Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Articles 31 - 51 of 51

Full-Text Articles in Entire DC Network

Recursive Robust Pca Or Recursive Sparse Recovery In Large But Structured Noise, Chenlu Qiu, Namrata Vaswani, Brian Lois, Leslie Hogben Jun 2017

Recursive Robust Pca Or Recursive Sparse Recovery In Large But Structured Noise, Chenlu Qiu, Namrata Vaswani, Brian Lois, Leslie Hogben

Namrata Vaswani

This paper studies the recursive robust principal components analysis problem. If the outlier is the signal-of-interest, this problem can be interpreted as one of recursively recovering a time sequence of sparse vectors, St, in the presence of large but structured noise, Lt. The structure that we assume on Lt is that Lt is dense and lies in a low-dimensional subspace that is either fixed or changes slowly enough. A key application where this problem occurs is in video surveillance where the goal is to separate a slowly changing background (Lt) from moving foreground objects (St) on-the-fly. To solve the above …


Capturing Cognitive Fingerprints From Keystroke Dynamics, J. Morris Chang, Chi-Chen Fang, Kuan-Hsing Ho, Norene Kelly, Pei-Yuan Wu, Yixiao Ding, Chris Chu, Stephen B. Gilbert, Amed E. Kamal, Sun-Yuan Kung Jun 2017

Capturing Cognitive Fingerprints From Keystroke Dynamics, J. Morris Chang, Chi-Chen Fang, Kuan-Hsing Ho, Norene Kelly, Pei-Yuan Wu, Yixiao Ding, Chris Chu, Stephen B. Gilbert, Amed E. Kamal, Sun-Yuan Kung

Morris Chang

Conventional authentication systems identify a user only at the entry point. Keystroke dynamics can continuously authenticate users by their typing rhythms without extra devices. This article presents a new feature called cognitive typing rhythm (CTR) to continuously verify the identities of computer users. Two machine techniques, SVM and KRR, have been developed for the system. The best results from experiments conducted with 1,977 users show a false-rejection rate of 0.7 percent and a false-acceptance rate of 5.5 percent. CTR therefore constitutes a cognitive fingerprint for continuous. Its effectiveness has been verified through a large-scale dataset. This article is part of …


Natural Selection Of Asphalt Mix Stiffness Predictive Models With Genetic Programming, Kasthurirangan Gopalakrishnan, Sunghwan Kim, Halil Ceylan, Siddhartha K. Khaitan Jun 2017

Natural Selection Of Asphalt Mix Stiffness Predictive Models With Genetic Programming, Kasthurirangan Gopalakrishnan, Sunghwan Kim, Halil Ceylan, Siddhartha K. Khaitan

Siddhartha Khaitan

Genetic Programming (GP) is a systematic, domain-independent evolutionary computation technique that stochastically evolves populations of computer programs to perform a user-defined task. Similar to Genetic Algorithms (GA) which evolves a population of individuals to better ones, GP iteratively transforms a population of computer programs into a new generation of programs by applying biologically inspired operations such as crossover, mutation, etc. In this paper, a population of Hot-Mix Asphalt (HMA) dynamic modulus stiffness prediction models is genetically evolved to better ones by applying the principles of genetic programming. The HMA dynamic modulus (|E*|), one of the stiffness measures, is the primary …


Prediction Of Remaining Life Of Power Transformers Based On Left Truncated And Right Censored Lifetime Data, Yili Hong, William Q. Meeker, James D. Mccalley Jun 2017

Prediction Of Remaining Life Of Power Transformers Based On Left Truncated And Right Censored Lifetime Data, Yili Hong, William Q. Meeker, James D. Mccalley

James McCalley

Prediction of the remaining life of high-voltage power transformers is an important issue for energy companies because of the need for planning maintenance and capital expenditures. Lifetime data for such transformers are complicated because transformer lifetimes can extend over many decades and transformer designs and manufacturing practices have evolved. We were asked to develop statistically-based predictions for the lifetimes of an energy company’s fleet of high-voltage transmission and distribution transformers. The company’s data records begin in 1980, providing information on installation and failure dates of transformers. Although the dataset contains many units that were installed before 1980, there is no …


