Open Access. Powered by Scholars. Published by Universities.®

Systems and Communications Commons

Open Access. Powered by Scholars. Published by Universities.®

1104 Full-Text Articles 1339 Authors 577419 Downloads 61 Institutions

All Articles in Systems and Communications

Faceted Search

1104 full-text articles. Page 1 of 42.

Analysis Of Various Classification Techniques For Computer Aided Detection System Of Pulmonary Nodules In Ct, Barath Narayanan Narayanan, Russell C. Hardie, Temesguen Messay 2017 University of Dayton

Analysis Of Various Classification Techniques For Computer Aided Detection System Of Pulmonary Nodules In Ct, Barath Narayanan Narayanan, Russell C. Hardie, Temesguen Messay

Russell C. Hardie

Lung cancer is the leading cause of cancer death in the United States. It usually exhibits its presence with the formation of pulmonary nodules. Nodules are round or oval-shaped growth present in the lung. Computed Tomography (CT) scans are used by radiologists to detect such nodules. Computer Aided Detection (CAD) of such nodules would aid in providing a second opinion to the radiologists and would be of valuable help in lung cancer screening. In this research, we study various feature selection methods for the CAD system framework proposed in FlyerScan. Algorithmic steps of FlyerScan include (i) local contrast enhancement (ii ...


Degrees Of Freedom Region For An Interference Network With General Message Demands, Lei Ke, Aditya Ramamoorthy, Zhengdao Wang, Huarui Yin 2017 Qualcomm, Inc.

Degrees Of Freedom Region For An Interference Network With General Message Demands, Lei Ke, Aditya Ramamoorthy, Zhengdao Wang, Huarui Yin

Zhengdao Wang

We consider a single hop interference network with K transmitters, each with an independent message and J receivers, all having the same number (M) of antennas. Each receiver requests an arbitrary subset of the messages. This generalizes the well-known K user M antenna interference channel, where each message is requested by a unique receiver. For this setup, we derive the exact degrees of freedom (DoF) region. Our achievability scheme generalizes the interference alignment scheme proposed by Cadambe and Jafar '08. In particular, we achieve general points in the DoF region by using multiple base vectors and aligning the interference at ...


Capturing Cognitive Fingerprints From Keystroke Dynamics, J. Morris Chang, Chi-Chen Fang, Kuan-Hsing Ho, Norene Kelly, Pei-Yuan Wu, Yixiao Ding, Chris Chu, Stephen B. Gilbert, Amed E. Kamal, Sun-Yuan Kung 2017 Iowa State University

Capturing Cognitive Fingerprints From Keystroke Dynamics, J. Morris Chang, Chi-Chen Fang, Kuan-Hsing Ho, Norene Kelly, Pei-Yuan Wu, Yixiao Ding, Chris Chu, Stephen B. Gilbert, Amed E. Kamal, Sun-Yuan Kung

Morris Chang

Conventional authentication systems identify a user only at the entry point. Keystroke dynamics can continuously authenticate users by their typing rhythms without extra devices. This article presents a new feature called cognitive typing rhythm (CTR) to continuously verify the identities of computer users. Two machine techniques, SVM and KRR, have been developed for the system. The best results from experiments conducted with 1,977 users show a false-rejection rate of 0.7 percent and a false-acceptance rate of 5.5 percent. CTR therefore constitutes a cognitive fingerprint for continuous. Its effectiveness has been verified through a large-scale dataset. This article ...


