephone Speech, Sung Woo Choi
Journal of Undergraduate Research at Minnesota State University, Mankato
High quality automatic speech recognition (ASR) depends on the context of the speech. Cleanly recorded speech has better results than speech recorded over telephone lines. In telephone speech, the signal is band-pass filtered which limits frequencies available for computation. Consequently, the transmitted speech signal may be distorted by noise, causing higher word error rates (WER). The main goal of this research project is to examine approaches to improve recognition of telephone speech while maintaining or improving results for clean speech in mixed telephone-clean speech recordings, by reducing mismatches between the test data and the available models. The test data includes ...
Information Theoretic Study Of Gaussian Graphical Models And Their Applications, 2017 Louisiana State University and Agricultural and Mechanical College
Information Theoretic Study Of Gaussian Graphical Models And Their Applications, Ali Moharrer
LSU Doctoral Dissertations
In many problems we are dealing with characterizing a behavior of a complex stochastic system or its response to a set of particular inputs. Such problems span over several topics such as machine learning, complex networks, e.g., social or communication networks; biology, etc. Probabilistic graphical models (PGMs) are powerful tools that offer a compact modeling of complex systems. They are designed to capture the random behavior, i.e., the joint distribution of the system to the best possible accuracy. Our goal is to study certain algebraic and topological properties of a special class of graphical models, known as Gaussian ...
Distributed Emitter Detector Design Under Imperfect Communication Channel, 2017 University of New Orleans
Distributed Emitter Detector Design Under Imperfect Communication Channel, Soumyadip Patra
University of New Orleans Theses and Dissertations
We consider the distributed detection of an emitter using multiple sensors deployed at deterministic locations. The signal from the emitter follows a signal attenuation model dependent on the distance between the sensor and the emitter. The sensors transmit their decisions to the fusion center through a parallel access Binary Symmetric Channel (BSC) with a cross-over probability. We seek to optimize the detection performance under a prescribed false alarm at the sensor level and at the system level. We consider the triangular topology structure and using the least favorable emitter range study the impact of the BSC on the system level ...
Gui For Mri-Compatible Neural Stimulator And Recorder, 2017 Purdue University
Gui For Mri-Compatible Neural Stimulator And Recorder, Soo Han Soon, Nishant Babaria, Ranajay Mandal, Zhongming Liu
The Summer Undergraduate Research Fellowship (SURF) Symposium
Functional magnetic resonance imaging (fMRI) and electroencephalography (EEG) are useful tools to analyze brain activities given active stimulation. However, the electromagnetic noise from the MRI distorts the brain signal recording and damages the subject with excessive heat generated on the electrodes attached to the skin. MRI-compatible recording and stimulation systems previously developed at LIBI lab were capable of removing the electromagnetic noise during the imaging process. Previously, the hardware systems had required the integrative software that could control both circuits simultaneously and enable users to easily change recording and stimulation parameters. Graphical user interface (GUI) programmed with computer language informed ...
Ocean Wind Speed Measurement Using Wideband Gnss-R Signals, 2017 Purdue University
Ocean Wind Speed Measurement Using Wideband Gnss-R Signals, Brandon J. Kozel, Han Zhang, James L. Garrison, Benjamin Nold
The Summer Undergraduate Research Fellowship (SURF) Symposium
The use of Global Navigation Satellite System-Reflectometry (GNSS-R) for remote sensing of ocean wind speeds has been explored for nearly two decades and has become an important passive remote sensing technique for verification of hurricane formation models. To obtain wind speed measurements, reflected GNSS signals are first cross-correlated with locally generated copies to construct delay-doppler maps (DDMs). Through statistical models, DDMs can provide information about the mean-square slope (MSS) of the ocean surface, which is related to wind speed. Previous studies have focused on legacy signals such as GPS L1. However, it is expected that the MSS relationship with ocean ...
Two Senior Projects: 2.4 Ghz, 40% Efficiency Radio Frequency Amplifier, Ieee Design Contest, & Design And Implementation Of A Software Costas Loop For Audio Frequencies, 2017 California Polytechnic State University, San Luis Obispo
Two Senior Projects: 2.4 Ghz, 40% Efficiency Radio Frequency Amplifier, Ieee Design Contest, & Design And Implementation Of A Software Costas Loop For Audio Frequencies, Robert J. Tong
How to Read this Document:
This document combines two senior project reports. The first senior project documents designing a class AB RF amplifier. The second, discusses the design and implementation of a software Costas loop for audio frequencies. The first report begins on the next page, while the Costas loop report starts on page 24. The two reports are orthogonal from one another. It is not a prerequisite to read the RF amplifier report before reading the Costas loop report. This document is merely two reports combined into one document. The second report, about the Costas loop, was written as ...
Software-Defined Networking Enabled Resource Management And Security Provisioning In 5g Heterogeneous Networks, 2017 The University of Western Ontario
Software-Defined Networking Enabled Resource Management And Security Provisioning In 5g Heterogeneous Networks, Xiaoyu Duan
Electronic Thesis and Dissertation Repository
Due to the explosive growth of mobile data traffic and the shortage of spectral resources, 5G networks are envisioned to have a densified heterogeneous network (HetNet) architecture, combining multiple radio access technologies (multi-RATs) into a single holistic network. The co-existing of multi-tier architectures bring new challenges, especially on resource management and security provisioning, due to the lack of common interface and consistent policy across HetNets. In this thesis, we aim to address the technical challenges of data traffic management, coordinated spectrum sharing and security provisioning in 5G HetNets through the introduction of a programmable management platform based on Software-defined networking ...