A Multiperiod Generalized Network Flow Model Of The U.S. Integrated Energy System: Part I—Model Description, Ana Quelhas, Esteban Gil, James D. Mccalley, Sarah M. Ryan Jun 2017

A Multiperiod Generalized Network Flow Model Of The U.S. Integrated Energy System: Part I—Model Description, Ana Quelhas, Esteban Gil, James D. Mccalley, Sarah M. Ryan

James McCalley

This paper is the first of a two-part paper presenting a multiperiod generalized network flow model of the integrated energy system in the United States. Part I describes the modeling approach used to evaluate the economic efficiencies of the system-wide energy flows, from the coal and natural gas suppliers to the electric load centers. Under the proposed problem formulation, fuel supply and electricity demand nodes are connected via a transportation network, and the model is solved for the most efficient allocation of quantities and corresponding prices. The methodology includes physical, economic, and environmental aspects that characterize the different networks. Part …


Elastometric Device For Tunable Imaging, Jaeyoun Kim Jun 2017

Elastometric Device For Tunable Imaging, Jaeyoun Kim

Jaeyoun Kim

An optical micro-electro-mechanical systems (MEMS) structure is provided. The structure includes an elastomer membrane, a plurality of polymer fibers attached to the elastomer membrane, an array of detectors operatively connected to the plurality of polymer fibers at a first end of the plurality of polymer fibers, and a microlens array operatively connected to the plurality of polymer fibers at a second end of the plurality of polymer fibers. A method of manufacturing an optical MEMS structure is provided. The method includes forming a hollow PDMS chamber in which PDMS fibers extend from top to bottom using a lost wax molding …


Highly Directional Receiver And Source Antennas Using Photonic Band Gap Crystals, Rana Biswas, Gary L. Tuttle, Ekmel Ozbay, Burak Temelkuran, Mihail Sigalas, Kai-Ming Ho Jun 2017

Highly Directional Receiver And Source Antennas Using Photonic Band Gap Crystals, Rana Biswas, Gary L. Tuttle, Ekmel Ozbay, Burak Temelkuran, Mihail Sigalas, Kai-Ming Ho

Gary Tuttle

A directional antenna made with photonic band gap structures has been presented. The directional antenna is formed with two photonic band gap structures oriented back to back and separated from each other by a distance to form a resonant cavity between the photonic band gap structures. An antenna element is placed in the resonant cavity. The resonant frequency of the cavity is tuned by adjusting the distance between the photonic band gap structures. The resonant cavity can be asymmetrical or symmetrical.


Weak Anti-Localization And Quantum Oscillations Of Surface States In Topological Insulator Bi2se2te, Lihong Bao, Liang He, Nicholas R. Meyer, Xufeng Kou, Peng Zhang, Zhi-Gang Chen, Alexei V. Fedorov, Trevor M. Riedemann, Thomas A. Lograsso, Kang L. Wang, Gary Tuttle, Faxian Xiu Jun 2017

Weak Anti-Localization And Quantum Oscillations Of Surface States In Topological Insulator Bi2se2te, Lihong Bao, Liang He, Nicholas R. Meyer, Xufeng Kou, Peng Zhang, Zhi-Gang Chen, Alexei V. Fedorov, Trevor M. Riedemann, Thomas A. Lograsso, Kang L. Wang, Gary Tuttle, Faxian Xiu

Gary Tuttle

Topological insulators, a new quantum state of matter, create exciting opportunities for studying topological quantum physics and for exploring spintronic applications due to their gapless helical metallic surface states. Here, we report the observation of weak anti-localization and quantum oscillations originated from surface states in Bi2Se2Te crystals. Angle-resolved photoemission spectroscopy measurements on cleaved Bi2Se2Te crystals show a well-defined linear dispersion without intersection of the conduction band. The measured weak anti-localization effect agrees well with the Hikami-Larkin-Nagaoka model and the extracted phase coherent length shows a power-law dependence with temperature ( ∼T−0.44), indicating the presence of the surface states. …