Fusing Self-Reported And Sensor Data From Mixed-Reality Training, Trevor Richardson, Stephen B. Gilbert, Joseph Holub, Frederick Thompson, Anastacia MacAllister, Rafael Radkowski, Eliot Winer 2017 Iowa State University

Fusing Self-Reported And Sensor Data From Mixed-Reality Training, Trevor Richardson, Stephen B. Gilbert, Joseph Holub, Frederick Thompson, Anastacia Macallister, Rafael Radkowski, Eliot Winer

Stephen B. Gilbert

Military and industrial use of smaller, more accurate sensors are allowing increasing amounts of data to be acquired at diminishing costs during training. Traditional human subject testing often collects qualitative data from participants through self-reported questionnaires. This qualitative information is valuable but often incomplete to assess training outcomes. Quantitative information such as motion tracking data, communication frequency, and heart rate can offer the missing pieces in training outcome assessment. The successful fusion and analysis of qualitative and quantitative information sources is necessary for collaborative, mixed-reality, and augmented-reality training to reach its full potential. The challenge is determining a reliable framework ...


Capturing Cognitive Fingerprints From Keystroke Dynamics, J. Morris Chang, Chi-Chen Fang, Kuan-Hsing Ho, Norene Kelly, Pei-Yuan Wu, Yixiao Ding, Chris Chu, Stephen B. Gilbert, Amed E. Kamal, Sun-Yuan Kung 2017 Iowa State University

Capturing Cognitive Fingerprints From Keystroke Dynamics, J. Morris Chang, Chi-Chen Fang, Kuan-Hsing Ho, Norene Kelly, Pei-Yuan Wu, Yixiao Ding, Chris Chu, Stephen B. Gilbert, Amed E. Kamal, Sun-Yuan Kung

Stephen B. Gilbert

Conventional authentication systems identify a user only at the entry point. Keystroke dynamics can continuously authenticate users by their typing rhythms without extra devices. This article presents a new feature called cognitive typing rhythm (CTR) to continuously verify the identities of computer users. Two machine techniques, SVM and KRR, have been developed for the system. The best results from experiments conducted with 1,977 users show a false-rejection rate of 0.7 percent and a false-acceptance rate of 5.5 percent. CTR therefore constitutes a cognitive fingerprint for continuous. Its effectiveness has been verified through a large-scale dataset. This article ...


Impact Of Threshold Clipping On Bit Error Rate In Ofdm-Like Systems, Felipe Hoshino, Theodore Grosch 2017 University of Campinas

Impact Of Threshold Clipping On Bit Error Rate In Ofdm-Like Systems, Felipe Hoshino, Theodore Grosch

The Kennesaw Journal of Undergraduate Research

In wireless communications, 3GPP LTE is one of the solutions to meet the greater transmission data rate demand. One issue inherent to this technology is the PAPR (Peak-to-Average Power Ratio) of OFDM (Orthogonal Frequency Division Multiplexing) modulation. This high PAPR affects of the efficiency of power amplifiers. One approach to mitigate this effect is the Crest Factor Reduction (CFR) technique. In this work we simulate the impact of Hard Limited Clipping Crest Factor Reduction technique on BER (Bit Error Rate) in OFDM based Systems. In general, the results showed CFR has more effect on higher digital modulation schemes, as expected ...


Autonomous Speed Control For Kia Optima, Andrew J. Combs, Kyle Fugatt, Kevin McFall 2017 Kennesaw State University

Autonomous Speed Control For Kia Optima, Andrew J. Combs, Kyle Fugatt, Kevin Mcfall

The Kennesaw Journal of Undergraduate Research

The standard method for speed control is the cruise control system built into most modern vehicles. These systems employ a PID controller which actuates the accelerator thus, in turn, maintains the desired vehicle speed. The main drawback of such a system is that typically the cruise control will only engage above 25 mph. The goal of this paper is to describe a system which we used to control vehicle speed from a stop to any desired speed using an Arduino microcontroller and a CAN BUS shield, from where autonomous features can be built upon. With this system, we were able ...


