Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 61 - 90 of 112

Full-Text Articles in Engineering

A Bayesian Network Based Adaptability Design Of Product Structures For Function Evolution, Shaobo Li, Yongming Wu, Yan-Xia Xu, Jie Hu, Jianjun Hu Mar 2018

A Bayesian Network Based Adaptability Design Of Product Structures For Function Evolution, Shaobo Li, Yongming Wu, Yan-Xia Xu, Jie Hu, Jianjun Hu

Faculty Publications

Structure adaptability design is critical for function evolution in product families, in which many structural and functional design factors are intertwined together with manufacturing cost, customer satisfaction, and final market sales. How to achieve a delicate balance among all of these factors to maximize the market performance of the product is too complicated to address based on traditional domain experts’ knowledge or some ad hoc heuristics. Here, we propose a quantitative product evolution design model that is based on Bayesian networks to model the dynamic relationship between customer needs and product structure design. In our model, all of the structural …


Aspie: A Framework For Active Sensing And Processing Of Complex Events In The Internet Of Manufacturing Things, Shaobo Li, Weixing Chen, Jie Hu, Jianjun Hu Mar 2018

Aspie: A Framework For Active Sensing And Processing Of Complex Events In The Internet Of Manufacturing Things, Shaobo Li, Weixing Chen, Jie Hu, Jianjun Hu

Faculty Publications

Rapid perception and processing of critical monitoring events are essential to ensure healthy operation of Internet of Manufacturing Things (IoMT)-based manufacturing processes. In this paper, we proposed a framework (active sensing and processing architecture (ASPIE)) for active sensing and processing of critical events in IoMT-based manufacturing based on the characteristics of IoMT architecture as well as its perception model. A relation model of complex events in manufacturing processes, together with related operators and unified XML-based semantic definitions, are developed to effectively process the complex event big data. A template based processing method for complex events is further introduced to conduct …


A Novel Evolutionary Algorithm For Designing Robust Analog Filters, Shaobo Li, Wang Zou, Jianjun Hu Mar 2018

A Novel Evolutionary Algorithm For Designing Robust Analog Filters, Shaobo Li, Wang Zou, Jianjun Hu

Faculty Publications

Designing robust circuits that withstand environmental perturbation and device degradation is critical for many applications. Traditional robust circuit design is mainly done by tuning parameters to improve system robustness. However, the topological structure of a system may set a limit on the robustness achievable through parameter tuning. This paper proposes a new evolutionary algorithm for robust design that exploits the open-ended topological search capability of genetic programming (GP) coupled with bond graph modeling. We applied our GP-based robust design (GPRD) algorithm to evolve robust lowpass and highpass analog filters. Compared with a traditional robust design approach based on a state-of-the-art …


Patent Keyword Extraction Algorithm Based On Distributed Representation For Patent Classification, Jie Hu, Shaobo Li, Yong Yao, Liya Yu, Guanci Yang, Jianjun Hu Feb 2018

Patent Keyword Extraction Algorithm Based On Distributed Representation For Patent Classification, Jie Hu, Shaobo Li, Yong Yao, Liya Yu, Guanci Yang, Jianjun Hu

Faculty Publications

Many text mining tasks such as text retrieval, text summarization, and text comparisons depend on the extraction of representative keywords from the main text. Most existing keyword extraction algorithms are based on discrete bag-of-words type of word representation of the text. In this paper, we propose a patent keyword extraction algorithm (PKEA) based on the distributed Skip-gram model for patent classification. We also develop a set of quantitative performance measures for keyword extraction evaluation based on information gain and cross-validation, based on Support Vector Machine (SVM) classification, which are valuable when human-annotated keywords are not available. We used a standard …


A Hierarchical Feature Extraction Model For Multi-Label Mechanical Patent Classification, Jie Hu, Shaobo Li, Jianjun Hu, Guanci Yang Jan 2018

A Hierarchical Feature Extraction Model For Multi-Label Mechanical Patent Classification, Jie Hu, Shaobo Li, Jianjun Hu, Guanci Yang

Faculty Publications

Various studies have focused on feature extraction methods for automatic patent classification in recent years. However, most of these approaches are based on the knowledge from experts in related domains. Here we propose a hierarchical feature extraction model (HFEM) for multi-label mechanical patent classification, which is able to capture both local features of phrases as well as global and temporal semantics. First, a n-gram feature extractor based on convolutional neural networks (CNNs) is designed to extract salient local lexical-level features. Next, a long dependency feature extraction model based on the bidirectional long–short-term memory (BiLSTM) neural network model is proposed to …