Ferromagnetism Of Magnetically Doped Topological Insulators In Crxbi2− Xte3 Thin Films, Yan Ni, Z. Zhang, Ikenna C. Nlebedim, M. Ravi Hadimani, Gary L. Tuttle, David C. Jiles Jun 2017

Ferromagnetism Of Magnetically Doped Topological Insulators In Crxbi2− Xte3 Thin Films, Yan Ni, Z. Zhang, Ikenna C. Nlebedim, M. Ravi Hadimani, Gary L. Tuttle, David C. Jiles

Gary Tuttle

We investigated the effect of magnetic doping on magnetic and transport properties of Bi2Te3thin films. CrxBi2−xTe3 thin films with x = 0.03, 0.14, and 0.29 were grown epitaxially on mica substrate with low surface roughness (∼0.4 nm). It is found that Cr is an electron acceptor in Bi2Te3 and increases the magnetization of CrxBi2−xTe3. When x = 0.14 and 0.29,ferromagnetism appears in CrxBi2−xTe3 thin films, where anomalous Hall effect and weak localization of magnetoconductance were observed. The Curie temperature, coercivity, and remnant Hall resistance of thin films increase with increasing Cr concentration. The Arrott-Noakes plot demonstrates that the critical mechanism …


Network Connection Blocker, Method, And Computer Readable Memory For Monitoring Connections In A Computer Network And Blocking The Unwanted Connections, Douglas W. Jacobson, James A. Davis Jun 2017

Network Connection Blocker, Method, And Computer Readable Memory For Monitoring Connections In A Computer Network And Blocking The Unwanted Connections, Douglas W. Jacobson, James A. Davis

Douglas Jacobson

A network connection blocker for monitoring connections between host computers in a network and blocking the unwanted connections. The host computers transmit connection packets between each other in accordance with a network protocol suite when seeking to establish, providing network services with, and close the connections. The network protocol suite includes a connection oriented transport layer protocol. The network connection blocker comprises a network interface that receives the connection packets transmitted between the host computers. It also comprises a blocking module that processes the received connection packets to detect the unwanted connections. The blocking module then generates connection packets in …


Smart Sensing Skin For Detection And Localization Of Fatigue Cracks, Sari Kharroub, Simon Laflamme, Chunhui Song, Daji Qiao, Brent M. Phares, Jian Li Jun 2017

Smart Sensing Skin For Detection And Localization Of Fatigue Cracks, Sari Kharroub, Simon Laflamme, Chunhui Song, Daji Qiao, Brent M. Phares, Jian Li

Daji Qiao

Fatigue cracks on steel components may have strong consequences on the structure's serviceability and strength. Their detection and localization is a difficult task. Existing technologies enabling structural health monitoring have a complex link signal-to-damage or have economic barriers impeding large-scale deployment. A solution is to develop sensing methods that are inexpensive, scalable, with signals that can directly relate to damage. The authors have recently proposed a smart sensing skin for structural health monitoring applications to mesosystems. The sensor is a thin film soft elastomeric capacitor (SEC) that transduces strain into a measurable change in capacitance. Arranged in a network configuration, …


Lie Operators For Compressive Sensing, Chinmay Hegde, Aswin C. Sankaranarayanan, Richard G. Baraniuk Jun 2017

Lie Operators For Compressive Sensing, Chinmay Hegde, Aswin C. Sankaranarayanan, Richard G. Baraniuk