Smart Grid Technology In The Developing World, Jacob R. Young 2017 Seattle Pacific University

Smart Grid Technology In The Developing World, Jacob R. Young

Honors Projects

A smart grid is the integration of communication and information technologies with contemporary power infrastructure to enhance load service and to incorporate continually evolving end-use applications. It is the latest advancement in the areas of power generation, transmission and distribution. It has advanced beyond the traditional grid structure at every stage; a smart grid is capable of incorporating distributed generation (DG) renewable sources and has improved transmission capabilities through implementation of technologies such as Flexible AC Transmission Systems (FACTS). Through the addition of control technology in the distribution network a smart grid is able to implement “self-healing” and other methods ...


Vehicle Occupancy Detection System, Hannah Miller, Justin Wert, Kelsey Lunberg 2017 University of Wyoming

Vehicle Occupancy Detection System, Hannah Miller, Justin Wert, Kelsey Lunberg

Honors Theses AY 16/17

Personal vehicles often become traps for unattended occupants throughout the year. Sadly, this can lead to severe health complications or even death if exposed for too long. Although these complications arise primarily in hot climates, it has been demonstrated that they can happen in any environment. Prolonged exposure to an unfamiliar and often dangerous setting without competent human intervention can be detrimental to health. This problem predominantly impacts pets and young children. In an effort to reduce these preventable health complications and possible deaths, we have developed a vehicle occupancy detection system.

The goal of developing this occupancy detection system ...


An Exact Analysis For Four-Order Acousto-Optic Bragg Diffraction Which Incorporates Both Incident Light Angle And Sound Frequency Dependencies, Adeyinka Sunday Ademola 2017 University of Texas at Tyler

An Exact Analysis For Four-Order Acousto-Optic Bragg Diffraction Which Incorporates Both Incident Light Angle And Sound Frequency Dependencies, Adeyinka Sunday Ademola

Electrical Engineering Theses

This thesis extends the prior work which produced an exact solution to the four-order acousto-optic (AO) Bragg cell with assumed fixed center frequency and with exact Bragg angle incident light. The extension predicts the model that incorporates the dependencies of both the input angle of light and the sound frequency. Specifically, a generalized 4th order linear differential equation (DE), is developed from a simultaneous analysis of four coupled AO system of DEs. Through standard methods, the characteristic roots, which requires solving a quartic equation, is produced. Subsequently, a derived system of homogeneous solutions, which absorbs the roots obtained using ...


Short-Circuit Protection For Low-Voltage Dc Distribution Systems Based On Solid-State Circuit Breakers, Sharthak Munasib 2017 University of Arkansas, Fayetteville

Short-Circuit Protection For Low-Voltage Dc Distribution Systems Based On Solid-State Circuit Breakers, Sharthak Munasib

Theses and Dissertations

Proper short-circuit protection in dc distribution systems has provided an austere challenge to researchers as the development of commercially-viable equipment providing fast operation, coordination and reliability still continues. The objective of this thesis is to analyze issues associated with short-circuit protection of low-voltage dc (LVDC) distribution systems and propose a short-circuit protection methodology based on solid-state circuit breakers (SSCBs) that provides fault-current limiting (FCL). Simulation results for a simplified notional 1-kVdc distribution system, performed in MATLAB/SIMULINKTM, would be presented to illustrate that SSCB solutions based on reverse-blocking integrated gate-commutated thyristors (RB-IGCT) are feasible for low-voltage dc distribution systems but ...


Applications Of Krylov Subspace And Balanced Truncation Model Order Reduction In Power Systems, Sebastian Emanuel Garrido 2017 University of Arkansas, Fayetteville

Applications Of Krylov Subspace And Balanced Truncation Model Order Reduction In Power Systems, Sebastian Emanuel Garrido

Theses and Dissertations

Dynamic representations of power systems usually result in the order of hundreds or even thousands of buses. Therefore, reduction of these dynamic representations is convenient. Two applications of model order reduction in power systems are discussed in this thesis. First, Krylov subspace-based method is applied to the IEEE-123 Node Test Feeder in the context of distribution-level power systems simulation. Second, a Balanced Truncation-based model reduction is implemented in the 3-Machine 9-Bus system for designing a power system controller in the context of generation- and transmission-level power systems.