Recommender Systems For Large-Scale Social Networks: A Review Of Challenges And Solutions, Magdalini Eirinaki, Jerry Gao, Iraklis Varlamis, Konstantinos Tserpes Jan 2018

Recommender Systems For Large-Scale Social Networks: A Review Of Challenges And Solutions, Magdalini Eirinaki, Jerry Gao, Iraklis Varlamis, Konstantinos Tserpes

Faculty Publications

Social networks have become very important for networking, communications, and content sharing. Social networking applications generate a huge amount of data on a daily basis and social networks constitute a growing field of research, because of the heterogeneity of data and structures formed in them, and their size and dynamics. When this wealth of data is leveraged by recommender systems, the resulting coupling can help address interesting problems related to social engagement, member recruitment, and friend recommendations.In this work we review the various facets of large-scale social recommender systems, summarizing the challenges and interesting problems and discussing some of the …


Reconstructing Yeasts Phylogenies And Ancestors From Whole Genome Data, Bing Feng, Yu Lin, Lingxi Zhou, Yan Guo, Robert Friedman, Roufan Xia, Chao Liu, Jijun Tang Nov 2017

Reconstructing Yeasts Phylogenies And Ancestors From Whole Genome Data, Bing Feng, Yu Lin, Lingxi Zhou, Yan Guo, Robert Friedman, Roufan Xia, Chao Liu, Jijun Tang

Faculty Publications

Phylogenetic studies aim to discover evolutionary relationships and histories. These studies are based on similarities of morphological characters and molecular sequences. Currently, widely accepted phylogenetic approaches are based on multiple sequence alignments, which analyze shared gene datasets and concatenate/coalesce these results to a final phylogeny with maximum support. However, these approaches still have limitations, and often have conflicting results with each other. Reconstructing ancestral genomes helps us understand mechanisms and corresponding consequences of evolution. Most existing genome level phylogeny and ancestor reconstruction methods can only process simplified real genome datasets or simulated datasets with identical genome content, unique genome markers, …


Reconstructing Yeasts Phylogenies And Ancestors From Whole Genome Data, Bing Feng, Yu Ling, Lingxi Zhou, Roufan Xia, Fei Hu, Chao Liu Nov 2017

Reconstructing Yeasts Phylogenies And Ancestors From Whole Genome Data, Bing Feng, Yu Ling, Lingxi Zhou, Roufan Xia, Fei Hu, Chao Liu

Faculty Publications

Phylogenetic studies aim to discover evolutionary relationships and histories. These studies are based on similarities of morphological characters and molecular sequences. Currently, widely accepted phylogenetic approaches are based on multiple sequence alignments, which analyze shared gene datasets and concatenate/coalesce these results to a final phylogeny with maximum support. However, these approaches still have limitations, and often have conflicting results with each other. Reconstructing ancestral genomes helps us understand mechanisms and corresponding consequences of evolution. Most existing genome level phylogeny and ancestor reconstruction methods can only process simplified real genome datasets or simulated datasets with identical genome content, unique genome markers, …


Formal Performance Guarantees For An Approach To Human In The Loop Robot Missions, Damian Lyons, Ron Arkin, Shu Jiang, Matt O'Brien, Feng Tang, Peng Tang Oct 2017

Formal Performance Guarantees For An Approach To Human In The Loop Robot Missions, Damian Lyons, Ron Arkin, Shu Jiang, Matt O'Brien, Feng Tang, Peng Tang

Faculty Publications

Abstract— A key challenge in the automatic verification of robot mission software, especially critical mission software, is to be able to effectively model the performance of a human operator and factor that into the formal performance guarantees for the mission. We present a novel approach to modelling the skill level of the operator and integrating it into automatic verification using a linear Gaussians model parameterized by experimental calibration. Our approach allows us to model different skill levels directly in terms of the behavior of the lumped, robot plus operator, system.