Chinmay Hegde

We consider the efficient acquisition, parameter estimation, and recovery of signal ensembles that lie on a low-dimensional manifold in a high-dimensional ambient signal space. Our particular focus is on randomized, compressive acquisition of signals from the manifold generated by the transformation of a base signal by operators from a Lie group. Such manifolds factor prominently in a number of applications, including radar and sonar array processing, camera arrays, and video processing. Leveraging the fact that Lie group manifolds admit a convenient analytical characterization, we develop new theory and algorithms for: (1) estimating the Lie operator parameters from compressivemeasurements, and (2) …


Near-Isometric Linear Embeddings Of Manifolds, Chinmay Hegde, Aswin C. Sankaranarayanan, Richard G. Baraniuk Jun 2017

Near-Isometric Linear Embeddings Of Manifolds, Chinmay Hegde, Aswin C. Sankaranarayanan, Richard G. Baraniuk

Chinmay Hegde

We propose a new method for linear dimensionality reduction of manifold-modeled data. Given a training set X of Q points belonging to a manifold M ⊂ ℝN, we construct a linear operator P : ℝN → ℝM that approximately preserves the norms of all (2Q) pairwise difference vectors (or secants) of X. We design the matrix P via a trace-norm minimization that can be efficiently solved as a semi-definite program (SDP). When X comprises a sufficiently dense sampling of M, we prove that the optimal matrix P preserves all pairs of secants over M. …


Overlay Protection Against Link Failures Using Network Coding, Ahmed Kamal, Aditya Ramamoorthy, Long Long, Shizheng Li May 2017

Overlay Protection Against Link Failures Using Network Coding, Ahmed Kamal, Aditya Ramamoorthy, Long Long, Shizheng Li

Ahmed Kamal

This paper introduces a network coding-based protection scheme against single and multiple link failures. The proposed strategy ensures that in a connection, each node receives two copies of the same data unit: one copy on the working circuit, and a second copy that can be extracted from linear combinations of data units transmitted on a shared protection path. This guarantees instantaneous recovery of data units upon the failure of a working circuit. The strategy can be implemented at an overlay layer, which makes its deployment simple and scalable. While the proposed strategy is similar in spirit to the work of …


1+N Network Protection For Mesh Networks: Network Coding-Based Protection Using P-Cycles And Protection Paths, Ahmed Kamal, Aditya Ramamoorthy May 2017

1+N Network Protection For Mesh Networks: Network Coding-Based Protection Using P-Cycles And Protection Paths, Ahmed Kamal, Aditya Ramamoorthy

Ahmed Kamal

A method and system for providing protection of multiple communication sessions using the bandwidth resources on the order of those required to protect a single communication session. This is facilitated through the use of network coding on a protection cycle. Transmissions from all connections are coded together using network coding and transmitted in two different directions on a cycle, so that the signal can be recovered by the receiver in two ways: on the working path, and on the protection (cycle) path.


Exchanging Ohmic Losses In Metamaterial Absorbers With Useful Optical Absorption For Photovoltaics, Ankit Vora, Jephias Gwamuri, Nezih Pala, Anand Kulkarni, Joshua M. Pearce, Durdu Ö. Güney May 2017

Exchanging Ohmic Losses In Metamaterial Absorbers With Useful Optical Absorption For Photovoltaics, Ankit Vora, Jephias Gwamuri, Nezih Pala, Anand Kulkarni, Joshua M. Pearce, Durdu Ö. Güney

Joshua M. Pearce

Using metamaterial absorbers, we have shown that metallic layers in the absorbers do not necessarily constitute undesired resistive heating problem for photovoltaics. Tailoring the geometric skin depth of metals and employing the natural bulk absorbance characteristics of the semiconductors in those absorbers can enable the exchange of undesired resistive losses with the useful optical absorbance in the active semiconductors. Thus, Ohmic loss dominated metamaterial absorbers can be converted into photovoltaic near-perfect absorbers with the advantage of harvesting the full potential of light management offered by the metamaterial absorbers. Based on experimental permittivity data for indium gallium nitride, we have shown …