First, for the IEEE-123 Node Test Feeder, a two-sided Arnoldi algorithm is proposed ...


5g-Ucda Multi Antenna-To-Logical Cell Circular Fifo Mapping Strategy For High-Speed Train Wireless Communications, Subharthi Banerjee 2017 University of Nebraska-Lincoln

5g-Ucda Multi Antenna-To-Logical Cell Circular Fifo Mapping Strategy For High-Speed Train Wireless Communications, Subharthi Banerjee

Theses, Dissertations, and Student Research from Electrical & Computer Engineering

2020 is the target year for the roll out of fifth generation wireless communication methodologies. The commercial vendors have characterized 5G as a collection of disruptive set of technologies to provide high throughput, low latency communication supporting a variety of services, i.e., machine to machine communication to next generation base stations and vehicle-to-vehicle communication to radio-over-fiber and high mobility channels. High-speed train wireless communication channels as a subset of high mobility channels have their clear advantages and disadvantages considering other vehicular channels. The speed of high-speed trains is going to reach 500km/hr and with Hyperloop it may reach ...


Java Server Reliability In The Presence Of Failures, Rich Coe 2017 Marquette University

Java Server Reliability In The Presence Of Failures, Rich Coe

Master's Theses (2009 -)

A design for the separation of a server interface and work processing. Numerous sources, Tanenbaum (Tanenbaum Modern Operating Systems, 493), Goscinski (Goscinski Distributed operating systems, 203), and Birman (Birman Reliable distributed systems, 265), all discuss the concept of Two-Phase Commit, where a coordinator directs one or more processes to perform a transaction. If the transaction or any of the processes fail, the coordinator can decide how to proceed by either retrying or aborting the request. The popular web browser Chrome utilizes a separate process for each tab displayed. Should the rendering and display of a web page cause a crash ...


Recursive Robust Pca Or Recursive Sparse Recovery In Large But Structured Noise, Chenlu Qiu, Namrata Vaswani, Brian Lois, Leslie Hogben 2017 Iowa State University

Recursive Robust Pca Or Recursive Sparse Recovery In Large But Structured Noise, Chenlu Qiu, Namrata Vaswani, Brian Lois, Leslie Hogben

Leslie Hogben

This paper studies the recursive robust principal components analysis problem. If the outlier is the signal-of-interest, this problem can be interpreted as one of recursively recovering a time sequence of sparse vectors, St, in the presence of large but structured noise, Lt. The structure that we assume on Lt is that Lt is dense and lies in a low-dimensional subspace that is either fixed or changes slowly enough. A key application where this problem occurs is in video surveillance where the goal is to separate a slowly changing background (Lt) from moving foreground objects (St) on-the-fly. To solve the above ...


Uhf Rfid Antenna Impedance Matching Techniques, Kamron Sockolov 2017 California Polytechnic State University, San Luis Obispo

Uhf Rfid Antenna Impedance Matching Techniques, Kamron Sockolov

Master's Theses and Project Reports

Radio Frequency Identification (RFID) systems use electromagnetic signals to wirelessly identify and track RFID-tagged objects. A reader transmits a carrier wave request signal to an RFID tag, which then transmits a unique identification signal back to the reader. Applications include supply chain inventory management, automated toll booth fee systems, sports event timing, restricted access control, pet monitoring and retail theft prevention. An RFID tag includes an antenna connected to a Radio Frequency Integrated Circuit (RFIC). RFID tags in the ultra-high frequency (UHF), industrial, scientific and medical (ISM) 902-928MHz band and global Electronic Product Code (EPC) 860‑960MHz band are powered ...