Using MissionLab and VIPARS (a behavior-based robot mission verification …


A Framework For Recommendation Of Highly Popular News Lacking Social Feedback, Nuno Moniz, Luís Torgo, Magdalini Eirinaki, Paula Branco Oct 2017

A Framework For Recommendation Of Highly Popular News Lacking Social Feedback, Nuno Moniz, Luís Torgo, Magdalini Eirinaki, Paula Branco

Faculty Publications

Social media is rapidly becoming the main source of news consumption for users, raising significant challenges to news aggregation and recommendation tasks. One of these challenges concerns the recommendation of very recent news. To tackle this problem, approaches to the prediction of news popularity have been proposed. In this paper, we study the task of predicting news popularity upon their publication, when social feedback is unavailable or scarce, and to use such predictions to produce news rankings. Unlike previous work, we focus on accurately predicting highly popular news. Such cases are rare, causing known issues for standard prediction models and …


Improvement Of Phylogenetic Method To Analyze Compositional Heterogeneity, Zehua Zhang, Kecheng Guo, Gaofeng Pan, Jijun Tang, Fei Guo Sep 2017

Improvement Of Phylogenetic Method To Analyze Compositional Heterogeneity, Zehua Zhang, Kecheng Guo, Gaofeng Pan, Jijun Tang, Fei Guo

Faculty Publications

Background: Phylogenetic analysis is a key way to understand current research in the biological processes and detect theory in evolution of natural selection. The evolutionary relationship between species is generally reflected in the form of phylogenetic trees. Many methods for constructing phylogenetic trees, are based on the optimization criteria. We extract the biological data via modeling features, and then compare these characteristics to study the biological evolution between species.

Results: Here, we use maximum likelihood and Bayesian inference method to establish phylogenetic trees; multi-chain Markov chain Monte Carlo sampling method can be used to select optimal phylogenetic tree, resolving local …


An Ameliorated Prediction Of Drug–Target Interactions Based On Multi-Scale Discrete Wavelet Transform And Network Features, Cong Shen, Yijie Ding, Jijun Tang, Xinying Xu, Fei Guo Aug 2017

An Ameliorated Prediction Of Drug–Target Interactions Based On Multi-Scale Discrete Wavelet Transform And Network Features, Cong Shen, Yijie Ding, Jijun Tang, Xinying Xu, Fei Guo

Faculty Publications

The prediction of drug–target interactions (DTIs) via computational technology plays a crucial role in reducing the experimental cost. A variety of state-of-the-art methods have been proposed to improve the accuracy of DTI predictions. In this paper, we propose a kind of drug–target interactions predictor adopting multi-scale discrete wavelet transform and network features (named as DAWN) in order to solve the DTIs prediction problem. We encode the drug molecule by a substructure fingerprint with a dictionary of substructure patterns. Simultaneously, we apply the discrete wavelet transform (DWT) to extract features from target sequences. Then, we concatenate and normalize the target, drug, …


An Ensemble Deep Convolutional Neural Network Model With Improved D-S Evidence Fusion For Bearing Fault Diagnosis, Shaobo Li, Guoka Liu, Xianghong Tang, Jianguang Lu, Jianjun Hu Jul 2017

An Ensemble Deep Convolutional Neural Network Model With Improved D-S Evidence Fusion For Bearing Fault Diagnosis, Shaobo Li, Guoka Liu, Xianghong Tang, Jianguang Lu, Jianjun Hu

Faculty Publications

Intelligent machine health monitoring and fault diagnosis are becoming increasingly important for modern manufacturing industries. Current fault diagnosis approaches mostly depend on expert-designed features for building prediction models. In this paper, we proposed IDSCNN, a novel bearing fault diagnosis algorithm based on ensemble deep convolutional neural networks and an improved Dempster–Shafer theory based evidence fusion. The convolutional neural networks take the root mean square (RMS) maps from the FFT (Fast Fourier Transformation) features of the vibration signals from two sensors as inputs. The improved D-S evidence theory is implemented via distance matrix from evidences and modified Gini Index. Extensive evaluations …


An Approach To Robust Homing With Stereovision, Fuqiang Fu, Damian Lyons Apr 2017

An Approach To Robust Homing With Stereovision, Fuqiang Fu, Damian Lyons

Faculty Publications

Visual Homing is a bioinspired approach to robot navigation which can be fast and uses few assumptions. However, visual homing in a cluttered and unstructured outdoor environment offers several challenges to homing methods that have been developed for primarily indoor environments. One issue is that any current image during homing may be tilted with respect to the home image. The second is that moving through a cluttered scene during homing may cause obstacles to interfere between the home scene and location and the current scene and location. In this paper, we introduce a robust method to improve a previous developed …


Multi-Valued Sequences Generated By Power Residue Symbols Over Odd Characteristic Fields, Begum Nasima, Yasuyuki Nogami, Satoshi Uehara, Robert Morelos-Zaragoza Apr 2017

Multi-Valued Sequences Generated By Power Residue Symbols Over Odd Characteristic Fields, Begum Nasima, Yasuyuki Nogami, Satoshi Uehara, Robert Morelos-Zaragoza