Galileo Probe, Monish Ranjan Chatterjee Apr 2017

Galileo Probe, Monish Ranjan Chatterjee

Monish R. Chatterjee

The Galileo mission to Jupiter was formally approved by the United States Congress in 1977, several years before the space shuttle Columbia made its maiden flight into Earth orbit. The mission was a cooperative project involving scientists and engineers from the United States, Germany, Canada, Great Britain, France, Sweden, Spain, and Australia. Even though the Voyager 1 and Voyager 2 spacecraft had performed flybys of planet Jupiter and its sixteen moons in 1979, the Galileo mission was envisioned to initiate several novel observations of Jupiter, the most massive gas planet of the solar system, and its principal moons, and conduct …


Next Generation Wireless Communications: Cognitive Radio, Adnan Quadri, Naima Kaabouch Mar 2017

Next Generation Wireless Communications: Cognitive Radio, Adnan Quadri, Naima Kaabouch

ADNAN QUADRI

Wireless networks and information traffic have grown exponentially over the last decade. Consequently, an increase in demand of radio frequency bandwidth has resulted. Recent studies have shown that with the current fixed spectrum allocation, there are spectrum holes that are not utilized all the time by the licensed users while other frequency channels, such as Wi-Fi, are heavily used. To efficiently utilize the radio spectrum, cognitive radio stands to be a promising solution as it will be reconfigurable, self-aware and efficient. This research aims to develop techniques that will allow a cognitive radio system to enhance the radio’s decision-making capabilities …


Chiral Light Intrinsically Couples To Extrinsic/Pseudo-Chiral Metasurfaces Made Of Tilted Gold Nanowires, Alessandro Belardini, Marco Centini, Grigore Leahu, David C. Hooper, Roberto Li Voti, Eugenio Fazio, Joseph W. Haus, Andrew Sarangan, Ventsislav K. Valev, Concita Sibilia Feb 2017

Chiral Light Intrinsically Couples To Extrinsic/Pseudo-Chiral Metasurfaces Made Of Tilted Gold Nanowires, Alessandro Belardini, Marco Centini, Grigore Leahu, David C. Hooper, Roberto Li Voti, Eugenio Fazio, Joseph W. Haus, Andrew Sarangan, Ventsislav K. Valev, Concita Sibilia

Andrew Sarangan

Extrinsic or pseudo-chiral (meta)surfaces have an achiral structure, yet they can give rise to circular dichroism when the experiment itself becomes chiral. Although these surfaces are known to yield differences in reflected and transmitted circularly polarized light, the exact mechanism of the interaction has never been directly demonstrated. Here we present a comprehensive linear and nonlinear optical investigation of a metasurface composed of tilted gold nanowires. In the linear regime, we directly demonstrate the selective absorption of circularly polarised light depending on the orientation of the metasurface. In the nonlinear regime, we demonstrate for the first time how second harmonic …


Analytical Model Of Sic Mosfet For Accurately Predicting The Switching Performance, Mei Liang Dec 2016

Analytical Model Of Sic Mosfet For Accurately Predicting The Switching Performance, Mei Liang

Kang Peng

No abstract provided.


Impact Of Mismatch Angle On Electronic Transport Across Grain Boundaries And Interfaces In 2d Materials, Zlatan Aksamija Dec 2016

Impact Of Mismatch Angle On Electronic Transport Across Grain Boundaries And Interfaces In 2d Materials, Zlatan Aksamija

Zlatan Aksamija

We study the impact of grain boundaries (GB) and misorientation angles between grains on electronic
transport in 2-dimensional materials. Here we have developed a numerical model based on the firstprinciples
electronic bandstructure calculations in conjunction with a method which computes electron
transmission coefficients from simultaneous conservation of energy and momentum at the interface to
essentially evaluate GB/interface resistance in a Landauer formalism. We find that the resistance across
graphene GBs vary over a wide range depending on misorientation angles and type of GBs, starting
from 53 Ω μm for low-mismatch angles in twin (symmetric) GBs to about 1020 Ω μm …