Zinc Finger Database (Zifdb): A Repository For Information On C2h2 Zinc Fingers And Engineered Zinc-Finger Arrays, Fengli Fu, Jeffry D. Sander, Morgan Maeder, Stacey Thibodeau-Beganny, J. Keith Joung, Drena L. Dobbs, Leslie Miller, Daniel F. Voytas 2017 Iowa State University

Zinc Finger Database (Zifdb): A Repository For Information On C2h2 Zinc Fingers And Engineered Zinc-Finger Arrays, Fengli Fu, Jeffry D. Sander, Morgan Maeder, Stacey Thibodeau-Beganny, J. Keith Joung, Drena L. Dobbs, Leslie Miller, Daniel F. Voytas

Drena Dobbs

Zinc fingers are the most abundant DNA-binding motifs encoded by eukaryotic genomes and one of the best understood DNA-recognition domains. Each zinc finger typically binds a 3-nt target sequence, and it is possible to engineer zinc-finger arrays (ZFAs) that recognize extended DNA sequences by linking together individual zinc fingers. Engineered zinc-finger proteins have proven to be valuable tools for gene regulation and genome modification because they target specific sites in a genome. Here we describe ZiFDB (Zinc Finger Database;http://bindr.gdcb.iastate.edu/ZiFDB), a web-accessible resource that compiles information on individual zinc fingers and engineered ZFAs. To enhance ...


Using The Biological Taxonomy To Access Biological Literature With Pathbinderh, J. Ding, Karthik Viswanathan, Daniel Berleant, L. Hughes, Eve S. Wurtele, Daniel Ashlock, Julie A. Dickerson, A. Fulmer, Patrick S. Schnable 2017 Iowa State University

Using The Biological Taxonomy To Access Biological Literature With Pathbinderh, J. Ding, Karthik Viswanathan, Daniel Berleant, L. Hughes, Eve S. Wurtele, Daniel Ashlock, Julie A. Dickerson, A. Fulmer, Patrick S. Schnable

Eve Wurtele

PathBinderH allows users to make queries that retrieve sentences and the abstracts containing them from PubMed. Another aspect of PathBinderH is that users can specify biological taxa in order to limit searches by mentioning either the specified taxa, or their subordinate taxa, in the biological taxonomy. Although the current project requires this function only for plant taxa, the principle is extensible to the entire taxonomy.


Numerical Simulation And Experimental Validation Of A Large-Area Capacitive Strain Sensor For Fatigue Crack Monitoring, Xiangxiong Kong, Jian Li, Caroline Bennett, William Colins, Simon Laflamme 2017 University of Kansas

Numerical Simulation And Experimental Validation Of A Large-Area Capacitive Strain Sensor For Fatigue Crack Monitoring, Xiangxiong Kong, Jian Li, Caroline Bennett, William Colins, Simon Laflamme

Simon Laflamme

A large-area electronics in the form of a soft elastomeric capacitor (SEC) has shown great promise as a strain sensor for fatigue crack monitoring in steel structures. The SEC sensors are inexpensive, easy to fabricate, highly stretchable, and mechanically robust. It is a highly scalable technology, capable of monitoring deformations on mesoscale systems. Preliminary experiments verified the SEC sensor’s capability in detecting, localizing, and monitoring crack growth in a compact specimen. Here, a numerical simulation method is proposed to simulate accurately the sensor’s performance under fatigue cracks. Such a method would provide a direct link between the SEC ...


Indoor Mapping Drone, Benjamin J. Plevny, Andrew Armstrong, Miguel Lopez, Davidson Okpara 2017 The University of Akron

Indoor Mapping Drone, Benjamin J. Plevny, Andrew Armstrong, Miguel Lopez, Davidson Okpara

Honors Research Projects

This project addresses the need for an autonomous indoor mapping system that will create a 3D map of an unknown physical environment in real time. The aerial system moves and avoids obstacles autonomously, without the need for human remote control or observation. An aerial system produces a map of an unknown indoor environment by transmitting data received from the aerial device’s sensors. The transmission occurs over a wireless channel from the aerial device to a remote server for processing and storage of the data. As the transmission is done in real time, the aerial system does not require hardware ...


Digital Commons powered by bepress