Towards Continuous And Passive Authentication Across Mobile Devices: An Empirical Study, 2017 Carnegie Mellon University
Towards Continuous And Passive Authentication Across Mobile Devices: An Empirical Study, Xiao Wang, Tong Yu, Ole J. Mengshoel, Patrick Tague
Ole J Mengshoel
Mobility Analysis And Management For Heterogeneous Networks, 2017 Florida International University
Mobility Analysis And Management For Heterogeneous Networks, Karthik Vasudeva
FIU Electronic Theses and Dissertations
The global mobile data traffic has increased tremendously in the last decade due to the technological advancement in smartphones. Their endless usage and bandwidth-intensive applications will saturate current 4G technologies and has motivated the need for concrete research in order to sustain the mounting data traffic demand. In this regard, the network densification has shown to be a promising direction to cope with the capacity demands in future 5G wireless networks. The basic idea is to deploy several low power radio access nodes called small cells closer to the users on the existing large radio foot print of macrocells, and ...
Analysis Of Various Classification Techniques For Computer Aided Detection System Of Pulmonary Nodules In Ct, 2017 University of Dayton
Analysis Of Various Classification Techniques For Computer Aided Detection System Of Pulmonary Nodules In Ct, Barath Narayanan Narayanan, Russell C. Hardie, Temesguen Messay
Russell C. Hardie
Lung cancer is the leading cause of cancer death in the United States. It usually exhibits its presence with the formation of pulmonary nodules. Nodules are round or oval-shaped growth present in the lung. Computed Tomography (CT) scans are used by radiologists to detect such nodules. Computer Aided Detection (CAD) of such nodules would aid in providing a second opinion to the radiologists and would be of valuable help in lung cancer screening. In this research, we study various feature selection methods for the CAD system framework proposed in FlyerScan. Algorithmic steps of FlyerScan include (i) local contrast enhancement (ii ...
Degrees Of Freedom Region For An Interference Network With General Message Demands, 2017 Qualcomm, Inc.
Degrees Of Freedom Region For An Interference Network With General Message Demands, Lei Ke, Aditya Ramamoorthy, Zhengdao Wang, Huarui Yin
We consider a single hop interference network with K transmitters, each with an independent message and J receivers, all having the same number (M) of antennas. Each receiver requests an arbitrary subset of the messages. This generalizes the well-known K user M antenna interference channel, where each message is requested by a unique receiver. For this setup, we derive the exact degrees of freedom (DoF) region. Our achievability scheme generalizes the interference alignment scheme proposed by Cadambe and Jafar '08. In particular, we achieve general points in the DoF region by using multiple base vectors and aligning the interference at ...
Efficient Macromodeling And Fast Transient Simulation Of High Speed Distributed Interconnects, 2017 The University of Western Ontario
Efficient Macromodeling And Fast Transient Simulation Of High Speed Distributed Interconnects, Sadia Wahid
Electronic Thesis and Dissertation Repository
In the first part of the thesis, an efficient macromodeling technique based on Loewner Matrix (LM) approach has been presented to model multi-port distributed systems using tabulated noisy data. In the proposed method, Loewner Model data from previous rational approximation are used to create less noisy eigenvectors in an iterative manner. As a result, the biasing effect of the LM model approximated by the noisy data is reduced. It is illustrated that this method improves the accuracy of the Loewner Matrix modeling for noisy frequency data.
In the second part, a fast and robust algorithm is introduced for time-domain simulation ...
Recursive Robust Pca Or Recursive Sparse Recovery In Large But Structured Noise, 2017 Iowa State University
Recursive Robust Pca Or Recursive Sparse Recovery In Large But Structured Noise, Chenlu Qiu, Namrata Vaswani, Brian Lois, Leslie Hogben
This paper studies the recursive robust principal components analysis problem. If the outlier is the signal-of-interest, this problem can be interpreted as one of recursively recovering a time sequence of sparse vectors, St, in the presence of large but structured noise, Lt. The structure that we assume on Lt is that Lt is dense and lies in a low-dimensional subspace that is either fixed or changes slowly enough. A key application where this problem occurs is in video surveillance where the goal is to separate a slowly changing background (Lt) from moving foreground objects (St) on-the-fly. To solve the above ...
Capturing Cognitive Fingerprints From Keystroke Dynamics, 2017 Iowa State University
Capturing Cognitive Fingerprints From Keystroke Dynamics, J. Morris Chang, Chi-Chen Fang, Kuan-Hsing Ho, Norene Kelly, Pei-Yuan Wu, Yixiao Ding, Chris Chu, Stephen B. Gilbert, Amed E. Kamal, Sun-Yuan Kung
Conventional authentication systems identify a user only at the entry point. Keystroke dynamics can continuously authenticate users by their typing rhythms without extra devices. This article presents a new feature called cognitive typing rhythm (CTR) to continuously verify the identities of computer users. Two machine techniques, SVM and KRR, have been developed for the system. The best results from experiments conducted with 1,977 users show a false-rejection rate of 0.7 percent and a false-acceptance rate of 5.5 percent. CTR therefore constitutes a cognitive fingerprint for continuous. Its effectiveness has been verified through a large-scale dataset. This article ...