Faculty Publications

This paper proposes a new approach for generating pseudo random multi-valued (including binary-valued) sequences. The approach uses a primitive polynomial over an odd characteristic prime field $\f{p}$, where p is an odd prime number. Then, for the maximum length sequence of vectors generated by the primitive polynomial, the trace function is used for mapping these vectors to scalars as elements in the prime field. Power residue symbol (Legendre symbol in binary case) is applied to translate the scalars to k-value scalars, where k is a prime factor of p-1. Finally, a pseudo random k-value sequence is obtained. Some important properties …


Performance Verification For Robot Missions In Uncertain Environments, Damian Lyons, Ron Arkin, Shu Jiang, Matt O'Brien, Feng Tang, Peng Tang Jan 2017

Performance Verification For Robot Missions In Uncertain Environments, Damian Lyons, Ron Arkin, Shu Jiang, Matt O'Brien, Feng Tang, Peng Tang

Faculty Publications

Abstract—Certain robot missions need to perform predictably in a physical environment that may have significant uncertainty. One approach is to leverage automatic software verification techniques to establish a performance guarantee. The addition of an environment model and uncertainty in both program and environment, however, means the state-space of a model-checking solution to the problem can be prohibitively large. An approach based on behavior-based controllers in a process-algebra framework that avoids state-space combinatorics is presented here. In this approach, verification of the robot program in the uncertain environment is reduced to a filtering problem for a Bayesian Network. Validation results …


Robust And Agile System Against Fault And Anomaly Traffic In Software Defined Networks, Mihui Kim, Younghee Park, Rohit Kotalwar Jan 2017

Robust And Agile System Against Fault And Anomaly Traffic In Software Defined Networks, Mihui Kim, Younghee Park, Rohit Kotalwar

Faculty Publications

The main advantage of software defined networking (SDN) is that it allows intelligent control and management of networking though programmability in real time. It enables efficient utilization of network resources through traffic engineering, and offers potential attack defense methods when abnormalities arise. However, previous studies have only identified individual solutions for respective problems, instead of finding a more global solution in real time that is capable of addressing multiple situations in network status. To cover diverse network conditions, this paper presents a comprehensive reactive system for simultaneously monitoring failures, anomalies, and attacks for high availability and reliability. We design three …


Impact Of Reviewer Social Interaction On Online Consumer Review Fraud Detection, Kunal Goswami, Younghee Park, Chungsik Song Jan 2017

Impact Of Reviewer Social Interaction On Online Consumer Review Fraud Detection, Kunal Goswami, Younghee Park, Chungsik Song

Faculty Publications

Background Online consumer reviews have become a baseline for new consumers to try out a business or a new product. The reviews provide a quick look into the application and experience of the business/product and market it to new customers. However, some businesses or reviewers use these reviews to spread fake information about the business/product. The fake information can be used to promote a relatively average product/business or can be used to malign their competition. This activity is known as reviewer fraud or opinion spam. The paper proposes a feature set, capturing the user social interaction behavior to identify fraud. …


Establishing A-Priori Performance Guarantees For Robot Missions That Include Localization Software, Damian Lyons, Ron Arkin, Shu Jiang, Matt O'Brien, Feng Tang, Peng Tang Jan 2017

Establishing A-Priori Performance Guarantees For Robot Missions That Include Localization Software, Damian Lyons, Ron Arkin, Shu Jiang, Matt O'Brien, Feng Tang, Peng Tang

Faculty Publications

One approach to determining whether an automated system is performing correctly is to monitor its performance, signaling when the performance is not acceptable; another approach is to automatically analyze the possible behaviors of the system a-priori and determine performance guarantees. Thea authors have applied this second approach to automatically derive performance guarantees for behaviorbased, multi-robot critical mission software using an innovative approach to formal verification for robotic software. Localization and mapping algorithms can allow a robot to navigate well in an unknown environment. However, whether such algorithms enhance any specific robot mission is currently a matter for empirical validation. Several …


A Multi-Value Sequence Generated By Power Residue Symbol And Trace Function Over Odd Characteristic Field, Yasuyuki Nogami, Satoshi Uehara, Kazuyoshi Tsuchiya, Nasima Begum, Hiroto Ino, Robert Morelos-Zaragoza Dec 2016

A Multi-Value Sequence Generated By Power Residue Symbol And Trace Function Over Odd Characteristic Field, Yasuyuki Nogami, Satoshi Uehara, Kazuyoshi Tsuchiya, Nasima Begum, Hiroto Ino, Robert Morelos-Zaragoza

Faculty Publications

This paper proposes a new multi-value sequence generated by utilizing primitive element, trace, and power residue symbol over odd characteristic finite field. In detail, let p and k be an odd prime number as the characteristic and a prime factor of p-1, respectively. Our proposal generates k-value sequence T={ti | ti=fk(Tr(ωi)+A)}, where ω is a primitive element in the extension field $\F{p}{m}$, Tr(⋅) is the trace function that maps $\F{p}{m} \rightarrow \f{p}$, A is a non-zero scalar in the prime field $\f{p}$, and fk(⋅) is a certain mapping function based on k-th power residue symbol. Thus, the proposed sequence has …


Formal Performance Guarantees For Behavior-Based Localization Missions, Damian Lyons, Ron Arkin, Shu Jiang, Matt O'Brien, Feng Tang, Peng Tang Nov 2016

Formal Performance Guarantees For Behavior-Based Localization Missions, Damian Lyons, Ron Arkin, Shu Jiang, Matt O'Brien, Feng Tang, Peng Tang

Faculty Publications

Abstract— Localization and mapping algorithms can allow a robot to navigate well in an unknown environment. However, whether such algorithms enhance any specific robot mission is currently a matter for empirical validation. In this paper we apply our MissionLab/VIPARS mission design and verification approach to an autonomous robot mission that uses probabilistic localization software.

Two approaches to modeling probabilistic localization for verification are presented: a high-level approach, and a sample-based approach which allows run-time code to be embedded in verification. Verification and experimental validation results are presented for two different missions, each using each method, demonstrating the accuracy …


Landmark Detection With Surprise Saliency Using Convolutional Neural Networks, Feng Tang, Damian Lyons, Daniel Leeds Sep 2016

Landmark Detection With Surprise Saliency Using Convolutional Neural Networks, Feng Tang, Damian Lyons, Daniel Leeds

Faculty Publications

Abstract—Landmarks can be used as reference to enable people or robots to localize themselves or to navigate in their environment. Automatic definition and extraction of appropriate landmarks from the environment has proven to be a challenging task when pre-defined landmarks are not present. We propose a novel computational model of automatic landmark detection from a single image without any pre-defined landmark database. The hypothesis is that if an object looks abnormal due to its atypical scene context (what we call surprise saliency), it then may be considered as a good landmark because it is unique and easy to spot by …


Threshold-Bounded Influence Dominating Sets For Recommendations In Social Networks, Magdalini Eirinaki, Nuno Moniz, Katerina Potika Jan 2016

Threshold-Bounded Influence Dominating Sets For Recommendations In Social Networks, Magdalini Eirinaki, Nuno Moniz, Katerina Potika

Faculty Publications

The process of decision making in humans involves a combination of the genuine information held by the individual, and the external influence from their social network connections. This helps individuals to make decisions or adopt behaviors, opinions or products. In this work, we seek to investigate under which conditions and with what cost we can form neighborhoods of influence within a social network, in order to assist individuals with little or no prior genuine information through a two-phase recommendation process. Most of the existing approaches regard the problem of identifying influentials as a long-term, network diffusion process, where information cascading …


Time-Based Ensembles For Prediction Of Rare Events In News Streams, Nuno Moniz, Luís Torgo, Magdalini Eirinaki Jan 2016

Time-Based Ensembles For Prediction Of Rare Events In News Streams, Nuno Moniz, Luís Torgo, Magdalini Eirinaki

Faculty Publications

Thousands of news are published everyday reporting worldwide events. Most of these news obtain a low level of popularity and only a small set of events become highly popular in social media platforms. Predicting rare cases of highly popular news is not a trivial task due to shortcomings of standard learning approaches and evaluation metrics. So far, the standard task of predicting the popularity of news items has been tackled by either of two distinct strategies related to the publication time of news. The first strategy, a priori, is focused on predicting the popularity of news upon their publication when …


Development Of Cloud-Based Uav Monitoring And Management System, Mason Itkin, Mihui Kim, Younghee Park Jan 2016

Development Of Cloud-Based Uav Monitoring And Management System, Mason Itkin, Mihui Kim, Younghee Park

Faculty Publications

Unmanned aerial vehicles (UAVs) are an emerging technology with the potential to revolutionize commercial industries and the public domain outside of the military. UAVs would be able to speed up rescue and recovery operations from natural disasters and can be used for autonomous delivery systems (e.g., Amazon Prime Air). An increase in the number of active UAV systems in dense urban areas is attributed to an influx of UAV hobbyists and commercial multi-UAV systems. As airspace for UAV flight becomes more limited, it is important to monitor and manage many UAV systems using modern collision avoidance techniques. In this paper, …


A Cloud-Based Framework For Smart Permit System For Buildings, Magdalini Eirinaki, Subhankar Dhar, Shishir Mathur Jan 2016

A Cloud-Based Framework For Smart Permit System For Buildings, Magdalini Eirinaki, Subhankar Dhar, Shishir Mathur

Faculty Publications

In this paper we propose a novel cloud-based platform for building permit system that is efficient, user-friendly, transparent, and has quick turn-around time for homeowners. Compared to the existing permit systems, the proposed smart city permit framework provides a pre-permitting decision workflow, and incorporates a data analytics and mining module that enables the continuous improvement of a) the end user experience, by analyzing explicit and implicit user feedback, and b) the permitting and urban planning process, allowing a gleaning of key insights for real estate development and city planning purposes, by analyzing how users interact with the system depending on …


Pro-Fit: Exercise With Friends, Saumil Dharia, Vijesh Jain, Jvalant Patel, Jainikkumar Vora, Rizen Yamauchi, Magdalini Eirinaki, Iraklis Varlamis Jan 2016

Pro-Fit: Exercise With Friends, Saumil Dharia, Vijesh Jain, Jvalant Patel, Jainikkumar Vora, Rizen Yamauchi, Magdalini Eirinaki, Iraklis Varlamis

Faculty Publications

The advancements in wearable technology, where embedded accelerometers, gyroscopes and other sensors enable the users to actively monitor their activity have made it easier for individuals to pursue a healthy lifestyle. However, most of the existing applications expect continuous commitment from the end users, who need to proactively interact with the application in order to connect with friends and attain their goals. These applications fail to engage and motivate users who have busy schedules, or are not as committed and self-motivated. In this work, we present PRO-Fit, a personalized fitness assistant application that employs machine learning and recommendation algorithms in …


Con-Resistant Trust For Improved Reliability In A Smart Grid Special Protection System, Crystal M. Shipman, Kenneth M. Hopkinson, Juan L. Lopez Jr. Feb 2015

Con-Resistant Trust For Improved Reliability In A Smart Grid Special Protection System, Crystal M. Shipman, Kenneth M. Hopkinson, Juan L. Lopez Jr.

Faculty Publications

This paper applies a con-resistant trust mechanism to improve the performance of a communications-based special protection system to enhance its effectiveness and resiliency. Smart grids incorporate modern information technologies to increase reliability and efficiency through better situational awareness. However, with the benefits of this new technology come the added risks associated with threats and vulnerabilities to the technology and to the critical infrastructure it supports. The research in this paper uses con-resistant trust to quickly identify malicious or malfunctioning (untrustworthy) protection system nodes to mitigate instabilities. The con-resistant trust mechanism allows protection system nodes to make trust assessments based on …


Machine Learning Nuclear Detonation Features, Daniel T. Schmitt, Gilbert L. Peterson Oct 2014

Machine Learning Nuclear Detonation Features, Daniel T. Schmitt, Gilbert L. Peterson

Faculty Publications

Nuclear explosion yield estimation equations based on a 3D model of the explosion volume will have a lower uncertainty than radius based estimation. To accurately collect data for a volume model of atmospheric explosions requires building a 3D representation from 2D images. The majority of 3D reconstruction algorithms use the SIFT (scale-invariant feature transform) feature detection algorithm which works best on feature-rich objects with continuous angular collections. These assumptions are different from the archive of nuclear explosions that have only 3 points of view. This paper reduces 300 dimensions derived from an image based on Fourier analysis and five edge …


Timing Mark Detection On Nuclear Detonation Video, Daniel T. Schmitt, Gilbert L. Peterson Oct 2014

Timing Mark Detection On Nuclear Detonation Video, Daniel T. Schmitt, Gilbert L. Peterson

Faculty Publications

During the 1950s and 1960s the United States conducted and filmed over 200 atmospheric nuclear tests establishing the foundations of atmospheric nuclear detonation behavior. Each explosion was documented with about 20 videos from three or four points of view. Synthesizing the videos into a 3D video will improve yield estimates and reduce error factors. The videos were captured at a nominal 2500 frames per second, but range from 2300-3100 frames per second during operation. In order to combine them into one 3D video, individual video frames need to be correlated in time with each other. When the videos were captured …